Prévia do material em texto
Need for IT Governance and Assurance The COBIT® Framework IT Assurance Approaches How COBIT Supports IT Assurance Activities USING COBIT® The IT Governance Institute® The IT Governance Institute (ITGITM) (www.itgi.org) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise’s information technology. Effective IT governance helps ensure that IT supports business goals, optimises business investment in IT, and appropriately manages IT-related risks and opportunities. ITGI offers original research, electronic resources and case studies to assist enterprise leaders and boards of directors in their IT governance responsibilities. Disclaimer ITGI (the ‘Owner’) has designed and created this publication, titled IT Assurance Guide: Using COBIT ® (the ‘Work’), primarily as an educational resource for assurance professionals. The Owner makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of any proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, CIOs, senior management, IT management and control professionals should apply their own professional judgement to the specific circumstances presented by the particular systems or IT environment. Disclosure © 2007 IT Governance Institute. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system or transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written authorisation of ITGI. Reproduction of selections of this publication, for internal and non-commercial or academic use only, is permitted and must include full attribution of the material’s source. No other right or permission is granted with respect to this work. IT Governance Institute 3701 Algonquin Road, Suite 1010 Rolling Meadows, IL 60008 USA Phone: +1.847.590.7491 Fax: +1.847.253.1443 E-mail: info@itgi.org Web site: www.itgi.org ISBN 1-933284-74-9 IT Assurance Guide: Using COBIT® Printed in the United States of America IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org2 ACKNOWLEDGEMENTS 3© 2007 IT Governance Institute. All rights reserved. www.itgi.org ACKNOWLEDGEMENTS IT Governance Institute wishes to recognise: Project Managers and Thought Leaders Roger S. Debreceny, Ph.D., FCPA, University of Hawaii, USA Erik Guldentops, CISA, CISM, University of Antwerp Management School, Belgium Workshop Participants and Expert Reviewers Mark Adler, CISA, CISM, CIA, CISSP, Allstate Insurance Co., USA Peter Andrews, CISA, CITP, MCMI, PJA Consulting, UK Georges Ataya, CISA, CISM, CISSP, MSCS, PBA, Solvay Business School, Belgium Gary Austin, CISA, CIA, CISSP, CGFM, KPMG LLP, USA Gary S. Baker, CA, Deloitte & Touche, Canada David H. Barnett, CISM, CISSP, Applera Corp., USA Christine Bellino, CPA, CITP, Jefferson Wells, USA John W. Beveridge, CISA, CISM, CFE, CGFM, CQA, Massachusetts Office of the State Auditor, USA Alan Boardman, CISA, CISM, CA, CISSP, Fox IT, UK David Bonewell, CISA, CISSP-ISSEP, Accomac Consulting LLC, USA Dirk Bruyndonckx, CISA, CISM, KPMG Advisory, Belgium Don Caniglia, CISA, CISM, USA Luis A. Capua, CISM, Sindicatura General de la Nación, Argentina Boyd Carter, PMP, Elegantsolutions.ca, Canada Sean V. Casey, CISA, CPA, Ernst & Young LLP, USA Sushil Chatterji, Edutech, Singapore Ed Chavennes, CISA, Ernst & Young LLP, USA Christina Cheng, CISA, CISSP, SSCP, Deloitte & Touche LLP, USA Dharmesh Choksey, CISA, CPA, CISSP, PMP, KPMG LLP, USA Jeffrey D. Custer, CISA, CPA, CIA, Ernst & Young LLP, USA Beverly G. Davis, CISA, Federal Home Loan Bank of San Francisco, USA Peter De Bruyne, CISA, Banksys, Belgium Steven De Haes, University of Antwerp Management School, Belgium Philip De Picker, CISA, MCA, National Bank of Belgium, Belgium Kimberly de Vries, CISA, PMP, Zurich Financial Services, USA Roger S. Debreceny, Ph.D., FCPA, University of Hawaii, USA Zama Dlamini, Deloitte & Touche, South Africa Troy DuMoulin, Pink Elephant, Canada Bill A. Durrand, CISA, CISM, CA, Ernst & Young LLP, Canada Justus Ekeigwe, CISA, MBCS, Deloitte & Touche LLP, USA Rafael Fabius, CISA, República AFAP SA, Uruguay Urs Fischer, CISA, CIA, CPA (Swiss), Swiss Life, Switzerland Christopher Fox, ACA, USA Bob Frelinger, CISA, Sun Microsystems Inc., USA Zhiwei Fu, Ph. D, Fannie Mae, USA Monique Garsoux, Dexia Bank, Belgium Edson Gin, CISA, CFE, SSCP, USA Sauvik Ghosh, CISA, CIA, CISSP, CPA, Ernst & Young LLP, USA Guy Groner, CISA, CIA, CISSP, USA Erik Guldentops, CISA, CISM, University of Antwerp Management School, Belgium Gary Hardy, IT Winners, South Africa Benjamin K. Hsaio, CISA, Federal Deposit Insurance Corp., USA Tom Hughes, Acumen Alliance, Australia Monica Jain, CSQA, Covansys Corp., US Avinash W. Kadam, CISA, CISM, CBCP, CISSP, MIEL e-Security Pvt. Ltd., India John A. Kay, CISA, USA Lisa Kinyon, CISA, Countrywide, USA Rodney Kocot, Systems Control and Security Inc., USA Luc Kordel, CISA, CISM, CISSP, CIA, RE, RFA, Dexia Bank, Belgium Linda Kostic, CISA, CPA, USA John W. Lainhart IV, CISA, CISM, IBM, USA IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org4 Lynn Lawton, CISA, BA, FCA, FIIA, PII, KPMG LLP, UK Philip Le Grand, Capita Education Services, UK Elsa K. Lee, CISA, CISM, CSQA, AdvanSoft International Inc., USA Kenny K. Lee, CISA, CISSP, Countrywide SMART Governance, USA Debbie Lew, CISA, Ernst & Young LLP, USA Bjarne Lonberg, CISSP, A.P. Moller-Maersk A/S, Denmark Donald Lorete, CPA, Deloitte & Touche LLP, USA Addie C.P. Lui, MCSA, MCSE, First Hawaiian Bank, USA Charles Mansour, CISA, Charles Mansour Audit & Risk Service, UK Mario Micallef, CPAA, FIA, National Australia Bank Group, Australia Niels Thor Mikkelsen, CISA, CIA, Danske Bank, Denmark John Mitchell, CISA, CFE, CITP, FBCS, FIIA, MIIA, QiCA, LHS Business Control, UK Anita Montgomery, CISA, CIA, Countrywide, USA Karl Muise, CISA, City National Bank, USA Jay S. Munnelly, CISA, CIA, CGFM, Federal Deposit Insurance Corp., USA Orillo Narduzzo, CISA, CISM, Banca Popolare di Vicenza, Italy Sang Nguyen, CISA, CISSP, MCSE, Nova Southeastern University, USA Anthony Noble, CISA, CCP, Viacom Inc., USA Ed O’Donnell, Ph.D., CPA, University of Kansas, USA Sue Owen, Department of Veterans Affairs, Australia Robert G. Parker, CISA, CMC, FCA, Robert G. Parker Consulting, Canada Bart Peeters, PricewaterhouseCoopers LLP, Belgium Thomas Phelps IV, CISA, PricewaterhouseCoopers LLP, USA Vitor Prisca, CISM, Novabase, Portugal Claus Rosenquist, CISA, TrygVesata, Denmark Jaco Sadie, Sasol, South Africa Max Shanahan, CISA, FCPA, Max Shanahan & Associates, Australia Craig W. Silverthorne, CISA, CISM, CPA, IBM Business Consulting Services, USA Chad Smith, Great-West Life, Canada Gustavo A. Solis, CISA, CISM, Grupo Cynthus, Mexico Roger Southgate, CISA, CISM, FCCA, CubeIT Management Ltd., UK Paula Spinner, CSC, USA Mark Stanley, CISA, Toyota Financial Services, USA Dirk Steuperaert, CISA, PricewaterhouseCoopers, Belgium Robert E. Stroud, CA Inc., USA Scott L. Summers, Ph.D., Brigham Young University, USA Lance M. Turcato, CISA, CISM, CPA, City of Phoenix IT Audit Division, USA Ingvar Van Droogenbroeck, PricewaterhouseCoopers, Belgium Wim Van Grembergen, Ph.D., University of Antwerp Management School, Belgium Johan Van Grieken, CISA, Deloitte, Belgium Greet Volders, Voquals NV, Belgium Robert M. Walters, CISA, CPA, CGA, Office of the Comptroller General, Canada Tom Wong, CISA, CIA, CMA, Ernst & Young LLP, Canada Amanda Xu, CISA, PMP, KPMG LLP, USA The following professors and students for their work on the COBIT 4.1 control practices and assurance test steps Scott L. Summers, Ph.D., Brigham Young University, USA KeithBallante, Brigham Young University, USA David Butler, Brigham Young University, USA Phil Harrison, Brigham Young University, USA William Lancaster, Brigham Young University, USA Chase Manderino, Brigham Young University, USA Paul Schneider, Brigham Young University, USA Jacob Sperry, Brigham Young University, USA Brian Updike, Brigham Young University, USA ITGI Board of Trustees Everett C. Johnson, CPA, Deloitte & Touche LLP (retired), USA, International President Georges Ataya, CISA, CISM, CISSP, Solvay Business School, Belgium, Vice President William C. Boni, CISM, Motorola, USA, Vice President Avinash Kadam, CISA, CISM, CISSP, CBCP, GSEC, GCIH, Miel e-Security Pvt. Ltd., India, Vice President Jean-Louis Leignel, MAGE Conseil, France, Vice President Lucio Augusto Molina Focazzio, CISA, Colombia, Vice President Howard Nicholson, CISA, City of Salisbury, Australia, Vice President Frank Yam, CISA, FHKIoD, FHKCS, FFA, CIA, CFE, CCP, CFSA, Focus Strategic Group, Hong Kong, Vice President Marios Damianides, CISA, CISM, CA, CPA, Ernst & Young LLP, USA, Past International President Robert S. Roussey, CPA, University of Southern California, USA, Past International President Ronald Saull, CSP, Great-West Life and IGM Financial, Canada, Trustee IT Governance Committee Tony Hayes, FCPA, Queensland Government, Australia, Chair Max Blecher, Virtual Alliance, South Africa Sushil Chatterji, Edutech, Singapore Anil Jogani, CISA, FCA, Tally Solutions Limited, UK John W. Lainhart IV, CISA, CISM, IBM, USA Rómulo Lomparte, CISA, Banco de Crédito BCP, Peru Michael Schirmbrand, Ph.D., CISA, CISM, CPA, KPMG LLP, Austria Ronald Saull, CSP, Great-West Life and IGM Financial, Canada Assurance Committee Lynn C. Lawton, CISA, BA, FCA, FIIA, PII, KPMG LLP, UK Pippa G. Andrews, CISA, ACA, CIA, Amcor, Australia John Warner Beveridge, CISA, CISM, CFE, CGFM, Office of the Massachusetts State Auditor, USA Daniel Patrick Casciano, CISA, Ernst & Young LLP, USA Gregory T. Grocholski, CISA, The Dow Chemical Company, USA Avinash W. Kadam, CISA, CISM, CBCP, CISSP, MIEL e-Security Pvt. Ltd., India Anthony P. Noble, CISA, CCP, Viacom Inc., USA Gustavo A. Solis, Grupo Cynthus S.A. de C.V., Mexico Paul A. Zonneveld, CISA, CA, Deloitte & Touche, Canada Corresponding Member Robert G. Parker, CISA, CA, CMC, FCA, Canada COBIT Steering Committee Roger S. Debreceny, Ph.D., FCPA, University of Hawaii, USA, Chair Gary S. Baker, CA, Deloitte & Touche, Canada Dan Casciano, CISA, Ernst & Young LLP, USA Steven De Haes, University of Antwerp Management School, Belgium Peter De Koninck, CISA, CFSA, CIA, SWIFT SC, Belgium Rafael Fabius, CISA, República AFAP SA, Uruguay Urs Fischer, CISA, CIA, CPA (Swiss), Swiss Life, Switzerland Erik Guldentops, CISA, CISM, University of Antwerp Management School, Belgium Gary Hardy, IT Winners, South Africa Jimmy Heschl, CISA, CISM, KPMG LLP, Austria Debbie Lew, CISA, Ernst & Young LLP, USA Max Shanahan, FCPA, CISA, Max Shanahan & Associates, Australia Dirk Steuperaert, CISA, PricewaterhouseCoopers, Belgium Robert E. Stroud, CA Inc., USA ITGI Advisory Panel Ronald Saull, CSP, Great-West Life and IGM Financial, Canada, Chair Roland Bader, F. Hoffmann-La Roche AG, Switzerland Linda Betz, IBM Corporation, USA Jean-Pierre Corniou, Renault, France Rob Clyde, CISM, Symantec, USA Richard Granger, NHS Connecting for Health, UK Howard Schmidt, CISM, R&H Security Consulting LLC, USA Alex Siow Yuen Khong, StarHub Ltd., Singapore Amit Yoran, Yoran Associates, USA ACKNOWLEDGEMENTS 5© 2007 IT Governance Institute. All rights reserved. www.itgi.org ITGI Affiliates and Sponsors ISACA chapters American Institute of Certified Public Accountants ASIS International The Center for Internet Security Commonwealth Association of Corporate Governance FIDA Inform Information Security Forum The Information Systems Security Association (ISSA) Institut de la Gouvernance des Systèmes d’Information Institute of Management Accountants ISACA ITGI Japan Solvay Business School University of Antwerp Management School Aldion Consulting Pte. Ltd. CA Hewlett-Packard IBM ITpreneurs Nederlands BV LogLogic Inc. Phoenix Business and Systems Process Inc. Project Rx Inc. Symantec Corporation Wolcott Group LLC World Pass IT Solutions IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org6 TABLE OF CONTENTS 7© 2007 IT Governance Institute. All rights reserved. www.itgi.org TABLE OF CONTENTS 1. Introduction ......................................................................................................................................................9 Objectives of the Guide......................................................................................................................................9 Summary Overview of COBIT ...........................................................................................................................9 Target Audience................................................................................................................................................11 COBIT Guidance for IT Assurance Activities ..................................................................................................12 Components of IT Assurance Guide................................................................................................................12 Relationship With COBIT Control Practices....................................................................................................14 Document Road Map.......................................................................................................................................15 How to Use This Guide....................................................................................................................................15 2. IT Assurance Principles and Context ..........................................................................................................17 Introduction ......................................................................................................................................................17 Assurance Approach and Road Map ...............................................................................................................18 Relevant General Standards and Guidance .....................................................................................................22 Relevance for IT Assurance.............................................................................................................................23 3. Assurance Planning........................................................................................................................................25 Introduction ......................................................................................................................................................25 IT Assurance Universe .....................................................................................................................................25 Risk-based Assurance Planning.......................................................................................................................27 High-level Assessments ...................................................................................................................................29 Define the Scope and Objectives of the Assurance Initiative.........................................................................29 4. IT Resource and Control Scoping................................................................................................................31 Introduction ......................................................................................................................................................31 Steps in Scoping IT Resources and Control Objectives .................................................................................31 IT-related Business Goals and IT Goals..........................................................................................................33 5. Assurance Initiative Execution .....................................................................................................................35 Introduction ......................................................................................................................................................35 Step 1—Refine Understanding........................................................................................................................35 Step 2—Refine Scope......................................................................................................................................35 Step 3—Test the Control Design .....................................................................................................................36 Step 4—Test the Outcome of the Control Objectives.....................................................................................37 Step 5—Document the Impact of Control Weaknesses..................................................................................37 Step 6—Develop and Report Overall Conclusion and Recommendations....................................................38 6. Assurance Guidance for COBIT Processes and Controls ..........................................................................39 Introduction ......................................................................................................................................................39 Generic Process Controls.................................................................................................................................39 Generic Control Practices ................................................................................................................................39 IT General Controls .........................................................................................................................................40 Application Controls ........................................................................................................................................40 Examples of the Use of Detailed Assurance Steps .........................................................................................41 7. How COBIT Components Support IT Assurance Activities ......................................................................43 Introduction ......................................................................................................................................................43 COBIOBIT Components .........................................................................................................................................43 IT Assurance Activities ....................................................................................................................................44 The Strongest Links .........................................................................................................................................44 Appendix I—Process Control (PC)..................................................................................................................45 Process Assurance Steps ..................................................................................................................................45 Appendix II—Plan and Organise (PO) ...........................................................................................................51 Process Assurance Steps ..................................................................................................................................51 Appendix III—Acquire and Implement (AI) ...............................................................................................115 Process Assurance Steps ................................................................................................................................115 Appendix IV—Deliver and Support (DS) .....................................................................................................153 Process Assurance Steps ................................................................................................................................153 Appendix V—Monitor and Evaluate (ME) ..................................................................................................225 Process Assurance Steps ................................................................................................................................225 Appendix VI—Application Control (AC)......................................................................................................253 Process Assurance Steps ................................................................................................................................253 Appendix VII—Maturity Model for Internal Control ................................................................................263 Appendix VIII—IT Scoping ...........................................................................................................................265 Appendix IX—COBIT and Related Products ...............................................................................................269 IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org8 IN T R O D U C T IO N I N T R O D U C T I O N INTRODUCTION 9© 2007 IT Governance Institute. All rights reserved. www.itgi.org 1. INTRODUCTION OBJECTIVES OF THE GUIDE The objective of IT Assurance Guide is to provide guidance on how to use COBIT to support a variety of IT assurance activities. If the organisation is already using COBIT as a framework for IT governance, it will enable the leverage of COBIT when planning and performing assurance reviews, so that the business, IT and assurance professionals are aligned around a common framework and common objectives. This guide is designed to enable efficient and effective development of IT assurance initiatives, providing guidance on planning, scoping and executing assurance reviews using a road map based on well-accepted assurance approaches. Guidance is also provided on how the COBIT resources can be used during these stages supported by detailed tests based on COBIT’s processes and control objectives. The guidance and suggested tests, like all the COBIT resources, are not intended to be prescriptive, but should be tailored to suit the specific assurance initiative. This guide is aimed primarily at assurance professionals, but may be of interest to IT professionals and advisors. SUMMARY OVERVIEW OF COBIT Control Objectives for Information and related Technology (COBIT) is a comprehensive set of resources that contains all the information organisations need to adopt an IT governance and control framework. COBIT provides good practices across a domain and process framework in a manageable and logical structure to help optimise IT-enabled investments and ensure that IT is successful in delivering against business requirements. COBIT contributes to enterprise needs by: • Making a measurable link between the business requirements and IT goals • Organising IT activities into a generally accepted process model • Identifying the major IT resources to be leveraged • Defining the management control objectives to be considered • Providing tools for management: – Goals and metrics to enable IT performance to be measured – Maturity models to enable process capability to be benchmarked – Responsible, Accountable, Consulted and Informed (RACI) charts to clarify roles and responsibilities COBIT is focused on what is required to achieve adequate governance, management and control of IT, and is positioned at a high level. COBIT has been aligned and harmonised with other, more detailed IT frameworks, standards and best practices. COBIT acts as an integrator of these differentguidance materials, summarising key objectives under one umbrella framework that also links to governance and business requirements. In this context, the Committee of Sponsoring Organisations of the Treadway Commission (COSO) Internal Control Framework and similar compliant frameworks are generally seen as the internal control frameworks for enterprises. COBIT is generally seen as the management and control framework for IT. The benefits of implementing COBIT as a governance framework over IT include: • Better alignment of business and IT, based on a business focus • Shared understanding amongst all stakeholders, based on a common language • An understandable view of what IT does for business management • Clear ownership and responsibilities, based on a process orientation • Widespread acceptance by third parties and regulators • Fulfilment of the COSO requirements for the IT control environment The COBIT framework is summarised in figure 1. The COBIT products have been organised into three levels designed to support: • Boards of directors and executive management • Business and IT management • Governance, assurance, control and security professionals Figure 2 illustrates the COBIT products within the IT governance body of knowledge aimed at each of these three levels. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org10 PO1 Define a strategic IT plan. PO2 Define the information architecture. PO3 Determine technological direction. PO4 Define the IT processes, organisation and relationships. PO5 Manage the IT investment. PO6 Communicate management aims and direction. PO7 Manage IT human resources. PO8 Manage quality. PO9 Assess and manage IT risks. PO10 Manage projects. AI1 Identify automated solutions. AI2 Acquire and maintain application software. AI3 Acquire and maintain technology infrastructure. AI4 Enable operation and use. AI5 Procure IT resources. AI6 Manage changes. AI7 Install and accredit solutions and changes. DS1 Define and manage service levels. DS2 Manage third-party services. DS3 Manage performance and capacity. DS4 Ensure continuous service. DS5 Ensure systems security. DS6 Identify and allocate costs. DS7 Educate and train users. DS8 Manage service desk and incidents. DS9 Manage the configuration. DS10 Manage problems. DS11 Manage data. DS12 Manage the physical environment. DS13 Manage operations. ME1 Monitor and evaluate IT performance. ME2 Monitor and evaluate internal control. ME3 Ensure compliance with external requirements. ME4 Provide IT governance. Effectiveness Efficiency Confidentiality Integrity Availability Compliance Reliability INFORMATION CRITERIA ACQUIRE AND IMPLEMENT DELIVER AND SUPPORT MONITOR AND EVALUATE PLAN AND ORGANISE Applications Information Infrastructure People IT RESOURCES BUSINESS OBJECTIVES GOVERNANCE OBJECTIVES COBIT Figure 1—COBIT Framework INTRODUCTION 11© 2007 IT Governance Institute. All rights reserved. www.itgi.org For more details on each product, see appendix X, COBIT and Related Products. For the most complete and up-to-date information on COBIT and related products, case studies, training opportunities, newsletters and other COBIT-specific information, visit www.isaca.org/cobit. TARGET AUDIENCE This IT Assurance Guide provides detailed guidance for assurance and IT professionals on how COBIT can be used to support a variety of assurance activities for each of the 34 IT processes. Assurance steps and advice are provided for: • Generic controls that apply to all processes (identified within the COBIT framework by a PCn identifier) • Application controls (identified within the COBIT framework by an ACn identifier) • Specific process controls (identified within the COBIT framework by domain identification and process number, e.g., PO6.3, AI4.1) Assurance steps and guidelines are provided to: • Test the control design of the control objective • Test the outcome of the control objective (operational effectiveness) • Document control weaknesses and their impact It is assumed that users of this guide are familiar with the concepts of COBIT and have a level of knowledge equivalent to at least the COBIT foundation level (which can be tested online to obtain the COBIT® Foundation Certificate). If this is not the case, it is recommended that the reader undertake the COBIT Foundation CourseTM. Information on these opportunities is available from education@isaca.org and at www.isaca.org/cobitcampus. The guide also assumes that the readers are familiar with assurance concepts in general. Maturity models Management guidelines Board Briefing on IT Governance, 2nd EditionHow does the board exercise its responsibilities? Executives and Boards How do we measure performance? How do we compare to others? And how do we improve over time? Business and Technology Management What is the IT governance framework? How do we assess the IT governance framework? How do we implement it in the enterprise? Governance, Assurance, Control and Security Professionals IT Governance Implementation Guide, 2nd Edition COBIT Control Practices, 2nd Edition Control objectives IT Assurance GuideCOBIT and Val IT TM frameworks Key management practices This COBIT-based product diagram presents the generally applicable products and their primary audience. There are also derived products for specific purposes (IT Control Objectives for Sarbanes-Oxley, 2nd Edition), for domains such as security (COBIT Security Baseline and Information Security Governance: Guidance for Boards of Directors and Executive Management), or for specific enterprises (COBIT Quickstart for small and medium-sized enterprises or for large enterprises wishing to ramp up to a more extensive IT governance implementation). Figure 2—Major COBIT-based Products COBIT GUIDANCE FOR IT ASSURANCE ACTIVITIES The COBIT framework, represented in figure 3, provides the basis for two guides: • IT Governance Implementation Guide: Using COBIT ® and Val IT TM, 2nd Edition, which provides a road map and process guidance on how to implement IT governance using the COBIT resources • IT Assurance Guide: Using COBIT, which provides professional guidance for the assurance team and offers a structured assurance approach linked to the COBIT framework that business and IT professionals can understand As seen in figure 3, each guide is fed with different inputs. The IT Governance Implementation Guide leverages COBIT Control Practices, whilst the IT Assurance Guide is based on assurance steps. The two inputs (control practices and assurance steps) are considered mutually exclusive, allowing the guides’ users to focus on either part of the IT governance process (implementation or assurance). IT Assurance Guide provides assurance advice at different levels. At the process level, process-specific advice is provided on how to test whether control objectives are being achieved and on how to document control weaknesses. At the control objective level, assurance steps are provided to test the control design for each specific control objective based on its control practices. This detailed guidance can be found in appendices I through VI. In chapter 6, Assurance Guidance for COBIT Processes and Controls, some examples can be found on how the detailed guidance can be leveraged for a specific assurance initiative. At the different levels, generic advice is also provided. Generic advice applies to all processes or control objectives and can be used in addition to, or as an alternative to, the specific advice. These processes are further described in chapter 6. For the testing steps of the execution stage, this guide provides generic guidance as well as specific, more detailed guidance to assist the IT assurance professional. Generic advice means that it can be applied to any process, control objective or control practice depending on the type of advice. Specific advice refers to adviceprovided for a specific process, control objective or control practice. An overview of the IT assurance framework that underpins this process is shown in figure 4. COMPONENTS OF IT ASSURANCE GUIDE The content of the detailed assurance guidance is organised around the 34 COBIT processes and contains the following components: • Control objectives—Increasingly, organisations are recognising that control of IT is critical for ensuring that IT delivers value to the organisation, risks are managed, regulatory requirements are met, and investments in IT deliver a reasonable return. IT control objectives are statements of the desired result or purpose to be achieved by implementing control practices in a particular IT process and often relate directly to specific activities within the process. COBIT’s control objectives are high-level requirements to be considered for effective control of each IT process. They are written as short, action-oriented management practices. Wherever possible, they follow a logical life cycle sequence. Enterprise management has choices relative to control objectives. Members of management should: – Select applicable control objectives – Balance the investment required to implement management practices required to achieve each control objective with the risk that arises in not achieving it IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org12 Board Briefing* Executive Baseline for IT Governance (in development) IT Governance Implementation Guide: Using COBIT and Val IT, 2nd Edition Board Briefing* Audit Director Baseline for IT Governance (future development) IT Assurance Guide: Using COBIT Framework Control Objectives Management Guidelines Maturity Models Control Objective Value Risk COBIT Control Practices, 2nd Edition Assurance Steps WHAT HOW HOW Figure 3—Implementation and Assurance Guides * Board Briefing on IT Governance, 2nd Edition – Decide which control practices to implement – Choose how to implement each control practice COBIT’s more than 200 control objectives define what needs to be managed in each IT process to address business requirements and manage risk. They help to define clear policies, foster good practices for IT controls and encourage process ownership. They also provide the reference point for linking good practices to business requirements. Constructed by harmonising more than 40 different control guidance sources, COBIT can be integrated with other standards and practices that focus on specific areas, such as the ISO/IEC 27000 series on information security-related standards, ISO/IEC 9001:2000 Quality Management Systems— Requirements, IT Infrastructure Library (ITIL), Capability Maturity Model® Integration (CMMI®), Projects in Controlled Environments 2 (PRINCE2) and A Guide to the Project Management Body of Knowledge® (PMBOK®). • Value and risk drivers—Value and risk drivers provide valuable inputs to professionals for use in communicating a business justification for achieving particular control objectives and implementing associated control practices. The value drivers provide examples of the business benefits that can result from good control, whilst the risk drivers provide examples of the risks that may need to be avoided or mitigated. They provide to assurance professionals and IT governance implementors the argument for implementing controls and substantiate the impact of not implementing them. • Assurance testing steps—The assurance testing steps provide guidance at the control objective level for assurance professionals conducting an IT assurance process. The steps are derived from the control practices, which, in turn, are derived from each control objective. The assurance testing steps: – Evaluate the design of the controls – Confirm that controls are placed in operation – Assess the operational effectiveness of the control These different testing steps are elaborated in more in detail in chapter 6, Assurance Guidance for COBIT Processes and Controls. Generic assurance steps cover the existence and design effectiveness of the proposed control design as well as the associated responsibilities. Specific assurance steps test the effective operation of controls and are stated at the control objective level. In addition, assurance steps are provided to test the outcomes of control weakness or failure. The assurance testing steps are designed to provide the first level of the development of an assurance programme by an internal or external assurance professional. The objective is not to provide a detailed assurance programme that can be used as is and executed. Rather, the intent is for an assurance professional with some experience to use it as the basis for efficiently developing customised assurance programmes that can be used and executed by staff members with less experience. The assurance professional should take the testing steps as a foundation for implementing the assurance initiative. He/she should adjust the testing steps for the reality of the organisation and the objectives of the assurance initiative. The steps are guidance only—they are not a cookbook. The combination of all assurance components provides a testing method to assist in forming opinions against assurance objectives by combining one or more of the following test types: • Enquire (via a different source) and confirm. • Inspect (via walk-through, search, compare and review). INTRODUCTION 13© 2007 IT Governance Institute. All rights reserved. www.itgi.org Generic ( ) and Specific ( ) Advice in the Assurance Guide Documented Control Weaknesses improved with assessed with derived by assessed with implemented with derived from controlled by Testing the Control Objective Outcome Control Objectives Testing the Control Design of the Control Objectives Control Practices IT Processes Figure 4—Overview of the IT Assurance Advice Provided • Observe (i.e., confirmation through observation). • Reperform or recalculate and analyse (often based on a sample). • Collect (e.g., sample, trace, extract) and analyse automated evidence. RELATIONSHIP WITH COBIT CONTROL PRACTICES IT Assurance Guide is part of the COBIT family of products. The assurance test steps have been derived from the COBIT ® Control Practices: Guidance to Achieve Control Objectives for Successful IT Governance, 2nd Edition, and are expressed in a form usable by assurance professionals for testing activities. COBIT Control Practices extends the capabilities of the COBIT framework and provides an additional level of detail. The COBIT IT processes, business requirements and control objectives define what needs to be done to implement an effective control structure. COBIT Control Practices provides the more detailed guidance at the control objective level on how to achieve the objectives. The control practices consist of the following elements for each of the COBIT control objectives: • Value and risk drivers, providing ‘why do it’ guidance • Control practices to be considered when assessing IT processes and implementing improvements For each of the control objectives, a list of specific control practices is defined. In addition, three generic control practices are defined, which are applicable to all control objectives. The complete set of generic and specific control practices provides one control approach, consisting of practices that are necessary for achieving the control objective. They provide high-level generic guidance, at a more detailed level under the control objective, for assessing process maturity, considering potential improvements and implementing the controls. They do not describe specific solutions, and further guidance may need to be obtained from specific, relevant standards and best practices, such as ITIL or PRINCE2. The control practices meet the following design criteria in that they: • Are relevant to the purpose of the control objective • Can be executed in a timely fashion •Are realistic and cost-effective • Are measurable • Provide for a definition of the roles involved and segregated roles, where appropriate • Are action-oriented • Are life-cycle-based, wherever possible Control practices help ensure that the solutions put forward are more likely to be completely and successfully implemented, by providing guidance on why controls are needed and what the good practices are for meeting specific control objectives. The control practices are designed to support two audiences: • Implementors of IT governance (e.g., management, service providers, end users, control professionals) • Assurance professionals (e.g., internal and external assurance professionals) For assurance purposes, all the control practices were used to develop detailed assurance steps. The assurance testing steps are designed to provide the first stage of the development of an assurance programme by an internal or external assurance professional. Therefore, professionals using this assurance guide need to take into account that the assurance steps are derived from the control practices. The control practices themselves are not provided in this guide. The table in figure 5 provides an overview of the control material that is provided by COBIT and forms the basis for the assurance material in this guide. