Page 585 - ITGC_Audit Guides
P. 585

Global Technology Audit Guide (GTAG)


        Written in straightforward business language to address a timely issue related to IT management, control, and security, the GTAG
        series serves as a ready resource for chief audit executives on different technology-associated risks and recommended practices.




                       Information Technology Controls: Topics                  Information Technology Outsourcing:
                       discussed include IT control concepts, the         )NFORMATION   Discusses how to choose the right IT
                       importance of IT controls, the                     /UTSOURCING  outsourcing vendor and key outsourcing
                                                                          4ECHNOLOGY
                       organizational roles and responsibilities for            control considerations from the client’s and
                       ensuring effective IT controls, and risk                 service provider’s operation.
                       analysis and monitoring techniques.


                       Change and Patch Management Controls:                    Auditing Application Controls: Addresses
                       Describes sources of change and their likely             the concept of application control and its
                Change and Patch                                           Auditing
              Management Controls:   impact on business objectives, as well as   Application   relationship with general controls, as well as
                 Critical for                                              Controls
                Organizational
                       how change and patch management
                  Success                                                       how to scope a risk-based application
                       controls help manage IT risks and costs and              control review.
                       what works and doesn’t work in practice.
                       Continuous Auditing: Addresses the role                  Identity and Access Management: Covers
                       of continuous auditing in today’s internal               key concepts surrounding identity and
               Continuous Auditing:                                    Identity and Access
             Implications for Assurance,  audit environment; the relationship of   Management  access management (IAM), risks associated
                Monitoring, and
                Risk Assessment
                       continuous auditing, continuous                          with IAM process, detailed guidance on
                       monitoring, and continuous assurance; and                how to audit IAM processes, and a sample
                       the application and implementation of                    checklist for auditors.
                       continuous auditing.
                       Management of IT Auditing: Discusses                     Business Continuity Management: Defines
                       IT-related risks and defines the IT audit                business continuity management (BCM),
                       universe, as well as how to execute and           Management  discusses business risk, and includes a
             Management of IT Auditing                                 Business Continuity
                       manage the IT audit process.                             detailed discussion of BCM program
                                                                                requirements.




                       Managing and Auditing Privacy Risks:                     Developing the IT Audit Plan: Provides
                       Discusses global privacy principles and                  step-by-step guidance on how to develop an
                 Managing                                               Developing the
                and Auditing  frameworks, privacy risk models and        IT Audit Plan  IT audit plan, from understanding the
                Privacy Risks
                       controls, the role of internal auditors, top 10          business, defining the IT audit universe, and
                       privacy questions to ask during the course of            performing a risk assessment, to formalizing
                       the audit, and more.                                     the IT audit plan.

                       Managing and Auditing IT Vulnerabilities:
                       Among other topics, discusses the                        Auditing IT Projects:  Provides an overview
             Managing and Auditing  vulnerability management life cycle, the    of  techniques  for  effectively  engaging  with
              IT Vulnerabilities
                       scope of a vulnerability management audit,               project teams and management to assess the
                       and metrics to measure vulnerability                     risks related to IT projects.
                       management practices.






        Visit The IIA’s Web site at www.theiia.org/technology to download the entire series.
   580   581   582   583   584   585   586   587   588   589   590