Page 527 - ITGC_Audit Guides
P. 527

GTAG — IT Outsourcing Delivery: Risk and Control Considerations




                 important for the user entity to evaluate whether it   5.  application: Application architectures consist of
                 has contracted the right service provider and for the   integrated and interoperable back-office, front-
                 provider to measure whether it is best positioned to   office, virtual-office, desktop, laptop, personal digital
                 meet customer expectations.                         assistants, and other thin-client applications that
              2.  operating system: An operating system (OS) is      support the current and to-be business strategy.
                 software that runs on computers, manages computer   Applications should be standardized to support
                 hardware resources, and provides common services    activities, processes, employees, customers, suppliers,
                 for executing various application software programs.   and partners regardless of where they sit physically
                 The OS acts as an intermediary between application   or how mobile they are. Most large and mid-sized
                 programs and the computer hardware. Additionally,   organizations have large enterprise applications
                 the OS provides:                                    such as ERP and customer relationship management
                                                                     (CRM) systems. There also are proprietary
                    –  System tools (programs) used to monitor       applications and Internet or Web-facing applications
                    computer performance, debug problems, or         that interface with customers, suppliers, and partners.
                    maintain parts of the system.                    Finally, there are applications that help organizations
                    –  A set of libraries or functions that programs may   manage their applications and the computing and
                    use to perform specific tasks especially relating to   communications infrastructure (e.g., network and
                    interfacing with computer system components.     systems management applications).
                 Operating systems are often an avenue of attack,   6.  metrics & reporting: The SLA is one of the primary
                 especially when critical patches or updates are     metrics used to measure performance, and it can
                 missing. As a result, performance and availability   provide management with the evidence to support
                 issues could begin to surface, or the system could   the evaluation of the customer/supplier relationship.
                 suffer unauthorized access and disclosure of sensitive   An OLA supports the SLA and provides specific
                 or proprietary data.                                process goals to achieve the SLA. Organizations in
              3.  network: Outside the Internet and intranet, and    IT outsourcing relationships should have an ongoing
                 the need for connectivity, the network is constantly   monitoring process to ensure the service provider’s
                 adjusting to new business models and service        performance is aligned with the outsourcing contract.
                 offerings such as business-to-customer (B2C) and    KPIs and key risk indicators (KRIs) should be
                 business-to-business (B2B) transaction processing,   established to help the client and the service provider
                 business-to-government (B2G) transactions,          meet their business objectives.
                 e-learning, collaborative customer service, and real-  7.  program/project management: In achieving its
                 time, rich media-based teleconferencing. Increasing   particular purpose, a project will have a discreet
                 numbers of employees are working from home,         beginning and end, undertaken within defined
                 from the road, or in virtual spaces where they are   constraints of scope, quality, and cost. Projects will
                 connected constantly. The pressure to provide       vary in size and scope and could include building new
                 reliable, secure, cost-effective communications is   infrastructure, new product development, and the
                 unprecedented and will continue to grow. The Web,   implementation of new business processes or business
                 which sits outside corporate firewalls, is emerging as a   transformations. In the evaluation of such projects at
                 virtual operating system and is becoming the preferred   various stages, it is necessary to understand the key
                 platform for more and more organizations.           risks and to develop a set of key criteria.
              4.  database: Data lies at the heart of all business
                 models. “Operational data,” especially if it is in   Key ITO Service Delivery Risk Areas
                 different forms, often should get translated into a
                 form where it can be used by many people in the   This section outlines the common ITO risks related to
                 organization. Safeguarding substantial amounts of   the IT service delivery architecture. Fundamental to
                 sensitive and confidential data, personal information,   outsourcing is accepting that although service delivery
                 intellectual property, and trade secrets from malicious   (operational responsibility) is transferred to the service
                 attacks and accidental loss is one of the biggest   provider, the user entity retains responsibility for the
                 challenges for IT management. Strategically, the   management of and adherence to policies, procedures, and
                 trend has been to place more value on unstructured   regulatory requirements. This is ITO risk. To manage this
                 data and less emphasis on traditional hierarchical   risk, the user entity should have an effective outsourcing
                 file systems, which were never designed to operate at   oversight program with a framework for management to
                 today’s scale.                                 identify, measure, monitor, and control the process area
                                                                risks associated with outsourcing. The risk associated


                                                             15
   522   523   524   525   526   527   528   529   530   531   532