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org14 Figure 5—Control Objectives and Control Practices CONTROL Control Objectives Control Practices The COBIT framework provides six process When translating control objectives into practices, controls that apply to each process. When the first steps are always the same and cover reviewing a process, these control objectives designing, recording and communicating theGeneric and the associated practices and assurance steps approach for achieving the objective, and should be added to the specific control assigning responsibility and accountability for objectives material. making it happen. For each process, a number of specific control COBIT provides specific practices for each objectives are provided in the COBIT framework. control objective. Together with the generic Specific practices they provide a control design consisting of the necessary and sufficient steps to achieve the control objective. The table in figure 6 describes the assurance material that is derived from the COBIT control material and provided in this guide. Finally, additional advice is provided on testing the six application controls (as provided in COBIT), again addressing design, outcome and impact testing. COBIT, and many of its supporting products, provides detailed support in a wide range of IT assurance activities. DOCUMENT ROAD MAP The main sections of this document follow the structure of a suggested IT assurance road map. That road map will be explained in more detail in chapter 2, IT Assurance Principles and Context. The main sections or titles of this road map are: • Planning • Scoping • Execution, including: – Refining the understanding of the IT assurance subject – Refining the scope of key control objectives – Testing the effectiveness of control design – Testing the outcomes of key control objectives – Documenting the impact of control weaknesses – Developing/communicating conclusions and recommendations Planning is elaborated in chapter 3, Assurance Planning. Scoping is addressed in chapter 4, IT Resource and Control Scoping, and chapter 5, Assurance Initiative Execution, addresses all of the execution steps. Chapter 6, Assurance Guidelines for COBIT Processes and Controls, explains the structure of the assurance guidance provided for the COBIT processes and control objectives. Chapter 7 explains how COBIT components support IT assurance activities. Appendices I-VI provide the actual assurance tests. HOW TO USE THIS GUIDE Even though COBIT has a wide potential audience and can be used by many within an organisation, this guide is particularly intended for internal and external assurance professionals. INTRODUCTION 15© 2007 IT Governance Institute. All rights reserved. www.itgi.org Figure 6—Linking General and Specific Advice to Classes of IT Assurance ASSURANCE Testing the Testing Control Documenting Control Design Process Outcome Control Weaknesses The generic control practices In addition or as an alternative As an alternative or in addition are translated into assurance to testing the control design, to the specific advice, some steps based on a standard set the outcome of a control standard approaches to of assurance methods. objective can be tested. Some documenting and putting Generic standard approaches to looking control weaknesses in context for evidence are provided that are provided, largely focused apply to any process. on identifying comparative data (e.g., benchmarks, measurements, cases). The specific control practices For each process, a number of For each process, specific are also translated into assurance steps are provided to advice is provided on how to assurance steps. Combined with test the outcome of the control document control weaknesses, Specific the generic practices assurance objectives of the process. The relating to the goals, metrics, steps, they provide a complete generic advice can be used as activities and control objectives test of the control design of an alternative or to complement of the process. the objective. the specific advice. A major benefit of this guide is that users can rely on the consistency of the COBIT framework and its related products. The COBIT framework is increasingly being used as an IT governance framework, helping align business and IT management and providing a basis for improving IT’s performance. If assurance professionals base their reviews on the same framework as business and IT managers who are improving IT governance and IT performance, everyone involved will be using a common language and it will be easier to agree and implement any necessary control improvements. This guide can be used by the assurance professional for many different purposes, including: • Obtaining a view on current good practices on assurance and testing principles • Learning how using different COBIT components and related concepts can help in planning and scoping assurance initiatives • Having available a comprehensive reference of all COBIT control objectives and supporting control practices and how they can be tested to obtain assurance that they are effective IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org16 I T A S S U R A N C E P R I N C I P L E S A N D C O N T E X T IT A SSU R A N C E P R IN C IP L E S A N D C O N T E X T IT ASSURANCE PRINCIPLES AND CONTEXT 17© 2007 IT Governance Institute. All rights reserved. www.itgi.org 2. IT ASSURANCE PRINCIPLES AND CONTEXT INTRODUCTION This section describes the overall principles, components and context of IT assurance and explores the IT assurance road map, providing a high-level description of the major steps involved. The objective of IT Assurance Guide is not to provide detailed assurance guidelines. Instead, the objective is to provide high-level guidance on conducting assurance initiatives, and explain briefly a number of fundamental principles for understanding assurance and some related techniques and contributory activities. Formal standards such as the International Auditing and Assurance Standards Board’s (IAASB’s) International Framework for Assurance Engagements (IAASB Assurance Framework) may be referenced. However, in this manual, ‘assurance’ is the term used consistently, as it is broader than the term ‘audit’. Assurance also covers evaluation activities not governed by internal and/or external audit standards. To be called an assurance initiative, five components must be present, as prescribed in the IAASB Assurance Framework and as listed in figure 7. The objective of an assurance initiativeis for an assurance professional to measure or evaluate a subject matter that is the responsibility of another party. For IT assurance initiatives, there is generally also a stakeholder involved who uses the subject matter but who has delegated operation and custodianship of the subject matter to the responsible party. Hence, the stakeholder is the end customer of the evaluation and can approve the criteria of the evaluation with the responsible party and the assurance professional. The conclusion of the evaluation provides an opinion as to whether the subject matter meets the needs of the stakeholder. Figure 8 summarises the relationships in an assurance initiative. 1 2 3 4 5 A three-party relationship involving a responsible party for the subject matter, an assurance professional, and an intended user of the assurance report A subject matter over which the assurance is to be provided (i.e., data, systems, processes) Suitable criteria against which the subject matter will be assessed (i.e., standards, benchmarks, legislation) A process that the assurance professional will undertake A conclusion issued by the assurance professional Figure 7—The Five Components of an Assurance Initiative Stakeholder accepts accepts accepts manages manages uses relies on uses reviews against criteria reports Su ita bl e cr ite ria fo r t he as su ra nc e in iti at iv e Responsible Party Assurance Professional ConclusionSubjectMatter Business Process Assurance Process Figure 8—Relationships in the Assurance Initiative ASSURANCE APPROACH AND ROAD MAP IT Assurance Road Map To provide assurance, it is important to follow a consistent methodology or approach. Whilst the specific approach may be unique to each organisation and type of initiative, for the purposes of this guide a fairly common approach is used. It is based on three stages: planning, scoping and execution, with the final stage broken down into six steps. The stages and steps of the road map are presented in figure 9. For more significant assurance initiatives, additional information on breaking down the initiative into objectives, actions and deliverables can be found in appendix VIII, IT Scoping. This breakdown provides more detailed guidance that can be applied to IT assurance activity scoping and IT control scoping. PLANNING The establishment of the IT assurance universe for the assurance assignment serves as the beginning of every assurance initiative. To create a comprehensive plan, the assurance professional needs to combine an understanding of the IT assurance universe and the selection of an appropriate IT control framework, such as COBIT. The aggregation of these two allows for risk-based planning of the assurance initiative. To set the correct assurance objectives, first a high-level assessment needs to be performed. The end deliverable of this stage is the IT assurance plan (usually annual). SCOPING The scoping process can be performed in three different ways: • The most detailed scoping approach starts from defining business and IT goals for the environment under review and identifying a set of IT processes and resources (i.e., assurance universe) required to support those goals. The goals that are subject to the IT assurance initiative can be scoped down to a lower granularity (i.e., key control objectives customised for the organisation). • A high-level scoping approach may start from benchmarking research executed by ITGI, providing generic guidelines on the relationship of business goals, IT goals and IT processes, as described in COBIT. This generic cascade of goals and processes can be used as a basis for more detailed scoping, as required for the specific environment being assessed. • A hybrid scoping approach combines the detailed and high-level methods. This approach starts from the generic cascade of goals and processes, but is adapted and modified to the specific environment before continuing the scoping to more detailed levels. The end deliverables of this stage are the scope and objectives of the different IT assurance initiatives. EXECUTION The third stage of the IT assurance road map is the execution stage. Figure 10 describes an approach that assurance professionals can follow as they execute a particular assurance initiative. These steps cover the core testing activities that the assurance professional executes. Chapter 5, Assurance Initiative Execution, describes each of the steps in more detail. The end deliverable of this stage is the conclusion of the individual IT assurance initiative. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org18 Business goals IT goals Key IT processes and key IT resources Key control objectives Customised key control objectives • Establish the IT assurance universe. • Select an IT control framework. • Perform risk-based IT assurance planning. • Perform high-level assessments. • Scope and define the high-level objectives for the initiative. Refine the understanding of the IT assurance subject. Refine scope of key control objectives for the IT assurance subject. Test the effectiveness of the control design of the key control objectives. Alternatively/ additionally test the outcome of the key control objectives. Document the impact of control weaknesses. Develop and communicate overall conclusion and recommen- dations. SCOPING PLANNING EXECUTING ASSURANCE CONCLUSION DETAILED SCOPE AND OBJECTIVES IT ASSURANCE PLANS Figure 9—IT Assurance Road Map IT ASSURANCE PRINCIPLES AND CONTEXT 19© 2007 IT Governance Institute. All rights reserved. www.itgi.org IT Assurance Activities The approach presented in the previous section, IT Assurance Road Map, describes the stages and steps for providing assurance services and provides the structure for this guide. Some of the typical IT assurance activities that may be performed under each of these assurance approach stages are listed in figure 11. Figure 11 introduces the typical assurance activities that can be used—and for which advice is provided—in the different stages and steps of the IT assurance road map. Sometimes the step is the activity; sometimes an activity can be leveraged in several steps. Whilst most of the advice in this guide focuses on the execution stage of the road map in figure 12 and Chapter 7, How COBIT Components Support IT Assurance Activities, additional advice is provided for the assurance activities listed, by identifying the COBIT components that can provide a particular benefit for each of these activities. All IT assurance initiatives include most of these activities; therefore, most of the COBIT components can be leveraged in all types of IT-related assurance initiatives. Figure 12 demonstrates a linkage between assurance activities and where COBIT components can provide a particular benefit. In addition, chapter 7, How COBIT Components Support IT Assurance Activities, provides suggestions on how the different COBIT components can be leveraged to improve the effectiveness and/or efficiency of different IT assurance activities. Refine the understanding of the IT assurance subject. Refine scope of key control objectives for the IT assurance subject. Test the effectiveness of the control design of the key control objectives. Alternatively/ additionally test the outcome of the key control objectives. Document the impact of control weaknesses. Develop and communicate overall conclusion and recommen- dations. Figure 10—Execution Road Map Figure 11—IT Assurance Activities • Plan: – Perform a quick risk assessment. – Assess threat, vulnerability and business impact. – Diagnose operational and project risk. – Plan risk-based assurance initiatives. – Identify critical IT processes based on valuedrivers. – Assess process maturity. • Scope: – Scope and plan assurance initiatives. – Select the control objectives for critical processes. – Customise control objectives. • Execute: 1. Refine the understanding of the IT assurance subject: – Identify/confirm critical IT processes. – Self-assess process maturity. 2. Refine the scope of the key control objectives for the IT assurance subject: – Update the control objective selection. – Customise control objectives. – Build a detailed audit programme. 3. Test the effectiveness of the control design of the key control objectives: – Test and evaluate controls. – Update/assess process maturity. 4. Test the outcome of the key control objectives: – Self-assess controls. – Test and evaluate controls. 5. Document the impact of control weaknesses: – Diagnose residual operational and/or project risk. – Substantiate risk. 6. Develop and communicate overall conclusion and recommendations: – Report assurance conclusions. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org20 F ig u re 1 2— A ss u ra n ce A ct iv it ie s L in ke d t o C O B IT C o m p o n en ts IT As su ra nc e Ac tiv iti es Pe rfo rm a q ui ck ri sk a ss es sm en t. � � � � � � � � � As se ss th re at , v ul ne ra bi lit y an d � � � � � � bu si ne ss im pa ct . Di ag no se o pe ra tio na l a nd /o r � � � � � � � pr oj ec t r is k. Pl an ri sk -b as ed a ss ur an ce in iti at iv es . � � � � � � � � � � � � Id en tif y cr iti ca l I T pr oc es se s ba se d � � � � � � � � � � � on v al ue d riv er s. As se ss p ro ce ss m at ur ity . � � � � � � � � � Sc op e an d pl an a ss ur an ce in iti at iv es . � � � � � � � Se le ct th e co nt ro l o bj ec tiv es fo r � � � � � � cr iti ca l p ro ce ss es . Cu st om is e co nt ro l o bj ec tiv es . � � � � � � � � Bu ild a d et ai le d as su ra nc e pr og ra m m e. � � � � � � � � Te st a nd e va lu at e co nt ro ls . � � � � � � � � Su bs ta nt ia te ri sk . � � � � � � � � � � � � Re po rt as su ra nc e co nc lu si on s. � � � � � � � � � � � � � Se lf- as se ss p ro ce ss m at ur ity . � � � � � � � � � Se lf- as se ss c on tro ls . � � � � � � � � Control Objectives COBIT Control Practices Value and Risk Statement Maturity Model Maturity Model Attributes RACI (Key Activities and Responsibilities) Goals and Outcome Measures Performance Drivers Management Awareness Tool Information Criteria Process List Board Briefing on IT Governance,2 nd Edition ITRisk and Control Diagnostics COBITQuickstart COBIT Online—Searching and Browsing COBIT Online— Benchmarking IT Control Objectives for Sarbanes-Oxley,2 nd Edition CO BI T Co m po ne nt s Reference to Other Assurance Models Assurance professionals may be familiar with the standards set by organisations, such as IAASB within the International Federation of Accountants (IFAC). IAASB has defined within its International Standards on Auditing stages of conducting an assurance engagement in the context of the financial statement audit. Whilst these stages are specifically defined for the purposes of financial statement audits, they are consistent with the suggested IT assurance processes in this guide. This is illustrated in figure 13. IT ASSURANCE PRINCIPLES AND CONTEXT 21© 2007 IT Governance Institute. All rights reserved. www.itgi.org De te rm in e th e re sp on si bl e pa rt y an d in te nd ed u se r of as su ra nc e ou tp ut . De te rm in e th e na tu re o f t he su bj ec t m at te r. De fin e an d ag re e on ev al ua tio n cr ite ria . Co lle ct e vi de nc e. As se ss e vi de nc e. M ak e ju dg em en t. Re po rt a nd c on cl ud e. Assurance Stages (IAASB) Planning � � � Scoping � Refine the understanding of the IT assurance subject. � � � Refine the scope of key control objectives. � Test the effectiveness of the control design. � � Test outcomes of key control objectives. � � Document the impact of control weaknesses. � � Develop and communicate the overall conclusion and recommendations. � � Ex ec ut io n St ag es in th e Ro ad M ap The first two steps of the execution stage refine the analysis of the planning and scoping stages and, therefore, map in the same manner to the IAASB standard. For internal assurance, the planning activity is considered to be the annual plan activity and ‘refining the plan’ refers to planning aspects of individual assignments; whereas, for external audit, these two levels of planning may happen at the same time. The suggested approach for IT assurance is to make a clear distinction amongst: • Testing the design of a control objective • Testing the outcome of a control objective • Documenting the impact of the weaknesses identified Each of these three steps deals with collecting and assessing evidence, but in a different manner. Type of Assurance Advice Provided For the testing steps of the execution stage, this guide provides generic guidance as well as more specific advice to assist the IT assurance professional, as shown in figure 14. The graphic summarises relationships amongst the key COBIT components (process, control objective and control practice) with the steps in the IT assurance road map. Generic advice means that it can be applied to any process, control objective or control practice depending on the type of advice. Specific advice refers to advice provided for a specific process, control objective or control practice. The Historical Context—Statutory Audit (Financial Statement Audit) It is important to understand that, historically, IT assurance started in support of financial statement audits. This class of assurance is still of great relevance, especially in light of the US Sarbanes-Oxley Act and similar regulations internationally. The purpose of a financial audit is, typically, to express an opinion on financial statements, notably in respect of the following assertions: • Existence or occurrence of the assets/liabilities/transactions reflected in the financial statements • Completeness of all financial information presented • Rights, obligations and relevant commitments appropriately presented in the financial