Page 71 - Internal Auditing Standards
P. 71

Guide to Using International Standards on Auditing in the Audits of Small- and Medium-Sized Entities Volume 1—Core Concepts





          General IT Controls

          Access to            Issuance/removal and security of user passwords and IDs.
          Programs             Internet firewalls and remote-access controls.

          and Application
                               Data encryption and cryptographic keys.
          Data
                               User accounts and access-privilege controls.

                               User profiles that permit or restrict access.
          Program              Acquisition and implementation of new applications.
          Development and      System development and quality-assurance methodology.
          Program Changes
                               The maintenance of existing applications, including controls over program changes.
          Monitoring of IT     Policies, procedures, inspections, and exception reports ensuring:
          Operations           •     That information users are receiving accurate data for decision-making;
                               •     Ongoing compliance with general IT controls; and
                               •     That IT is serving the entity’s needs and aligned with the business requirements.


        IT Application Controls
        IT application controls relate to a particular software application used at the business process level.
        Application controls can be preventive or detective in nature, and are designed to ensure the integrity of the
        accounting records.

        Typical application controls relate to procedures used to initiate, record, process, and report transactions or
        other financial data. These controls help ensure that transactions occurred, are authorized, and are completely

        and accurately recorded and processed. Examples include edit checks of input data with correction at the
        point of data entry, and numerical sequence checks with manual follow-up of exception reports.







































                                                                                                                   69
   66   67   68   69   70   71   72   73   74   75   76