General
Information
technology is one of the more crucial resources of any organization. The future
of the organization and the efficiency of its activities are actually dependent
on the manner in which this resource is managed. Notwithstanding the importance
of an organization’s IT activity, very often the managements of organizations
have no real ability to direct, check and control this resource. Our approach
is that the audit of information systems is an important tool in the hands of
internal auditors and other executives for purposes of obtaining an objective
and professional picture of the fairness of the management of the
organization’s information technologies, by focusing on the performance of
examinations in those areas of organizational activity that involve the
greatest risks.
Our firm has amassed extensive experience in auditing
information systems. Our experience incorporates practical work in the area as
former IT personnel, with internal audit work in general and information
systems auditing in particular. This integration enables us to understand the
needs in the field of information systems, of both IT staff and management and
audit staff. In conducting our audits, we make use of advanced techniques, as
well as computerized audit tools.
In our
opinion, the combination of experience in internal auditing and information
systems auditing, together with information systems analysis, provides our
audit with considerable added value which is to the benefit of the
organization.
The audit process
Our approach to the IT audit is that it is a process that is supposed to
check and improve the work processes and control mechanisms in the system being
audited. As part of the audit, we check, among other things, whether a given
computerized process includes proper controls (input, processing and output),
whether the control cycles are closed, whether the computerized controls are
effective, whether the provisions of the law and management guidelines are
adhered to, and the quality of the interfaces with other systems and the
quality of the information security. The audit process includes the following
major phases:
· Introductory discussions with executives – The
discussions are held "top-down”, with a goal of obtaining an understanding of
the audited issue and the people involved therein, presenting the audit process
to the audited party, focusing and setting goals and the scope of the audit.
· Planning the audit – Conducting a risk assessment for
the relevant audit and identifying the major points of risk on which the audit
will focus. On the basis of this assessment, a detailed audit plan is prepared,
including prioritization of issues.
· Field work – Based on the audit plan, the
field work includes, in some cases, use of computerized audit tools that allow
the audit team to efficiently examine large quantities of data.
· Summation meeting – Toward the end of the audit, a
meeting is held with the auditee, during which the auditors present the
findings of the audit as have been formulated to date. The goal of this meeting
is to receive feedback from the auditee regarding the findings, and to jointly
formulate the recommendations for remedying the faults that were found. In our
opinion, this meeting provides an opportunity for the audit parties to identify
with the audit.
· Preparation of a draft of the audit report – The
audit report is prepared in a structured format, on the basis of the process
that was audited. The report includes an executive summary, summary of findings
and recommendations for the convenience of the reader. The report is submitted
to the audit party for his comments.
· Presentation to management and preparation of a final report – A draft
of the report is sent to management. The auditor presents the audit that was
conducted and a discussion takes place in connection with the findings and the
recommendations. Management feedback is incorporated into the report, following
which a final version of the report is prepared.
·
The report is presented to
the audit committee
Types of IT audits
·
Conducting an audit in the
area of information systems
Our experience includes conducting audits in a broad
variety of information systems, including complex systems such as ERP and
billing, and other systems for financial management, bookkeeping, suppliers,
logistical systems, such as: procurement, inventory, sales, payroll and
manpower, asset management system, banking system, file management, etc. In
respect of all of the systems, the audit can check, among other things, the
following issues:
·
Whether the system supports
the work processes and whether it is adequately suited to the needs of the
client
·
The quality of the controls
integrated into the system
·
The quality of the data and
identification of deviant or erroneous data
·
Information security in the
system
·
The quality of the
interfaces and the connections with other information systems
·
The infrastructure of the
system (developments and adjustments, versions, problems and support,
documentation)
·
Auditing the functioning of
the computer systems
Checking special areas of activity, managed by the computer unit or by
other parties at the Company:
·
Development and maintenance
of information systems
·
Help-desk activity
·
Procurement of systems and
equipment
·
Backup management
·
Management of the computer
unit
·
Computer-related risk
assessment
Conducting an assessment of operational risks in connection with
computerization. The assessment is used by management and by the internal auditor
and includes mapping all of the computer-related issues in the organization.
Each issue constitutes a chapter of the report which includes a general
background, findings that arose during the assessment, evaluation of the
potential risk, and issues to be checked in this area of activity.
·
Information security
Information security can be divided into three major areas of activity:
physical security of the data, information security in the area of
infrastructure (the operations department, networks, etc.), and information
security in the area of information systems. The major audit issues are
presented below:
·
Organizational policy and
the manner in which it is enforced
·
The quality of the
management of user accounts
·
The quality of the user
authorization matrix of both company and third-party users
·
Ensuring that the password
policy complies with Israeli standards
·
Protection of communications
systems
·
Following up information
security events
·
Aspects of the law for the
protection of privacy
·
Securing computer
installations
·
The quality of the backup
management
·
Preparedness for emergency
situations (BCP & DRP)
·
A disaster recovery plan
(DRP) and its updating and being tailored to the needs of the organization
·
Statutory aspects and
compliance therewith
·
The quality of the backups
performed and the controls in connection with such performance
·
Conducting tests and trial
runs to assess the ability to implement the DRP and the fairness of the backups
·
Miscellaneous
·
Participation in the
meetings of the computerization steering committee
·
Audit in connection with
acceptance testing of information systems
·
Checking the definition of
information systems needs
·
Training in connection with
information systems auditing
|