statements • Valuation or allocation of the value of financial statement captions on a fair and consistent basis • Presentation and disclosure of values in the appropriate captions of the financial statements and relevant accounting principles or additional information to help ensure correct interpretation Figure 13—Correlation of IT Assurance and Assurance Stages Together, these assertions, when met, allow the auditor to form and report an opinion on the financial condition of the related entity. RELEVANT GENERAL STANDARDS AND GUIDANCE Current recognised guidelines for the external financial statement audit process are embodied in the International Standards on Auditing (ISA).1 ISA 315 sets out the requirements of the assurance professional to obtain an understanding of internal control relevant to the audit, which includes the following components: • The control environment • The entity’s risk assessment process • The information system, including the related business processes relevant to financial reporting, and communication • Control activities • Monitoring of controls The ISA recognises that, generally speaking, IT provides potential benefits of effectiveness and efficiency for an entity’s internal control, but also that it poses specific risks. With respect to IT, the financial statement assertions can be translated into the following information processing objectives: • Completeness • Accuracy • Validity • Restricted access The minimum requirement for the assurance professional isto understand the information systems underpinning business processes relevant for financial reporting and how the entity has responded to risks arising from IT. Since the use of IT affects the way control activities are implemented in the business and related financial reporting, the assurance professional needs to consider whether the entity has responded adequately to the risks arising from IT by establishing effective general IT controls and application controls. The ISA define general IT controls as policies and procedures that relate to many applications and support the effective functioning of application controls by helping to ensure the continued proper operation of information systems. General IT controls are categorised in the ISA as follows: • Data centre and network operations • System software acquisition, change and maintenance IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org22 Generic ( ) and Specific ( ) Advice in the Assurance Guide Documented Control Weaknesses improved with assessed with derived by assessed with implemented with derived from controlled by Testing the Control Objective Outcome Control Objectives Testing the Control Design of the Control Objectives Control Practices IT Processes Figure 14—Types of Advice Provided in This Guide 1 International Standards on Auditing (ISA) are professional standards for the performance of financial audit of financial information. These standards are issued by International Federation of Accountants (IFAC) and cover respective responsibilities, audit planning, internal control, audit evidence, using work of other experts, audit conclusions and audit report, and specialised areas. IT ASSURANCE PRINCIPLES AND CONTEXT 23© 2007 IT Governance Institute. All rights reserved. www.itgi.org • Access security • Application system acquisition, development and maintenance ISA 330 gives guidance on the nature, timing and extent of audit procedures to be adopted in response to identified risks. Some specific requirements are set out in the ISA in relation to internal controls validation, including the following: • When the assurance professional’s assessment of risks of material misstatement at the assertion level includes an expectation that controls are operating effectively, the assurance professional should perform tests of controls to obtain sufficient appropriate audit evidence that the controls were operating effectively at relevant times during the period under audit. • When the assurance professional has determined that it is not possible or practicable to reduce the risks of material misstatement at the assertion level to an acceptably low level with audit evidence obtained only from substantive procedures, the assurance professional should perform tests of relevant controls to obtain audit evidence about their operating effectiveness. The ISA also specify on the type of procedures to be carried out, stating that, ‘the assurance professional should perform other audit procedures in combination with inquiry to test the operating effectiveness of controls’. RELEVANCE FOR IT ASSURANCE Specifically in relation to IT, the ISA state that the assurance professional considers the need to obtain audit evidence supporting the effective operation of controls directly related to the assertions, as well as other indirect controls on which these controls depend, such as underlying general IT controls. For that purpose, the COBIT framework provides abundant guidance, and this guide provides an assurance approach that is in line with ISA guidance. Because of the inherent consistency of IT processing, audit evidence about the implementation of an automated application control, when considered in combination with assurance evidence obtained regarding the operating effectiveness of the entity’s general controls (and in particular system development life cycle controls, including change controls) may provide substantial assurance evidence about its operating effectiveness during the relevant period. More guidance on these aspects is provided in chapter 6, Assurance Guidance for COBIT Processes and Controls. Materiality When conducting or supporting financial statement audits, assurance professionals ordinarily measure materiality in monetary terms, since what they are auditing is also measured and reported in monetary terms. IT assurance professionals may conduct assurance on non-financial items and, therefore, alternative measures are required. With respect to a specific control objective, a material control is a control or group of controls without which control procedures do not provide reasonable assurance that the control objective will be met. ISACA IS Auditing Guideline G6 (www.isaca.org/standard/guideline.htm) specifies that where the IT assurance objective relates to systems or operations processing financial transactions, the value of the assets controlled by the system(s) or the value of transactions processed per day/week/month/year should be considered in assessing materiality. For systems and operations not affecting financial transactions, the following are examples of measures that should be considered to assess materiality: • Criticality of the business processes supported by the system or operation • Cost of the system or operation (i.e., hardware, software, staff, third-party services, overheads, a combination of these) • Potential cost of errors (possibly in terms of lost sales, warranty claims, irrecoverable development costs, cost of publicity required for warnings, rectification costs, health and safety costs, unnecessarily high costs of production, high wastage, etc.) • Number of accesses/transactions/inquiries processed per period • Nature, timing and extent of reports prepared and files maintained • Nature and quantities of materials handled (e.g., where inventory movements are recorded without values) • Service level agreement (SLA) requirements and cost of potential penalties • Penalties for failure to comply with legal and contractual requirements Assurance Risk Assurance risk is the risk that an incorrect opinion is reported by the assurance professional in the presence of material misstatement of the subject matter. Assurance risk is a function of the risk of material error and the risk that the assurance professional will not detect associated errors or control failures. The risk of material error has two components: • Inherent risk—The susceptibility of an assertion by the responsible party to a misstatement that could be material, individually or when aggregated with other misstatements, assuming that there were no related internal controls2 • Control risk—The risk that a misstatement that could occur in an assertion and that could be material, individually or when aggregated with other misstatements, will not be prevented or detected and corrected on a timely basis by the entity’s internal control Detective risk is the risk that the assurance professional’s procedures will not detect a misstatement that exists in an assertion that could be material, individually or when aggregated with other misstatements. It is important when planning an assurance initiative to assess assurance risk and design an approach to ensure that the assurance objectives are met. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org24 2 These definitions are drawn from the International Accounting and Assurance Standards Board. A S S U R A N C E P L A N N I N G A SSU R A N C E P L A N N IN G ASSURANCE PLANNING 25© 2007 IT Governance Institute. All rights reserved. www.itgi.org 3. ASSURANCE PLANNING INTRODUCTION The first phase of the IT assurance framework (illustrated in figure 9) is the planning phase. Before beginning an assurance initiative, the work of the IT assurance professional should be planned in a manner appropriate for meeting the assurance objectives. For an internalassurance function, the assurance plan should be developed/updated/reviewed at least annually. The plan should act as a framework for assurance activities and serve to address responsibilities set by the assurance charter. For an external IT assurance initiative, a plan should normally be prepared for each initiative. Each type of assurance plan should clearly document the objectives of the initiative and reflect the intended user’s strategy and priorities. As part of the planning process, IT assurance professionals should obtain a good understanding of the assurance universe and the organisation’s business goals for IT, IT goals, and how they are planned to be realised through IT processes and IT resources. The extent of the knowledge required is determined by the nature of the organisation, its environment, risks and the objectives of the assurance initiative. To execute the assurance initiative and assurance planning work according to a standardised and structured approach, the IT assurance professional should also identify appropriate control frameworks that could be useful for the assurance initiatives (e.g., COSO, COBIT) or IT management frameworks or standards (e.g., ITIL, ISO/IEC 27000). IT ASSURANCE UNIVERSE The IT assurance universe defines the area of responsibility of the IT assurance provider; it is usually based on a high-level structure that classifies and relates IT processes, resources, risks and controls, allowing for a risk-based selection of discrete IT assurance initiatives. The assurance universe needs to be defined at the enterprise level and must be composed of subjects, units, processes, procedures, systems, etc., that are capable of being defined and evaluated. The building blocks of the assurance universe are units under which assurance can be conducted. For the purpose of IT Assurance Guide, COBIT provides a structure to define the IT assurance universe built around the four types of IT resources and 34 IT processes categorised into four domains. The four domains cover the traditional responsibilities in IT of plan, build, run and monitor. The IT resources identified in COBIT are defined as follows: • Applications—The automated user systems and manual procedures that process the information • Information—The data input, processed and output by the information systems, in whatever form is used by the business • Infrastructure—The technology and facilities (i.e., hardware, operating systems, database management systems, networking, multimedia, etc., and the environment that houses and supports them) that enable the processing of the applications • People—The personnel required to plan, organise, acquire, implement, deliver, support, monitor and evaluate the information systems and services. They may be internal, outsourced or contracted as required. The four domains defined by COBIT are Plan and Organise, Acquire and Implement, Deliver and Support, and Monitor and Evaluate. As shown in figure 15, IT processes deliver information to the business, run the applications, and need infrastructure and people. Together, they constitute the enterprise architecture for IT. deliver runIT Processes(including goals and responsibilities) Information Applications Infrastructure and Peopleneed Figure 15–Enterprise Architecture for IT The portfolio of assurance activities within the assurance universe needs to be prioritised by risk level, technological complexity, time since the most recent assurance initiative, strategic importance, age in technology, known control weaknesses, etc. By doing so, assurance resources can be assigned to the units carrying the highest risk for the organisation. The prioritisation is driven by business and governance objectives (regarding functionality, agility, return, compliance and comfort), implying specific value and risk drivers, as illustrated in figure 16. This figure also illustrates that it helps to think in terms of IT resources for translating business goals into IT goals (i.e., in terms of the services and information required) and in terms of the infrastructure and people resources required to provide and support the services and information needed. COBIT provides tables of generically applicable enterprise and IT goals that can—after adaptation to the situation at hand—help in determining the subjects in the assurance universe that need the most attention. The assurance universe resulting from the analysis work described previously results in most cases in a two-dimensional matrix, with one dimension describing the relevant elements from the enterprise architecture for IT and the other dimension indicating the possible control objectives, as shown in the left part of figure 17. Because the recommended framework is COBIT, with its process structure, a first step in scoping the assurance initiative can consist of selecting the processes, thereby reducing the control objectives in scope on the horizontal dimension. This also allows for simplifying the vertical dimension by concentrating on the IT resources because the processes have been dealt with in the horizontal control objective dimension. This then produces the right side of figure 17. If other control frameworks are used that are not process-oriented, the processes need to be retained in the vertical dimension. But even then, most frameworks can be mapped to COBIT (see www.isaca.org/cobit) so that after mapping the simplified version can be used. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org26 Business Governance Enterprise Goals for IT Applications Inform ation Infrastructure People Functionality Agility Return Compliance Comfort IT Goals IT Processes Figure 16–Business and IT Goals as Drivers for Assurance Planning IT Process Selection IT R es ou rc es Control Objectives Selection En te rp ris e Ar ch ite ct ur e fo r I T Control Objectives Figure 17–Linking the Enterprise Architecture and Control Objectives ASSURANCE PLANNING 27© 2007 IT Governance Institute. All rights reserved. www.itgi.org Other forms of representing the assurance universe are possible. Whatever representation is chosen, balance between completeness, consistency and manageability has to be preserved. Through the proposed technique, all relevant units can be identified and described. Some examples are: • Applications can either be grouped (in line with the major business processes they support, e.g., sales, logistics, administration, manufacturing, human resources) or listed individually; one can then identify a subset of the IT processes and control objectives to the applications to identify (e.g., an assurance initiative on applications) the development cycle or portfolio management. Projects, which are very often reviewed through project assurance initiatives, can be considered as applications in the making. • People and the way they are organised (i.e., organisational units) are part of the assurance universe horizontal dimension, allowing, for example, assurance on organisational entities. • Infrastructure elements (e.g., data centre, networks, IT platforms) are another horizontal dimension, allowing identification of, for example, security reviews of operating systems and networks, or physical reviews of data centres. • Information includes databases, master files and transaction logs. Specific topics currently high on the agenda of many IT departments include outsourcing projects and a variety of compliance requirements. Through the process dimension of the assurance universe, the assurance professional can identify the relevant IT processes that manage outsourced IT services, for example, DS1 Define and manage service levels and DS2 Manage third-party services. By doing so, this specific topic can be included in the overall assurance universe. RISK-BASED ASSURANCE PLANNING The assurance professional should use an appropriate risk assessment technique or approach in developing the overall plan for theeffective allocation of IT assurance resources. Risk assessment is a technique used to examine units in the assurance universe and select those areas for review that have the greatest risk exposure. The risks associated with each IT layer cannot be determined by reviewing the IT-related risks in isolation, but must be considered in conjunction with the organisation’s processes and objectives. Risk has two major attributes (probability and impact) and has a complex relationship amongst the attributes of the objects involved, which are: • Asset—Something of value (tangible or intangible) worth protecting • Threat—Any situation or event that has the potential to harm a system • Threat agent—Methods and things used to exploit a vulnerability (e.g., determination, capability, motive, resources) • Threat event—An instance of a threat acting upon a system vulnerability in which the system is adversely affected • Vulnerability—A weakness that could be exploited by a threat (e.g., an open firewall port, a password that is never changed, a flammable carpet). A missing control is also considered a vulnerability. • Countermeasure—A synonym for control. The term ‘countermeasure’ can be used to refer to any type of control, but it is most often used when referring to measures that increase resilience, fault tolerance or reliability of an IT service. • Risk—The potential that a given threat will exploit vulnerabilities of an asset to cause loss or damage to the asset • Residual risk—The risk associated with an event when the control is in place to reduce the effect or likelihood of that event being taken into account Figure 18 provides the relationship amongst the different components and the major attributes of each. These attributes are essential to analyse the contribution of each component to the risk analysis process. A suggested approach for this process is provided in figure 19. The suggested risk analysis approach starts from the valuation of assets, which in the COBIT framework consists of the information that has the required criteria to help achieve the business objectives (including all the resources necessary to produce that information). The next step is the vulnerability analysis, which identifies the vulnerabilities that apply to the assets (e.g., a business process that needs to comply with data privacy, a business product that deals with financial transactions or infrastructure elements) that determine the availability of many information services. The next phase identifies significant threats that may be able to exploit a given vulnerability (e.g., unintentional events such as errors, omissions and accidents; intentional actions such as fraud, hacking or theft). The probability of the threat, the degree of vulnerability and the severity of the impact are combined to develop threat/vulnerability scenarios and assess their risk. This is followed by the selection of countermeasures (controls) and an evaluation of their cost and effectiveness. After considering the impact of implementing selected controls, residual risk can be determined. The conclusion is an action plan after which the cycle can start again. