Page 122 - ITGC_Audit Guides
P. 122
agreement between the internal audit activity and the engagement client on the nature of
additional consulting services, as recommended in Standard 2220 – Engagement Scope.
The GTAG “Fraud Prevention and Detection in an Automated World more thoroughly covers
controls to detect fraud. A separate GTAG on cybersecurity operations details controls that
monitor cybersecurity, including those that monitor database administration actions.
Controls over database management and business intelligence are primarily covered in:
• COBIT 2019 Framework: Governance and Management Objectives practices:
o APO14.06 Ensure a Data Quality Assessment Approach.
o APO14.08 Manage the Life Cycle of Data Assets.
o MEA01.03 Collect and Process Performance and Conformance Data.
o MEA01.04 Analyze and Report Performance.
• NIST SP 800-53r5 control families:
o Change Management, especially control CM-12 Information Location.
o Program Management, especially control PM-6 Measures of Performance.
o System and Communications Protection, especially control SC-28 Protection of
Information at Rest.
o System and Information Integrity, especially control SI-12 Information Management
and Retention.
• In the CIS Controls similar guidance is mainly found in safeguards:
o 3.3 Configure Data Access Control Lists.
o 3.12 Segment Data Processing and Storage Based on Sensitivity.
o 3.14 Log Sensitive Data Access.
Using Computer-assisted Audit Techniques
Many off-the-shelf applications and tools enable internal auditors to enhance the breadth and
efficiency of the audit process with computer-assisted audit techniques (CAATs). In an
assessment of business applications, CAATs can enable a review of an entire population of
transactions or records in a given period, identify anomalies in user access management, or
perform other possible audit tests. A well-designed and documented engagement supported by
CAATs demonstrates conformance with the following standards:
Standard 1210.A3 – Internal auditors must have sufficient knowledge of key information
technology risks and controls and available technology-based audit techniques to perform
their assigned work. However, not all internal auditors are expected to have the expertise of an
internal auditor whose primary responsibility is information technology auditing. (emphasis
added)
Standard 1220.A2 – In exercising due professional care internal auditors must consider the use of
technology-based audit and other data analysis techniques.
22 — theiia.org