Page 246 - COSO Guidance Book
P. 246

For example, at a medical practice, there might be increased concerns regarding patient data that is
               maintained by a third-party service organization when compared with maintaining this sensitive
               information in-house.

               Like transaction-processing system controls, technology general controls may include both manual
               and automated control activities.
              Point of focus — Establishes relevant technology infrastructure control activities

               Management selects and develops control activities over the technology infrastructure, which are
               designed and implemented to help ensure the completeness, accuracy, and availability of technology
               processing.

               The framework  states that technology requires an infrastructure in which to operate, ranging from
               communication networks for connecting technologies with each other and the rest of the entity, to
               various computing resources (servers, laptops, and so forth) for applications to operate.

              Point of focus — Establishes relevant security management process control activities

               Management selects and develops control activities that are designed and implemented to restrict
               technology access rights to authorized users commensurate with their job responsibilities and to
               protect the entity’s assets from external threats.

               The framework notes that security management includes subprocesses and control activities over
               who and what has access to an entity’s technology, including who has the ability to execute
               transactions. Security management generally addresses access rights at the data, operating system
               (system software), network, application, and physical layers (such as administrative rights). Security
               controls regarding access safeguard an entity from inappropriate access and unauthorized use of the
               system. Access controls also support appropriate segregation of duties. Security threats can
               originate from internal or external sources. By preventing unauthorized use of (and changes to) the
               system, data and program integrity are safeguarded from malevolent intent (for example, an external
               hacker) or error (for example, an employee is not provided with certain access rights [such as making
               changes to a database] until after having received proper training and experience in order to decrease
               the likelihood of errors).

               An example of an adverse financial consequence due to a security breach conducted by external
               hackers is provided by the major retailer Target. The security breach is cited as a major factor
               causing Target’s fourth quarter earnings to drop 46%. Over 40 million customer debit and credit cards
                                                                                                     5
               were compromised and personal information was stolen from over 70 million individuals.
              Point of focus — Establishes relevant technology acquisition, development, and maintenance process
               control activities

               Management selects and develops control activities over the acquisition, development, and
               maintenance of technology and its infrastructure to achieve management’s objectives.
               The framework states that technology general controls support the acquisition, development, and
               maintenance of technology.


            5
              http://online.wsj.com/news/articles/SB10001424052702304255604579406694182132568?mg=reno64-
            wsj&url=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10001424052702304255604579406694182132568
            .html


            © 2020 Association of International Certified Professional Accountants. All rights reserved.    5-12
   241   242   243   244   245   246   247   248   249   250   251