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org28 Owners Countermeasures Risks Threat Agents Threats Vulnerabilities Assets Threat/Vulnerability Scenarios prevent and detect from avoid or mitigate are concerned about have exploit give rise to impose reduce Figure 18–Relationship and Attributes of the Risk Analysis Components Identify significant threats. Define relevant threat/ vulnerability scenarios. Assess risk (applicability, probability and materiality of impact). Evaluate control cost and effectiveness. Inventory useful countermeasures. Determine residual risk. Identify applicable vulnerabilities. Identify critical assets and estimate their value. Develop a risk mitigation action plan. Figure 19—A Risk Analysis Approach Leveraging the Risk Components and Their Attributes ASSURANCE PLANNING 29© 2007 IT Governance Institute. All rights reserved. www.itgi.org HIGH-LEVEL ASSESSMENTS High-level assessment can provide support in assurance planning by identifying processes where the maturity/control gap between as-is and to-be is the most significant. Several assessment techniques exist (covering the evaluation against performance and risk attributes, process maturity attributes, control objectives and maturity attributes) resulting in, for example, process compliance profiles as shown in figure 21. The results of such high-level assessment can be used to prioritise the IT assurance work. Specific benefits of such high-level assessments are: • Making members of IT management aware of their accountability for controlling IT and gaining their buy-in • High-level checking of compliance with established IT control requirements • Optimising and prioritising IT assurance resources • Bridging to IT governance DEFINE THE SCOPE AND OBJECTIVES OF THE ASSURANCE INITIATIVE IT assurance professionals should also clearly define the scope and objectives of the assurance work and perform a preliminary assessment of internal control/maturity of the function/activities being reviewed to provide reasonable assurance that all material items will be adequately covered during the assurance initiative. To execute high-level planning assessments, COBIT Quickstart can provide hands-on support (see www.isaca.org/cobit). Figures 20 through 22 also demonstrate other possible templates that can be used for high-level control and maturity assessments. The first template, shown in figure 20, is a management awareness diagnostic that evaluates processes against some performance and risk attributes. Completing this template for specific IT processes provides a quick insight into the risks associated (importance and performance), the responsibility (who does it), the formality (documentation), the assurance history and the accountability. The next two templates provide examples of how to execute a process maturity assessment, using the maturity description or maturity attributes. The first template in figure 21 starts from the process maturity description, which needs to be broken down into several maturity statements. For each of the statements, a compliance value needs to be defined, which enables the IT assurance professional to calculate a ‘compliance profile’. Another approach in assessing process maturity is to leverage the maturity attributes (COBIT maturity models as explained in the COBIT framework). The maturity of a process can be assessed against six maturity attributes: • Awareness and communication • Policies, plans and procedures • Tools and automation • Skills and expertise • Responsibility and accountability • Goal setting and measurement Risk Who Is Accountable? Im po rt an ce Pe rf or m an ce IT Ot he r Ou ts id e Do N ot K no w Au di te d? Fo rm al ity Who Does It? PO1 Define a strategic IT plan. PO10 Manage projects. AI6 Manage changes. DS2 Manage third-party services. DS5 Ensure systems security. ME1 Monitor and evaluate IT performance. Importance = How important for the organisation on a scale from 1 (not at all) to 5 (very) Performance = How well it is done from 1 (very well) to 5 (do not know or badly) Formality = Is there a contract, an SLA or a clearly documented procedure (Y, N or ?) Audited? = Y, N or ? Accountable = Name or ‘do not know’ COBIT Processes Figure 20—Management Awareness Diagnostic IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org30 Assessment of these attributes on a template, as shown in figure 22, provides the IT assurance professional with a ‘rising star scheme’, indicating significant gaps between as is and to-be, areas as where attention is needed, and potential quick wins. .50 .45 .40 .35 .30 .25 .20 .15 .10 .05 0 Level 1 Level 2 Level 3Level 4 Level 5 AI6—ManageChange Maturity level 3, moving into level 4 Process Name Process ID No. Statement Weight Maturity Level Total Weight Compliance 0.00 0.33 0.66 1.00 compliance value N ot a t al l A li tt le To s om e de gr ee C om pl et el y VA LU E Figure 21—Assessing the Process Maturity Compliance Profile Awareness and Policies, Plans Tools and Skills and Responsibility and Goal Setting Communication and Procedures Automation Expertise Accountability and Measurement 5 There is advanced, External best practices and Standardised tool sets are The organisation formally Process owners are There is an integrated forward-looking standards are applied. used across the enterprise. encourages continuous empowered to make performance measurement understanding of improvement of skills, based decisions and take action. system linking IT performance requirements. Process documentation is Tools are fully integrated on clearly defined personal The acceptance of to business goals by global evolved to automated with other related tools to and organisational goals. responsibility has been application of the IT balanced Proactive communication workflows. Processes, policies enable end-to-end cascaded down throughout scorecard. Exceptions are of issues based on trends and procedures are support of the processes. Training and education support the organisation in a globally and consistently exists, mature standardised and integrated external best practices consistent fashion. noted by management and are applied, and integrated management and support improvement of the concepts and techniques. root cause analysis is applied. communication techniques to enable end-to-end Tools are being used to and use of leading-edge Continuous improvement is communication tools are improvement. process and automatically Knowledge sharing is an a way of life. in use. detect control exceptions. enterprise culture, and knowledge-based systems are being deployed. External experts and industry leaders are used for guidance. 4 There is understanding The process is sound and Tools are implemented Skill requirements are routinely Process responsibility and Efficiency and effectiveness of the full requirements. complete; internal best according to a updated for all areas, accountability are accepted are measured and practices are applied. standardised plan, and proficiency is ensured for all and working in a way that communicated and linked to Mature communication some have been critical areas, and certification enables a process owner to business goals and the IT techniques are applied and All aspects of the process integrated with other is encouraged. fully discharge his/her strategic plan. The IT balanced standard communication are documented and repeatable. related tools. responsibilities. A reward scorecard is implemented tools are in use. Policies have been approved Mature training techniques culture is in place that in some areas with exceptions and signed off on by Tools are being used in main are applied according to the motivates positive action. noted by management and management. Standards for areas to automate management training plan, and knowledge root cause analysis is being developing and maintaining the of the process and monitor sharing is encouraged. All standardised. Continuous processes and procedures are critical activities and controls. internal domain experts are improvement is emerging. adopted and followed. involved, and the effectiveness of the training plan is assessed. 3 There is understanding Usage of good practices A plan has been defined Skill requirements are defined Process responsibility and Some effectiveness goals and of the need to act. emerges. for use and standardisation and documented for all areas. accountability are defined measures are set, but are not of tools to automate the and process owners have communicated, and there is a Management is more formal The process, policies and process. A formal training plan has been identified. The process clear link to business goals. and structured in its procedures are defined and been developed, but formal owner is unlikely to have Measurement processes communication. documented for all key Tools are being used for their training is still based on the full authority to exercise emerge, but are not activities. basic purposes, but may not all individual initiatives. the responsibilities. consistently applied. be in accordance with the IT balanced scorecard areas agreed plan, and may not be are being adopted, as is integrated with one another. occasional intuitive application of root cause analysis. 2 There is awareness of the Similar and common Common approaches to Minimum skill requirements An individual assumes his/her Some goal setting occurs; need to act. processes emerge, but are use of tools exist but are are identified for critical responsibility and is usually some financial measures are largely intuitive because of based on solutions areas. held accountable, even if this established but are known Management communicates individual expertise. developed by key individuals. is not formally agreed. There only by senior management. the overall issues. Training is provided in is confusion about There is inconsistent Some aspects of the process Vendor tools may have been response to needs, rather responsibility when problems monitoring in isolated areas. are repeatable because of acquired, but are probably not than on the basis of an occur, and a culture of individual expertise, and some applied correctly, and may agreed plan, and informal blame tends to exist. documentation and informal even be shelfware. training on the job occurs. understanding of policy and procedures may exist. 1 Recognition of the need for There are ad hoc approaches Some tools may exist; Skills required for the There is no definition of Goals are not clear and no the process is emerging. to processes and practices. usage is based on standard process are not identified. accountability and measurement takes place. desktop tools. responsibility. People take There is sporadic The process and policies A training plan does not ownership of issues based communication of the are undefined. There is no planned exist and no formal training on their own initiative on a issues. approach to the tool usage. occurs. reactive basis. Figure 22—Assessing Process Maturity Attributes I T R E S O U R C E A N D C O N T R O L S C O P I N G IT R E SO U R C E A N D C O N T R O L S C O P IN G IT RESOURCE AND CONTROL SCOPING 31© 2007 IT Governance Institute. All rights reserved. www.itgi.org 4. IT RESOURCE AND CONTROL SCOPING INTRODUCTION The second stage of the IT assurance framework (illustrated in figure 23) is the scoping stage. This stage determines which IT resources and control objectives are covered within a given IT control framework in the execution stage of the initiative. Scoping consists of linking applicable IT resources (e.g., applications, information, infrastructure, people) to applicable IT control objectives and then assessing the materiality of the impact of not achieving a specific control objective. Figure 23 illustrates the eight-step scoping process. Setting the scope for the initiative too narrowly may result in material factors not being considered. Setting the scope for the initiative too broadly may result in inefficiencies and incorrect conclusions because of limited resources and time. Appendix VIII, IT Scoping, sets out a generic scoping methodology that can be applied to IT assurance initiatives and a variety of other IT governance programmes. STEPS IN SCOPING IT RESOURCES AND CONTROL OBJECTIVES Figure 24 describes the eight steps within the scoping phase of conducting the IT assurance initiative. These steps are described in more detail as follows. Step 1—Establish Drivers for the Assurance Initiative In the first step, the drivers for the assurance initiative and the corresponding assurance objectiveare identified. As noted in chapter 1, there are many possible drivers for assurance, including process improvement and meeting compliance needs in support of the financial statement audit. Verifying the drivers for the assurance initiative can be accomplished by activities such as interviewing key stakeholders or inspecting assurance plans or charters. A. Framework Criteria • A common language for IT activities and key management practices • Business focus • Governance expectations • IT tasks and activities organised into discrete processes • Consistent with generally accepted IT good practices and corporate governance standards • Select • Weigh • Cut off • Customise B. Deciding What Is In 2 Document the enterprise architecture for IT (clarify through interviews with key IT staff members). 1 Establish drivers for the assurance initiative (clarify through interviews with stakeholders). 4 Select the IT process [B] (document and validate the link amongst business goal, IT goal and IT process). 3 Choose an IT control framework [A] (verify that it responds to minimum criteria). 7 Select initial control objectives [B] (leverage control framework mappings). 8 Refine control objectives selection with risk analysis[B] (linking significant threats to applicable vulnerabilities to material impact). 5 Select IT component [B] (record the important activities and resources for the processes selected). 6 Refine component selection with cause/effect analysis[B] (use the goals and metrics chain: business- IT process-activity). Figure 23—IT Scoping Road Map More specifically, the boundaries of the entity under review need to be unambiguously described, together with the current roles and responsibilities and the resources required by IT to support the defined business needs of the entity under review. The assurance professional needs to interview appropriate management and staff members to obtain an understanding of: • Business requirements and associated risks • Organisation structure • Roles and responsibilities • Policies and procedures • Laws and regulations • Control measures in place • Management reporting (status, performance, actions) • Past issues and corrective actions taken • Current issues and concerns • What management hopes to obtain as a result of the assurance initiative Step 2—Document Enterprise IT Architecture In the second step, the enterprise IT architecture is documented. The concept and elements of the architecture are set out in chapter 3. The enterprise IT architecture can also be validated by interviews with key IT staff members. Step 3—Select Control Frameworks Appropriate control frameworks are selected in the third step. Typically this will be COBIT, but for some initiatives it may be COSO, similar entity-level control frameworks, or more detailed frameworks or standards, such as one of the relevant ISO standards. Step 4—Identify IT Processes After the appropriate control framework is chosen, the appropriate IT processes are selected and linked to appropriate IT resources in the next step. IT processes in scope can be identified through analysis of the relationship amongst business goals, IT goals and IT processes. Step 5—Select IT Components Step five is described in chapter 2. IT resources are made up of: • Applications • Information • Infrastructure • People A number of inputs can be used to determine the IT resources that are relevant to the initiative. The priority here should be on completeness because the subsequent risk analysis determines items that can be excluded from the scope of the initiative. However, efficiency needs to be taken into account as well, to keep the matrix to a reasonable/workable size. The different inputs are: • Drivers for the initiative—The drivers for the assurance initiative are the most important factors for determining the IT components and the control objectives to review. Typical examples are major service breakdown, organisational change and regulatory compliance. • Business control requirements—Given the focus of this guide on IT assurance, it is assumed that the analysis of the required and applicable business controls has occurred so that the scoping of IT controls is limited to how IT supports automated business controls. • Enterprise architecture for IT—The enterprise architecture encompasses the processes involved to deliver the information services, the portfolio of applications and systems in use by the organisation, the technology used to run them, and the people needed to plan, build, operate and support the applications. The relevant IT resources or groups of IT resources can be deduced from the architecture. Step 6—Refine IT Component Selection In the initial linking of processes to resources, the assurance professional may derive a rather large portfolio, perhaps broader than can be cost-effectively reviewed within the terms of the assurance initiative. In the sixth step, the assurance professional should refine the selection of IT resources by ensuring that the resources have a direct relationship to the processes relevant to the initiative. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org32 IT RESOURCE AND CONTROL SCOPING 33© 2007 IT Governance Institute. All rights reserved. www.itgi.org Step 7—Select Control Objectives The assurance professional makes a first selection of the COBIT control objectives that are relevant for the IT processes that are in scope for the assurance initiative. Often the control objectives need to be customised for the realities of the particular enterprise situation. For most initiatives, scoping IT resources does not require substantial analysis, because it starts from a specific enterprise situation. Conversely, scoping the control objectives needs more analysis because it starts from one or more generic frameworks. COBIT provides material that can support the latter step, by describing a ‘risk and value’ statement for each of the control objectives, demonstrating why specific controls are needed. Some mapping is required as well as customisation of the selected control objectives to the enterprise environment and the objective of the assurance initiative. Step 8—Refine Control Objectives Selection Finally, in the eighth step, the assurance professional links the refined portfolio of IT resources set out in step six to the first cut of control objectives selected in the seventh step. In an iterative process, the professional refines and often reduces the list of control objectives that are relevant for this particular assurance initiative. The process of linking IT resources to control objectives is illustrated in figure 24. In this step, the assurance professional should analyse the risk of not achieving the selected control objectives for the selected IT resources, and retain only the IT resources and control objectives that have a material effect if the control objective is not achieved. The assurance professional should: • Review the horizontal lines of the matrix (figure 24) to determine if there is sufficient risk to keep the IT resource in scope and to identify the resources with high risk that may require more in-depth review and testing • Review the vertical lines of the matrix (figure 24) to remove the control objectives that are low risk and to identify objectives that require enterprisewide solutions as opposed to point solutions The critical conclusion of this step, illustrated in figure 24, is to answer the question, ‘Will not achieving this control objective for this class of IT resource be material for this particular assurance initiative?’ Only the cells for which the answer is ‘yes’ should be retained in the final IT control scope. IT-RELATED BUSINESS GOALS AND IT GOALS To assist the IT assurance professionals in assurance planning, COBIT provides a detailed cascade from IT-related business goals to IT goals to IT processes. COBIT defines 17 generic business goals,which encompass business drivers and services that directly impact IT. These are translated into supporting IT goals that, in turn, are linked to IT process goals (see appendix 1 in COBIT 4.1). This cascade of business, IT and process goals is particularly useful when analysing the assurance initiative drivers and how they impact the assurance universe. IT Process Selection Sc op in g IT R es ou rc es Scoping Control Objectives Business Control Requirements Business Control Requirements Enterprise Architecture for IT Assurance Initiative Drivers Enterprise Architecture for IT Assurance Initiative Drivers IT Control Framework Will not achieving this control objective for this IT resource be material? Figure 24—Risk-based IT Resource and Control Scoping This cascade of goals can help guide the assurance planning work. As shown in figure 25, if the assurance work focuses on a specific business function, IT-related business goals and IT goals can be valuable input for the assurance planning work. Assurance work that focuses on a specific organisational component (e.g., a process) can use IT goals and IT process goals as a source of information for assurance planning. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org34 Major Application Important Infrastructure Component Organisational Component Major Change Business Function Business Goals IT Process Goals (P=primary, S=secondary) IT Goals P S S S P S P S S P P S ASSURANCE SUBJECT GO AL IN FO RM AT IO N Figure 25—IT-related Business, IT and IT Process Goals for IT Assurance Planning A S S U R A N C E I N I T I A T I V E E X E C U T I O N A SSU R A N C E IN IT IA T IV E E X E C U T IO N ASSURANCE INITIATIVE EXECUTION 35© 2007 IT Governance Institute. All rights reserved. www.itgi.org 5. ASSURANCE INITIATIVE EXECUTION INTRODUCTION The third stage of the IT assurance framework (previously illustrated in figure 10) is the execution stage. Figure 10 describes a road map that assurance professionals can follow as they execute a particular assurance initiative. The remainder of this section will analyse the road map in detail. STEP 1—REFINE UNDERSTANDING The assurance steps to be performed document the activities underlying the control objectives and identify the stated control measures/procedures in place. The first step of the execution stage is refining an understanding of the environment in which the testing is performed. This implies understanding the organisation to select the correct assurance scope and objectives. The assurance scope and objectives need to be communicated to and agreed upon by all stakeholders. The output from this step consists of documented evidence regarding: • Who performs the task(s), where the task is performed and when the task is performed • The inputs required to perform the task and the outputs generated by the task • The stated procedures for performing the task The assurance professional can structure this step along the following lines: • Interview and use activity lists and RACI charts. • Collect and read process description, policies, input/output, issues, meeting minutes, past assurance reports, past assurance recommendations, business reports, etc. • Prepare the scoping task (objective of process, goals and metrics of process to be reviewed). • Build an understanding of enterprise IT architecture. STEP 2—REFINE SCOPE The assurance steps to be performed determine the scope of the assurance project. Based on the current and detailed understanding of the IT environment, any revisions that may have been made to the business and/or assurance objectives, and whilst planning a cost-effective testing plan, it may be appropriate to adjust the scope. The scoping phase performed earlier may, therefore, need to be refined to determine a finalised subset of the assurance universe (e.g., process, system, application) and a set of controls to be reviewed. Analyse Business and IT Goals The assurance objectives and approach to the current business objectives should be realigned, and the understanding of business processes, the business goals, and the relevance of IT to the processes and objectives should be updated. The IT goals may need to be adjusted, bearing in mind the latest assurance requirements and the IT organisation. Refine the understanding of the IT assurance subject. Refine scope of key control objectives for the IT assurance subject. Test the effectiveness of the control design of the key control objectives. Alternatively/ additionally test the outcome of the key control objectives. Document the impact of control weaknesses. Develop and communicate overall conclusion and recommen- dations. Figure 10—Execution Road Map Select Processes and Controls The selection of the in-scope IT processes, IT control objectives and IT resources (i.e., applications, information, infrastructure, people) should be refined to establish the assurance boundaries. The selection of the processes, objectives and related resources is performed by assessing if it is likely that non-achievement of the control objective for the IT component will have a material effect. Analyse Risks The scope may need to be further adjusted, based on an assessment of the inherent risk of material control objections not being met. This risk-adjusted scope determines the amount of assurance review and testing required. Finalise Scope The assurance strategy should be set, and the scope and focus of the assurance approach should be finalised based on the latest understanding of objectives, optimum testing approach and assessed risk, as described previously. The IT processes, IT resources and IT control objectives selection should be adjusted as required by the strategy defined. The documentation required and the testing approach should be determined to ensure the most effective and efficient coverage of assurance objectives. STEP 3—TEST THE CONTROL DESIGN This section lists the different techniques that will be used in the detailed assurance steps. Testing is performed, covering the following main test objectives (also to be found in SAS 703 and SysTrust™4 assurance): • Evaluate the design of the controls. • Confirm that controls are placed in operation. • Assess the operational effectiveness of the controls. In addition, control efficiency may also be tested. In the testing phase, different types of testing can be applied. Five generic testing methods include: • Enquire and confirm: – Search for exceptions/deviations and examine them. – Investigate unusual or non-routine transactions/events. – Check/determine whether something has (not) occurred (sample). – Corroborate management statements from independent sources. – Interview staff members and assess their knowledge and awareness. – Reconcile transactions (e.g., reconciling transactions to bank statements). – Ask management questions and obtain answers to confirm findings. • Inspect: – Review plans, policies and procedures. – Search audit trails, problem logs, etc. – Trace transactions through the process/system. – Physically inspect presence (documentation, assets, etc.). – Walk through installations, plans, etc. – Perform a design or code walk-through. – Compare actual with expected findings. • Observe: – Observe and describe the processes. – Observe and describe the procedures. – Compare actual with expected behaviour. • Reperform and/or recalculate: – Independently develop and estimate the expected outcome. – Attempt what is prevented. – Reperform what is detected by detective controls. – Reperform transactions, control procedures, etc. – Recalculate independently. – Compare expected value with actual value. – Compare actual with expected behaviour. – Trace transactions through the process/system. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org363 Statement on Auditing Standards (SAS) No. 70, Service Organizations, is an internationally recognised auditing standard developed by the American Institute of Certified Public Accountants (AICPA). 4 SysTrust is an assurance service developed by the AICPA and the Canadian Institute of Chartered Accountants (CICA). ASSURANCE INITIATIVE EXECUTION 37© 2007 IT Governance Institute. All rights reserved. www.itgi.org • Review automated evidenced collection: – Collect sample data. – Use embedded audit modules. – Analyse data using computer-assisted audit techniques (CAATs). – Extract exceptions or key transactions. The assurance steps to be performed assess the adequacy of the design of controls. The following three assurance steps should be performed: • Observe/inspect and review the control approach, and test the design for completeness, relevancy, timeliness and measurability. • Enquire whether and confirm that the responsibilities for the control practices and overall accountability have been assigned. Test whether accountability and responsibilities are understood and accepted. Verify that the right skills and the necessary resources are available. • Enquire through interviews with key staff members involved whether the control mechanism, its purpose, and the accountability and responsibilities are understood. In summary, the assurance professional must determine whether: • Documented control processes exist • Appropriate evidence of control processes exists • Responsibility and accountability are clear and effective • Compensating controls exist, where necessary Additionally and specifically in internal audit assignments, the cost-effectiveness of the control design should be verified with the following assurance steps: • If the design of the control practice set is effective, investigate whether it can be made more efficient by optimising steps, looking for synergies with other control mechanisms and reconsidering the balance of prevention vs. detection and correction. Consider the effort spent in maintaining the control practices. • If the control practice set is operating effectively, investigate whether it can be made more cost-effective. Consider analysing performance metrics of the activities associated with this control practice set, automation opportunities and/or skill level. STEP 4—TEST THE OUTCOME OF THE CONTROL OBJECTIVES The assurance steps to be performed ensure that the control measures established are working as prescribed, consistently and continuously, and conclude on the appropriateness of the control environment. To test the outcome or effectiveness of the control, the assurance professional needs to look for direct and indirect evidence of the control’s impact on the quality of the process outputs. This implies the direct and indirect substantiation of measurable contribution of the control to the IT, process and activity goals, thereby recording direct and indirect evidence of actually achieving the outcomes as documented in COBIT. The assurance professional should obtain direct or indirect evidence for selected items/periods to ensure that the control under review is working effectively by applying a selection of testing techniques as presented in step three. The assurance professional should also perform a limited review of the adequacy of the process deliverables and determine the level of substantive testing and additional work needed to provide assurance that the IT process is adequate. STEP 5—DOCUMENT THE IMPACT OF CONTROL WEAKNESSES The assurance steps to be performed substantiate the risk of the control objective not being met by using analytical techniques and/or consulting alternative sources. When control weaknesses are found, they have to be properly documented, taking into account their often sensitive and confidential nature. In addition, particular care is required to correctly analyse and assess the severity of the observed weaknesses and the potential business impact they may have. The objective of this step is to conduct the necessary testing to provide management with assurance (or non-assurance) about the achievement of a given business process and its related control objectives. More detailed analysis should occur when: • No control measures are in place • Controls are not working as expected • Controls are not consistently applied This should result in a thorough understanding of the control weaknesses and the resulting threats and vulnerabilities, and an understanding of the potential impact of the control weaknesses. The following assurance steps can be performed to document the impact of not achieving the control objective: • Relate the impact of not achieving the control objective to actual cases in the same industry and leverage industry benchmarks. • Link known performance indicators to known outcomes and, in their absence, link the cause to its effect (cause/effect analysis). • Illustrate what the impact would affect (e.g., business goals and objectives, enterprise architecture elements, capabilities, resources). • Illustrate the impact of control weaknesses with numbers and scenarios of errors, inefficiencies and misuse. • Clarify vulnerabilities and threats that are more likely with controls not operating effectively. • Document the impact of actual control weaknesses in terms of bottom-line impact, integrity of financial reporting, hours lost in staff time, loss of sales, ability to manage and react to the market, customer and shareholder requirements, etc. • Point out the consequence of non-compliance with regulatory requirements and contractual agreements. • Measure the actual impact of disruptions and outages on business processes and objectives, and on customers (e.g., number, effort, downtime, customer satisfaction, cost). • Document the cost (i.e., customer and financial impact) of errors that could have been caught by effective controls. • Measure and document the cost of rework (e.g., ratio of rework to normal work) as an efficiency measure affected by control weaknesses. • Measure the actual business benefits and illustrate cost savings of effective controls after the fact. • Use benchmarking and survey results to compare the enterprise performance with others. • Use extensive graphics to illustrate the issues. COBIT provides support in the following ways: • The business, IT and process goals and the information criteria in the process descriptions indicate what business values are at risk if controls are not implemented properly. • For each control objective, there are value and risk driver statements that indicate the benefits to be gained and the risks to be avoided by improving controls. • The RACI charts demonstrate which roles might be affected by the risk and, therefore, should be informed of the substantive testing outcome. • Maturity models can be leveraged to benchmark internally and against other industries or competitors in an easy, accessible and understandable manner, helping to influence management. Benchmarking data are available in COBIT Online. STEP 6—DEVELOP AND REPORT OVERALL CONCLUSION AND RECOMMENDATIONS The assurance steps to be performed communicate the substantiated risk of the control weaknesses to the different stakeholders of the assurance initiative. The assurance professional should document any identified control weaknesses and resulting threats and vulnerabilities, and identify and document the actual and potential impact (e.g., through root cause analysis). In addition, the assurance professional may provide comparative information (e.g., through benchmarks) to establish a reference framework in which the test results ought to be evaluated. As potential guidance to this, a generic maturity model for internal control is provided in chapter 7, Maturity Model for Internal Control, showing the status of the internal control environment and the establishment of internal controls in an enterprise. It shows how the management of internal control, and an awareness ofthe need to establish better internal controls, typically develops from an ad hoc to an optimised level. The objective is to identify items of significance to be able to articulate to the stakeholder the recommended actions and reasons for taking action. This phase includes aggregating the results of the previous phases, developing a conclusion concerning the identified control weaknesses and communicating: • Recommended actions to mitigate the impact of the control weaknesses • Performance comparison to standards and best practices for a relative view on the results • The risk position regarding the process The formulated conclusion and recommendations should allow the responsible party to take further steps and remedial actions. When the assurance initiative is performed within an assurance context, the assurance professional needs to be thoughtful of formal assurance communication and compliant with assurance reporting standards and guidelines (available at www.isaca.org). IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org38 A S S U R A N C E G U I D A N C E F O R C O B I T P R O C E S S E S A N D C O N T R O L S A SSU R A N C E G U ID A N C E F O R C O B IT P R O C E SSE S A N D C O N T R O L S ASSURANCE GUIDANCE FOR COBIT PROCESSES AND CONTROLS 39© 2007 IT Governance Institute. All rights reserved. www.itgi.org 6. ASSURANCE GUIDANCE FOR COBIT PROCESSES AND CONTROLS INTRODUCTION This section describes the structure of the detailed testing guidance based on COBIT, covering six generic controls applicable to all IT processes, IT general controls based on the 34 COBIT IT processes and six application controls. Guidance is provided for testing control design, testing control outcome and documenting the impact in appendices I through VI, according to the layout in figure 26. GENERIC PROCESS CONTROLS Each COBIT process has generic control requirements that are identified by generic process controls within the Process Control (PC) domain (see appendix I). These are applicable for all COBIT processes and should be considered together with the detailed COBIT control objectives to have a complete view of control requirements. The six generic process controls, detailed in appendix I, Process Control, are: • PC1 Process goals and objectives • PC2 Process ownership • PC3 Process repeatability • PC4 Roles and responsibilities • PC5 Policy, plans and procedures • PC6 Process performance improvement GENERIC CONTROL PRACTICES Three generic control practices and, consequently, three generic assurance steps are defined. They are: • Approach • Accountability and responsibility • Communication and understanding The complete set of generic and specific control practices provides one consistent control approach necessary and sufficient for achieving the stated control objectives. Other control approaches with different sets of practices may exist; hence, there is a need to always verify the appropriateness of the control design at the outset of control implementation or at the outset of assurance activities. Approach The generic approach control practice consists of: • Generic control practice—Designs the control approach for achieving this control objective, and defines and maintains the control practices that implement this design • Assurance step—Enquires whether and confirms that a set of practices has been defined to achieve the objective; observes/inspects and reviews the control approach, and tests the design for completeness, relevancy, timeliness and measurability Control Objective Assurance Steps for Testing Control Design Assurance Steps for Testing the Outcome of the Control Objectives Assurance Steps for Documenting the Impact of Control Weaknesses Value Statements Risk Statements Figure 26—Structure of the Detailed Assurance Advice in Appendices I to VI Accountability and Responsibility The generic accountability and responsibility control practice consists of: • Generic control practice—Defines and assigns accountability and responsibility for the control objective as a whole, and responsibility for the different control practices (see RACI charts in COBIT); makes sure personnel have the right skills and necessary resources to execute these responsibilities • Assurance step—Enquires whether and confirms that responsibilities for the control practices as well as overall accountability have been assigned in a cost-effective and efficient manner; tests whether accountability and responsibilities are understood and accepted; verifies that the right skills and necessary resources are available Communication and Understanding The generic communication and understanding control practice consists of: • Generic control practices—Ensures the control practices, as implemented, address the control objectives and are communicated and understood • Assurance step—Enquires through interviews with key staff members involved whether the control mechanism, its purpose, and the accountability and responsibilities have been communicated and are understood IT GENERAL CONTROLS General controls relate to the environment within which automated application systems are developed, maintained and operated and which are, therefore, applicable to all the applications. They ensure the proper development, implementation and maintenance of all automated applications, and the integrity of program and data files and of computer operations. Guidance is provided on how to test COBIT’s 34 IT processes, organised into four appendices (see appendices II-V) based on COBIT’s four domains. APPLICATION CONTROLS Application controls relate to the transactions and standing data pertaining to each automated application system and are specific to each such application. They ensure the completeness and accuracy of the records and the validity of the entries made in the transactions and standing data resulting from both manual and automated processing. They are defined further in the Application Control (AC) domain in appendix VI. Relative to IT assurance, a distinction is made between application and general controls. General controls are controls embedded in the IT organisation, its processes and services. Examples include: • Systems development • Change management • Security • Computer operations Controls embedded in business process applications, on the other hand, are commonly referred to as application controls. Examples include: • Completeness • Accuracy • Validity • Authorisation • Segregation of duties Therefore, the objectives of application controls generally involve ensuring that: • Data prepared for entry are complete, valid and reliable • Data are converted to an automated form and entered into the application accurately, completely, and on time • Data are processed by the application completely and on time, and in accordance with established requirements • Output is protected from unauthorised modification or damage and distributed in accordance with prescribed policies COBIT assumes the design and implementation of automated application controls to be the responsibility of IT, covered in the Acquire and Implement (AI) domain, based on business requirements defined using COBIT’s information criteria. The operational management and control responsibility for application controls is not with IT, but with the business process owner. IT delivers and supports the applications’ services and the supporting information databases and infrastructures. Therefore, the COBIT IT processes cover general IT controls but not application controls, because these are the responsibility of business process owners and, as described previously, are integrated into business processes. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org40 ASSURANCE GUIDANCE FOR COBIT PROCESSES AND CONTROLS 41© 2007 IT Governance Institute. All rights reserved. www.itgi.org Business controls are not in thescope of COBIT and IT Assurance Guide. Figure 27 sets the boundaries of IT general controls and application controls, delineating at the same time the extent to which COBIT handles business controls. For automated services, the business is responsible for defining functional, as well as control, requirements to be included in all business processes supported by applications. Subsequently, IT responsibilities include automation of the business functional and control requirements and establishment of controls to maintain the integrity of the business applications. Just as for the IT general controls and generic process controls, guidance is provided for testing the design and outcome and documenting impact for each of the six COBIT application controls, detailed in appendix VI, Application Control: • AC1 Source document preparation and authorisation • AC2 Source document collection and data entry • AC3 Accuracy, completeness and authenticity checks • AC4 Data processing integrity and validity • AC5 Output review, reconciliation and error handling • AC6 Transaction authentication and integrity Application control weaknesses may have an impact on the entity’s ability to process business transactions through the impacted business processes and applications. Application controls are a subcomponent of the entity’s business controls. Weaknesses in application controls may be mitigated by compensating manual business and organisational control activities. The impact of application control weaknesses should be considered in the context of the underlying business process nature and related transactions and the impact of other business process controls and, as such, should be considered in consultation with the business process assurance provider. EXAMPLES OF THE USE OF DETAILED ASSURANCE STEPS Some illustrative examples of how the assurance testing steps could be applied follow. Example 1—Testing of Control Design SITUATION General computer controls are reviewed in a transaction processing organisation with assessment of the process AI6 Manage changes, control objective AI6.2 Impact assessment, prioritisation and authorisation. OBSERVATIONS For the selected systems (e.g., application, platform, network), the assurance professional inventoried the types of changes that can be implemented, the procedures (formal or informal) currently in place, all parties involved in the change management process, tools used, etc. This was done through interviews with involved persons and inquiries for documented procedures. The result of this work was a comprehensive and correct flowchart of the change management process. Plan and Organise IT General Controls Acquire and Implement Deliver and Support Monitor and Evaluate Application Controls Business Functional Requirements Business’s responsibility to properly define functional and control requirements Business’s responsibility to properly use automated services Business Controls IT’s responsibility to • Automate and implement business functional and control requirements • Establish controls to maintain the integrity of application controls Automated ServicesBusiness Control Requirements Implement and Business Controls Figure 27—IT General Controls and Application Controls The assurance professional reviewed the identified process flow to determine whether there was a step defined in the procedure to assess the impact of a change by a competent person or group of persons. The assurance professional observed that the template for requesting and approving changes included a section on impact assessment. However, the change management procedure did not mention that this information is mandatory, and the absence of this information did not lead to a rejection of the change request. In addition, the procedure did not mention any documentation standards or required verification and approval steps for the impact assessment. CONCLUSION The design of this control is flawed because a fundamental component of the control (i.e., impact assessment) is incomplete at best. It is possible that changes have been implemented without proper risk assessment, which can lead to unplanned and difficult-to- contain operational disruptions or malfunctions. Example 2—Testing for the Effectiveness of the Control SITUATION General computer controls are reviewed in a transaction processing organisation with assessment of the process AI6 Manage changes, control objective AI6.3 Emergency changes. OBSERVATIONS As part of the evaluation of the control design, the assurance professional identified that, for all relevant change management procedures, there is a control defined to help ensure that emergency change requests are reintroduced into the normal change management cycle. In addition, the assurance professional found that there is a procedure that ensures that all emergency changes are appropriately logged in a change management tool. As part of the control effectiveness testing, a sample of emergency change requests was selected from the change management tool and traced to its reintroduction as normal changes. This tracing included verification of whether the emergency change was actually introduced again as a normal change and whether it was processed following the normal change management procedure. The assurance professional observed that from the sample of 25 emergency changes selected, three of them were not subsequently reprocessed as normal changes. In addition, the assurance professional found that from the 22 emergency changes that had been duly reintroduced, only 10 were discussed at the change management board—or at least that there was a trace available that indicated that the 10 changes were discussed (trace included information stored in the change management tool). CONCLUSION The emergency change procedure is not effective for two reasons: • Not all emergency changes are reintroduced in the system, leading to a risk of losing emergency changes from sight and not learning from them. • Emergency changes that have been reintroduced are most likely inadequately discussed and documented, leading to the same risk. Example 3—Documenting the Impact of Control Weaknesses SITUATION General computer controls are reviewed in a transaction processing organisation with assessment of the process AI6 Manage changes, control objective AI6.3 Emergency changes. OBSERVATIONS Using the situation as described, the assurance professional needed to gain additional information and perform further analysis to assess and document the impact of the control weaknesses. For the aforementioned examples, the assurance professional needed to consider the types and numbers of changes affected by the control weaknesses. Some of the required information might/should already be gathered at the planning stage. This information should be used to evaluate the materiality of the weaknesses noted. Notably, the changes affected should be mapped back to the relevant infrastructure components and the applications/information they support/process. In addition, SLA penalties might apply. Furthermore, analysis of problems noted in the past can help establish the real potential impact of the weaknesses noted. In this case, it turns out that, after discussion with the responsible change manager and confirmation with other change management board members, the missing emergency changes relate to non-critical systems and the missing documentation was only a documentation issue, whereas the actual change, its cause and consequences had indeed been discussed but were not formally documented. CONCLUSION Although the control weaknesses remain as they have been observed, further analysis and documentation showed that the weaknesses were of a lesser importance than originally assessed. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org42 H O W C O B IT C O M P O N E N T S S U P P O R T IT A SSU R A N C E A C T IV IT IE SH O W C O B I T C O M P O N E N T S S U P P O R T I T A S S U R A N C E A C T I V I T I E S HOW COBIT COMPONENTS SUPPORT IT ASSURANCE ACTIVITIES 43© 2007 IT Governance Institute. All rights reserved. www.itgi.org 7. HOW COBIT COMPONENTS SUPPORT IT ASSURANCE ACTIVITIES INTRODUCTION Figure 28 links the list of typical IT assurance activities to the COBIT components that can be leveraged to make the activities more efficient and effective. It demonstrates how COBIT can support specific assurance-related activities, often performed as stand-alone tasks, in addition to how COBIT has provided support to the suggested IT assurance road map, described in the previous sections. Links have been indicated only where there is specific and strong support for an IT assurance activity. There are some key components, however, that support all activities. In practice, users of COBIT adapt and tailor the COBIT resources for their specific purposes and discover how COBIT can add value to a particular task. The table is, therefore, only a guide. Two of the most useful components are the goals and outcome measures and the RACI charts (key activities and responsibilities). They capture the essence of IT, its processes, activities and objectives and, hence, support all aspects of planning, scoping and assurance execution. Another important component for IT assurance activities is COBIT Online—its searching and browsing functions enable easier access to all the main COBIT content as well as useful benchmarking data. Those COBIT components important for assurance activities are shaded in figure 28. The following sections summarise the most important relationships in figure 28, first from the components point of view and then from the activities point of view. To conclude, the strongest links between activities and components are circled in figure 28. COBIT COMPONENTS Control objectives and practices are mostly useful for testing related activities, although since the control objectives are high-level and similar to key management practices, they can be considered during planning activities. Both are also helpful for the selection and customisation of control objectives for an assurance initiative. Figure 28—Linking IT Assurance Activities and COBIT Components IT Assurance Activities Perform a quick risk assessment. � � � � � � � � � Assess threat, vulnerability and � � � � � � business impact. Diagnose operational and project risk. � � � � � � � Plan risk-based assurance initiatives. � � � � � � � � � � � � Identify critical IT processes based � � � � � � � � � � � on value drivers. Assess process maturity. � � � � � � � � � Scope and plan assurance initiatives. � � � � � � � Select the control objectives for � � � � � � critical processes. Customise control objectives. � � � � � � � � Build a detailed assurance programme. � � � � � � � � Test and evaluate controls. � � � � � � � � Substantiate risk. � � � � � � � � � � � � Report assurance conclusions. � � � � � � � � � � � � � Self-assess process maturity. � � � � � � � � � Self-assess controls. � � � � � � � � CO BI T Co nt ro l P ra ct ic es Co nt ro l O bj ec tiv es Va lu e an d Ri sk S ta te m en ts M at ur ity M od el M at ur ity M od el A ttr ib ut es Go al s an d Ou tc om e M ea su re s RA CI (K ey A ct iv iti es a nd Re sp on si bi lit ie s) Pe rf or m an ce D riv er s M an ag em en t Aw ar en es s To ol In fo rm at io n Cr ite ria Pr oc es s Li st IT Ri sk a nd C on tr ol Di ag no st ic s Bo ar d Br ie fin g on IT Go ve rn an ce ,2 nd Ed iti on CO BI T Qu ic ks ta rt CO BI T On lin e— Se ar ch in g an d Br ow si ng C O BI T On lin e— Be nc hm ar ki ng IT C on tr ol O bj ec tiv es fo r Sa rb an es -O xl ey ,2 nd Ed iti on COBIT Components The list of COBIT processes and the domains provide a responsibility structure for IT and help ensure the completeness of the assurance coverage. The list is useful in the planning phase and also when summarising the conclusions of an assurance initiative. Similarly, information criteria provide a generic and simple high-level structure of the objectives of IT processes and are equally useful for structuring assurance plans and conclusions. Maturity models are very useful tools for high-level assessments of processes, identification of key processes, planning which processes need most attention in the assurance programme and also when summarising the assurance conclusions. The maturity attributes provide more details for process maturity assessment, and because they are generic for all processes, they are also an alternative to the specific process maturity descriptions provided for each COBIT process. Because maturity models describe how processes are managed, the detailed attributes can be used to further customise control objectives, which usually describe only what needs to be done. Maturity models are increasingly being used by IT management for self-assessment and can, therefore, provide a common approach for both the assurance and IT professionals to understand and agree upon priorities and areas on which to focus attention. Whereas performance drivers play an important role for assurance activities in the planning and reporting phases of an IT assurance road map, they are also a good source for customising control objectives because they imply that certain actions need to happen or conditions need to exist that will increase the probability of successfully achieving the process’s objectives and goals. Value and risk statements provide the arguments to justify controls but are also primary inputs when performing high-level or detailed risk assessments. They are also starting points when identifying critical processes and IT components. The management awareness and diagnostic tools are provided in Supplemental Tools and Materials, available online and on CD-ROM with the IT Governance Implementation Guide: Using COBIT and Val IT, 2nd Edition. They are tools to perform initial high-level assessments of process importance, significant risks and the state of process controls, typically done in the early stages of the IT assurance initiative. The assessment form presentation of COBIT Quickstart lends itself easily for quick or high-level assessments as well as for efficient self-assessments. Benchmarking data and functionality as provided in COBIT Online are useful to portray how the entity compares on process management and controls with other enterprises in the same industry, geography or size segment. The comparison is supported with pie chart and spider diagrams. Such benchmarks lend a lot of credibility to the conclusions of assurance activities but can also be used earlier in the assurance life cycle (e.g., to identify processes that need early or in-depth assurance coverage because of gaps with the rest of the industry). IT ASSURANCE ACTIVITIES To gain insight into the entity where the IT assurance activities are to be performed, the COBIT components that provide the best support for the assurance professional are the process structure, maturity models, goals, outcome measures and performance drivers. Risk-based IT assurance planning has become common practice and is well supported by COBIT’s maturity modelling and COBIT Online’s benchmarking to identify where the highest potential risks are. The risk and value statements of the control objectives provide additional support if more detailed risk assessment is required to drive the assurance plan. Quickstart as well as the awareness and diagnostic tools are aids to perform high-level assessments quickly and efficiently. Planning and reporting—and scoping to a lesser extent—use most of the COBIT components but usually only as input or reference. On the other hand, detailed planning and scoping, as well as testing, are activities that use fewer of the COBIT components but they tend to use them more intensely.Planning, scoping and testing are also the IT assurance activities that extensively use the material that is at the ‘heart’ of COBIT: the control objectives. THE STRONGEST LINKS Some of the strongest links between COBIT components and IT assurance activities (i.e., where activities can benefit the most from the COBIT materials) are as follows: • Goals and outcome measures with planning risk-based assurance initiatives • Risk and value statements with risk assessments and risk substantiation • Key activities and RACI charts with detailed assurance planning • Control objectives and practices with testing and evaluating controls • Maturity models and attributes with process maturity and other high-level assessments The ITGI publication IT Control Objectives for Sarbanes-Oxley, 2nd Edition, also provides strong links between COBIT components and IT assurance activities. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org44 A P P E N D IX I— P R O C E SS C O N T R O L (P C ) APPENDIX I—PROCESS CONTROL (PC) PC1 Process Goals and Objectives PC2 Process Objectives PC3 Process Repeatability PC4 Roles and Responsibilities PC5 Policy, Plans and Procedures PC6 Process Performance Improvement APPENDIX I 45© 2007 IT Governance Institute. All rights reserved. www.itgi.org A PP E N D IX I— PR O C E SS C O N T R O L (P C ) P R O C ES S A SS U R A N C E ST EP S D ef in e an d co m m un ic at e sp ec if ic , m ea su ra bl e, a ct io na bl e, r ea lis tic , re su lts -o ri en te d an d tim el y (S M A R R T ) pr oc es s go al s an d ob je ct iv es f or th e ef fe ct iv e ex ec ut io n of e ac h IT p ro ce ss . E ns ur e th at th ey a re li nk ed to th e bu si ne ss g oa ls a nd s up po rt ed b y su ita bl e m et ri cs . Te st t he C on tr ol D es ig n • E ns ur e th at a f or m al p ro ce ss e xi st s fo r co m m un ic at in g go al s an d ob je ct iv es a nd th at , w he n up da te d, s uc h co m m un ic at io n is r ep ea te d. • E nq ui re w he th er a nd c on fi rm th at p ro ce ss g oa ls a nd o bj ec tiv es h av e be en d ef in ed . V er if y th at p ro ce ss s ta ke ho ld er s un de rs ta nd th es e go al s. • E nq ui re w he th er a nd c on fi rm th at th e IT p ro ce ss g oa ls li nk b ac k to b us in es s go al s. • C on fi rm th ro ug h in te rv ie w s w ith p ro ce ss s ta ke ho ld er s th at th e IT p ro ce ss g oa ls a re S M A R R T. • E nq ui re w he th er a nd c on fi rm th at o ut pu ts a nd a ss oc ia te d qu al ity ta rg et s ar e de fi ne d fo r ea ch I T p ro ce ss . • W al k th ro ug h th e pr oc es s de si gn w ith s el ec te d pr oc es s st ak eh ol de rs a nd v er if y w he th er th e pr oc es s is u nd er st oo d an d lik el y to a ch ie ve it s ob je ct iv es . Va lu e D riv er s C on tr ol O bj ec ti ve • K ey p ro ce ss es m ea su re d ef fi ci en tly an d ef fe ct iv el y • Pr oc es se s in li ne w ith b us in es s ob je ct iv es R is k D riv er s • Pr oc es s ef fe ct iv en es s di ff ic ul t t o m ea su re • B us in es s ob je ct iv es n ot s up po rt ed b y pr oc es se s P C 1 P ro c e s s G o a ls a n d O b je c ti ve s Te st t he O ut co m e of t he C on tr ol O bj ec ti ve • A na ly se p ro ce ss m et ri cs , t ar ge ts a nd p er fo rm an ce r ep or ts to v er if y th at p ro ce ss g oa ls h av e SM A R R T c ha ra ct er is tic s an d ar e be in g m ea su re d ef fe ct iv el y an d ef fi ci en tly . • A ss es s th e ef fe ct iv en es s of c om m un ic at in g th e pr oc es s go al s an d ob je ct iv es th ro ug h di sc us si on s w ith p er so nn el a t v ar io us le ve ls a nd e xa m in at io n of tr ai ni ng m at er ia ls , m em os a nd o th er d oc um en ta tio n. • Te st th e ap pr op ri at en es s of th e fr eq ue nc y of c om m un ic at io n of g oa ls a nd o bj ec tiv es . • E ns ur e th at b us in es s go al s ar e su pp or te d by I T p ro ce ss es b y tr ac in g be tw ee n th e tw o an d id en tif yi ng u ns up po rt ed b us in es se s go al s. D oc um en t th e Im pa ct o f C on tr ol W ea kn es se s • D et er m in e th e bu si ne ss im pa ct if p ro ce ss g oa ls a nd o bj ec tiv es a re n ot li nk ed to th e bu si ne ss g oa ls . • A ss es s th e im pa ct o n bu si ne ss p ro ce ss in g in th e ev en t t ha t p ro ce ss g oa ls a re n ot d ef in ed in a S M A R R T m an ne r. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org46 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a n ow ne r ex is ts f or e ac h IT p ro ce ss . • E nq ui re w he th er a nd c on fi rm th at r ol es a nd r es po ns ib ili tie s ha ve b ee n de fi ne d. V er if y th at th e ow ne rs u nd er st an d an d ac ce pt th es e re sp on si bi lit ie s. • C on fi rm w ith th e pr oc es s ow ne r an d di re ct s up er vi so r th at s uf fi ci en t a ut ho ri ty h as b ee n pr ov id ed to s up po rt th e ro le a nd r es po ns ib ili tie s. • E ns ur e th at p ro ce ss es a re in p la ce to a ss ig n ow ne rs hi p an d ac co un ta bi lit y fo r pr oc es se s an d de liv er ab le s, in cl ud in g co m m un ic at io ns . Te st t he O ut co m e of t he C on tr ol O bj ec ti ve • R ev ie w jo b de sc ri pt io ns a nd p er fo rm an ce a pp ra is al s of th e pr oc es s ow ne r to v er if y as si gn m en t, un de rs ta nd in g an d ac ce pt an ce o f ow ne rs hi p. • R ev ie w th e ro le s an d re sp on si bi lit ie s to e ns ur e th at th ey a re c om pl et e an d ap pr op ri at e. • R ev ie w o rg an is at io n ch ar ts a nd r ep or tin g lin es to v er if y ac tu al a ut ho ri ty . • V er if y th at p ro ce ss es a re in te ra ct in g w ith e ac h ot he r ef fe ct iv el y. • V er if y th at p ro ce ss o w ne rs a re d ri vi ng c on tin uo us im pr ov em en t. D oc um en t th e Im pa ct o f C on tr ol W ea kn es se s A ss es s w he th er th e pr oc es s ow ne rs hi p su ff ic ie nt ly s up po rt s ac hi ev in g bu si ne ss p ro ce ss in g se rv ic es to m ee t s ho rt - an d lo ng -r an ge o rg an is at io na l o bj ec tiv es . A ss ig n an o w ne r fo r ea ch I T p ro ce ss , a nd c le ar ly d ef in e th e ro le a nd re sp on si bi lit ie s of th e pr oc es s ow ne r. In cl ud e, f or e xa m pl e, r es po ns ib ili ty f or pr oc es s de si gn , i nt er ac tio n w ith o th er p ro ce ss es , a cc ou nt ab ili ty f or th e en d re su lts , m ea su re m en t o f pr oc es s pe rf or m an ce a nd th e id en tif ic at io n of im pr ov em en t o pp or tu ni tie s. Va lu e D riv er s C on tr ol O bj ec ti ve • Pr oc es se s op er at in g sm oo th ly and re lia bl y • Pr oc es se s in te ra ct in g w ith e ac h ot he r ef fe ct iv el y • Pr oc es s pr ob le m s an d is su es id en tif ie d an d re so lv ed • Pr oc es se s co nt in ua lly im pr ov ed R is k D riv er s • Pr oc es se s pe rf or m in g un re lia bl y • Pr oc es se s no t w or ki ng to ge th er ef fe ct iv el y • G ap s in p ro ce ss c ov er ag e lik el y • Pr oc es s er ro rs n ot r ec tif ie d P C 2 P ro c e s s O w n e rs h ip APPENDIX I 47© 2007 IT Governance Institute. All rights reserved. www.itgi.org D es ig n an d es ta bl is h ea ch k ey I T p ro ce ss s uc h th at it is r ep ea ta bl e an d co ns is te nt ly p ro du ce s th e ex pe ct ed r es ul ts . P ro vi de f or a lo gi ca l b ut f le xi bl e an d sc al ab le s eq ue nc e of a ct iv iti es th at w ill le ad to th e de si re d re su lts a nd is a gi le en ou gh to d ea l w ith e xc ep tio ns a nd e m er ge nc ie s. U se c on si st en t p ro ce ss es , w he re p os si bl e, a nd ta ilo r on ly w he n un av oi da bl e. Va lu e D riv er s C on tr ol O bj ec ti ve • In cr ea se d ef fi ci en cy a nd e ff ec tiv en es s of r ec ur ri ng a ct iv iti es • E as e of p ro ce ss m ai nt en an ce • A bi lit y to d em on st ra te p ro ce ss ef fe ct iv en es s to a ud ito rs a nd re gu la to rs • Pr oc es se s su pp or tin g th e ov er al l I T or ga ni sa tio n go al s an d en ha nc in g IT va lu e de liv er y R is k D riv er s • In co ns is te nt p ro ce ss r es ul ts a nd lik el ih oo d of p ro ce ss e rr or s • H ig h re lia nc e on p ro ce ss s pe ci al is ts • Pr oc es se s un ab le to r ea ct to p ro bl em s an d ne w r eq ui re m en ts P C 3 P ro c e s s R e p e a ta b il it y Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at p ro ce ss r ep ea ta bi lit y is a m an ag em en t o bj ec tiv e. • Fo r im po rt an t a nd h ig h- ri sk p ro ce ss es , r ev ie w th e pr oc es s st ep s in d et ai l a nd e ns ur e th at th ey p ro vi de f or e vi de nc e of m an ag em en t r ev ie w . • C on fi rm w hi ch g oo d pr ac tic es a nd in du st ry s ta nd ar ds w er e us ed w he n de fi ni ng th e IT p ro ce ss es . • In te rv ie w s el ec te d pr oc es s st ak eh ol de rs a nd d et er m in e ad he re nc e to th e pr oc es s. • E ns ur e th at s ys te m s ar e de si gn ed f or s ca la bi lit y an d fl ex ib ili ty . Te st t he O ut co m e of t he C on tr ol O bj ec ti ve • W al k th ro ug h th e pr oc es s de si gn w ith th e pr oc es s ow ne r, an d ve ri fy w he th er th e st ep s ar e lo gi ca l a nd li ke ly to c on tr ib ut e to th e en d re su lt. • R ev ie w p ro ce ss d oc um en ta tio n to v er if y th e ad op tio n of a pp lic ab le p ro ce ss s ta nd ar ds a nd d eg re e of c us to m is at io n. • A ss es s th e m at ur ity a nd le ve l o f in te gr at io n of s up po rt in g to ol s us ed f or th e pr oc es s. D oc um en t th e Im pa ct o f C on tr ol W ea kn es se s Se le ct d at a ab ou t p ro ce ss r es ul ts n ot m ee tin g ob je ct iv es , a nd a na ly se w he th er th e ca us es r el at e to p ro ce ss d es ig n, o w ne rs hi p, r es po ns ib ili tie s or in co ns is te nt a pp lic at io n. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org48 D ef in e th e ke y ac tiv iti es a nd e nd d el iv er ab le s of th e pr oc es s. A ss ig n an d co m m un ic at e un am bi gu ou s ro le s an d re sp on si bi lit ie s fo r ef fe ct iv e an d ef fi ci en t ex ec ut io n of th e ke y ac tiv iti es a nd th ei r do cu m en ta tio n as w el l a s ac co un ta bi lit y fo r th e pr oc es s’ s en d de liv er ab le s. Va lu e D riv er s C on tr ol O bj ec ti ve • In cr ea se d ef fi ci en cy a nd e ff ec tiv en es s of r ec ur ri ng a ct iv iti es • St af f m em be rs k no w in g w ha t t o do an d w hy , i m pr ov in g m or al e an d jo b sa tis fa ct io n R is k D riv er s • U nc on tr ol le d, u nr el ia bl e pr oc es se s • Pr oc es se s no t s up po rt in g th e bu si ne ss ob je ct iv es • Pr oc es se s no t p er fo rm ed a s in te nd ed • Pr ob le m s an d er ro rs li ke ly to r em ai n un re so lv ed • Pr oc es s pe rf or m an ce li ke ly to b e va ri ab le a nd u nr el ia bl e P C 4 R o le s a n d R e s p o n s ib il it ie s Te st t he C on tr ol D es ig n • E ns ur e th at a p ro ce ss is in p la ce to d ef in e an d m ai nt ai n in fo rm at io n ab ou t t he k ey a ct iv iti es a nd d el iv er ab le s. E ns ur e th at th e pr oc es s in cl ud es th e de ve lo pm en t o f su pp or tin g po lic ie s, p ro ce du re s an d gu id an ce . • E ns ur e th at p ro ce ss es a re d es ig ne d to c ap tu re a cc om pl is hm en ts a nd in cl ud e th em in e m pl oy ee p er fo rm an ce in fo rm at io n. Te st t he O ut co m e of t he C on tr ol O bj ec ti ve • C on fi rm th ro ug h in te rv ie w s an d do cu m en ta tio n re vi ew th at k ey a ct iv iti es a nd e nd d el iv er ab le s fo r th e pr oc es s ha ve b ee n id en tif ie d an d re co rd ed . • R ev ie w jo b de sc ri pt io ns , a nd v er if y th at r ol es a nd r es po ns ib ili tie s fo r ke y ac tiv iti es a nd p ro ce ss d oc um en ta tio n ar e re co rd ed a nd c om m un ic at ed . • V er if y th ro ug h in te rv ie w s w ith o w ne rs , m an ag em en t a nd s ta ff m em be rs th at a cc ou nt ab ili ty f or th e pr oc es s an d its o ut pu ts a re a ss ig ne d, c om m un ic at ed , u nd er st oo d an d ac ce pt ed . C or ro bo ra te in te rv ie w f in di ng s th ro ug h an al ys is o f th e re so lu tio n to s ig ni fi ca nt p ro ce ss in ci de nt s an d re vi ew o f a sa m pl e of jo b pe rf or m an ce a pp ra is al s. • E nq ui re w he th er a nd c on fi rm th at r eg ul ar jo b pe rf or m an ce a pp ra is al is p er fo rm ed to a ss es s ac tu al p er fo rm an ce a ga in st p ro ce ss r es po ns ib ili tie s, s uc h as : – E xe cu tin g ro le s an d re sp on si bi lit ie s as d ef in ed – Pe rf or m in g pr oc es s- re la te d ac tiv iti es in li ne w ith g oa ls a nd o bj ec tiv es – C on tr ib ut in g to th e qu al ity o f th e pr oc es s en d de liv er ab le s • R ev ie w th e re so lu tio n to s ig ni fi ca nt p ro ce ss in ci de nt s, a nd r ev ie w a s am pl e of jo b pe rf or m an ce a pp ra is al s to v er if y w he th er r es po ns ib ili tie s an d ac co un ta bi lit ie s ar e en fo rc ed . • R ev ie w r ol es a nd r es po ns ib ilitie s w ith v ar io us s ta ff m em be rs a nd a sc er ta in th ei r un de rs ta nd in g, w he th er th e al lo ca tio ns a re a pp ro pr ia te a nd w he th er th e re po rt in g re la tio ns hi ps a re e ff ec tiv e. • A ss es s w he th er th e ro le s an d re sp on si bi lit ie s ar e de si gn ed to s up po rt c om pl ia nc e w ith v ar io us a ct iv iti es w ith in th e ro le s. D oc um en t th e Im pa ct o f C on tr ol W ea kn es se s A ss es s w he th er th e ro le s an d re sp on si bi lit ie s su ff ic ie nt ly s up po rt th e ac hi ev em en t o f bu si ne ss p ro ce ss in g se rv ic es to m ee t s ho rt - an d lo ng -r an ge o rg an is at io na l o bj ec tiv es . APPENDIX I 49© 2007 IT Governance Institute. All rights reserved. www.itgi.org D ef in e an d co m m un ic at e ho w a ll po lic ie s, p la ns a nd p ro ce du re s th at d ri ve a n IT p ro ce ss a re d oc um en te d, r ev ie w ed , m ai nt ai ne d, a pp ro ve d, s to re d, co m m un ic at ed a nd u se d fo r tr ai ni ng . A ss ig n re sp on si bi lit ie s fo r ea ch o f th es e ac tiv iti es a nd , a t a pp ro pr ia te ti m es , r ev ie w w he th er th ey a re e xe cu te d co rr ec tly . E ns ur e th at th e po lic ie s, p la ns a nd p ro ce du re s ar e ac ce ss ib le , c or re ct , u nd er st oo d an d up to d at e. Va lu e D riv er s C on tr ol O bj ec ti ve • In cr ea se d st af f aw ar en es s of w ha t t o do a nd w hy • D ec re as in g nu m be r of in ci de nt s fr om p ol ic y vi ol at io ns • Po lic ie s an d as so ci at ed p ro ce du re s re m ai ni ng c ur re nt a nd e ff ec tiv e R is k D riv er s • Pr oc es se s no t a lig ne d w ith b us in es s ob je ct iv es • St af f m em be rs n ot k no w in g ho w to pe rf or m c ri tic al ta sk s • Po lic y vi ol at io ns P C 5 P o li c y, P la n s a n d P ro c e d u re s Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at s uc h ru le s ex is t a nd a re c om m un ic at ed , k no w n an d ap pl ie d to h ow a ll IT p ro ce ss -r el at ed d oc um en ta tio n (e .g ., po lic ie s, p la ns , pr oc ed ur es , g ui de lin es , i ns tr uc tio ns , m et ho do lo gi es ) th at d ri ve s an I T p ro ce ss w ill b e de ve lo pe d, d oc um en te d, r ev ie w ed , m ai nt ai ne d, a pp ro ve d, s to re d, u se d fo r tr ai ni ng an d co m m un ic at ed . • In sp ec t s el ec te d po lic ie s, p la ns a nd p ro ce du re s to v er if y if th ey w er e cr ea te d fo llo w in g th e ru le s an d ar e ke pt u p to d at e. • E nq ui re w he th er a nd c on fi rm th at r es po ns ib ili tie s ar e de fi ne d fo r de ve lo pi ng , m ai nt ai ni ng , s to ri ng a nd c om m un ic at in g pr oc es s- re la te d do cu m en ta tio n. • E nq ui re w he th er a nd c on fi rm th at th er e ar e do cu m en te d pr oc es se s un de r w hi ch p ol ic ie s an d pr oc ed ur es a re id en tif ie d, d ev el op ed , a pp ro ve d, r ev ie w ed a nd m ai nt ai ne d to pr ov id e co ns is te nt g ui da nc e. Te st t he O ut co m e of t he C on tr ol O bj ec ti ve • V er if y th at th os e w ho p er fo rm th e ac tiv iti es u nd er st an d th ei r re sp on si bi lit y. • In sp ec t s el ec te d do cu m en ts to v er if y th at th ey a re u p to d at e an d un de rs to od . • R ev ie w I T p ro ce ss -r el at ed d oc um en ta tio n an d ve ri fy if s ig n- of f is d on e at th e ap pr op ri at e le ve l. • R ev ie w if I T p ro ce ss -r el at ed d oc um en ta tio n is a cc es si bl e, c or re ct , u nd er st oo d an d up to d at e. • E ns ur e th at p ol ic ie s ar e ef fe ct iv el y pr om ul ga te d th ro ug h aw ar en es s an d tr ai ni ng . • A ss es s, th ro ug h in te rv ie w s at a ll st af f le ve ls , w he th er th e po lic ie s an d pr oc ed ur es a re c le ar ly u nd er st oo d an d su pp or t t he b us in es s ob je ct iv es . D oc um en t th e Im pa ct o f C on tr ol W ea kn es se s A ss es s w he th er a ll po lic ie s, p la ns a nd p ro ce du re s su ff ic ie nt ly s up po rt a ch ie vi ng b us in es s pr oc es si ng s er vi ce s to m ee t s ho rt - an d lo ng -r an ge o rg an is at io na l o bj ec tiv es . IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org50 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss is in p la ce to e st ab lis h ke y m et ri cs d es ig ne d to p ro vi de a h ig h le ve l o f in si gh t i nt o th e op er at io ns w ith li m ite d ef fo rt . • V er if y th at th e de si gn o f th e m et ri cs e na bl es m ea su re m en t o f ac hi ev em en t o f th e pr oc es s go al s, r es ou rc e ut ili sa tio n, o ut pu t q ua lit y an d th ro ug hp ut ti m e to s up po rt im pr ov em en t o f th e pr oc es s pe rf or m an ce a nd o ut co m e. • E nq ui re w he th er a nd c on fi rm th at r el at io ns hi ps b et w ee n ou tc om e an d pe rf or m an ce m et ri cs h av e be en d ef in ed a nd in te gr at ed in to th e en te rp ri se ’s p er fo rm an ce m an ag em en t s ys te m ( e. g. , b al an ce d sc or ec ar d) w he re a pp ro pr ia te . • E nq ui re w he th er a nd c on fi rm th at p ro ce du re s ha ve b ee n de si gn ed to id en tif y sp ec if ic ta rg et s fo r pr oc es s go al s an d pe rf or m an ce d ri ve rs . T he p ro ce du re s sh ou ld d ef in e ho w th e da ta w ill b e ob ta in ed , i nc lu di ng m ec ha ni sm s to f ac ili ta te p ro ce ss m ea su re m en t ( e. g. , a ut om at ed a nd in te gr at ed to ol s, te m pl at es ). • E nq ui re w he th er a nd c on fi rm th at p ro ce ss es e xi st to o bt ai n an d co m pa re a ct ua l r es ul ts to e st ab lis he d in te rn al a nd e xt er na l b en ch m ar ks a nd g oa ls . V er if y th at f or k ey pr oc es se s, m an ag em en t c om pa re s pr oc es s pe rf or m an ce a nd p ro ce ss o ut co m es a ga in st in te rn al a nd e xt er na l b en ch m ar ks a nd c on si de rs th e re su lt of th e an al ys is f or pr oc es s im pr ov em en t. Te st t he O ut co m e of t he C on tr ol O bj ec ti ve • E nq ui re w he th er a nd c on fi rm th at a pp ro pr ia te m et ri cs a re d ef in ed to a ss es s pr oc es s pe rf or m an ce a nd a ch ie ve m en t o f th e pr oc es s go al s. • A na ly se s om e of th e ke y m et ri cs a nd c or ro bo ra te , v ia o th er m ea ns , w he th er th ey p ro vi de s uf fi ci en t i ns ig ht in to g oa ls . • E nq ui re w he th er a ndc on fi rm th at ta rg et s ha ve b ee n de fi ne d fo r pr oc es s go al s an d pe rf or m an ce d ri ve rs . R ev ie w ta rg et s an d as se ss w he th er th ey a lig n to th e go al s an d en ab le e ff ic ie nt a nd a pp ro pr ia te id en tif ic at io n of c or re ct iv e ac tio n. • R ev ie w th e pr oc ed ur es f or c ol le ct in g da ta a nd m ea su re m en t t o as ce rt ai n th e ef fe ct iv en es s an d ef fi ci en cy o f m on ito ri ng . • In te rv ie w p ro ce ss o w ne rs a nd s ta ke ho ld er s to a ss es s th e ap pr op ri at en es s of th e m ea su re m en t m et ho d an d m ec ha ni sm s. • Fo r si gn if ic an t g oa ls o f im po rt an t p ro ce ss es , r ep er fo rm d at a co lle ct io n an d m ea su re m en t o f ta rg et s. • In sp ec t a s am pl e of p ro ce ss m et ri cs to a ss es s th e ap pr op ri at en es s of r el at io ns hi ps b et w ee n m et ri cs ( i.e ., w he th er a p er fo rm an ce m et ri c pr ov id es in si gh t i nt o th e lik el y ac hi ev em en t o f th e pr oc es s ou tc om e) . • O bt ai n an d re vi ew m aj or d ev ia tio ns a ga in st ta rg et s an d co nf ir m th at a ct io n w as ta ke n. I ns pe ct th e lis t o f ac tio ns ta ke n as a r es ul t o f m ea su re m en t, an d ve ri fy w he th er th ey ha ve le d to a ct ua l i m pr ov em en ts . • E nq ui re if in te rn al a nd e xt er na l b en ch m ar ks a re u se d an d, if s o, a ss es s th ei r re le va nc e an d id en tif y if a pp ro pr ia te a ct io n is ta ke n on s ig ni fi ca nt d ev ia tio ns a ga in st th e be nc hm ar ks . D oc um en t th e Im pa ct o f C on tr ol W ea kn es se s D et er m in e th e bu si ne ss im pa ct if a s et o f ke y m et ri cs is n ot a va ila bl e to m ea su re th e ac hi ev em en t o f th e pr oc es s go al s, r es ou rc e ut ili sa tio n, o ut pu t q ua lit y an d th ro ug hp ut tim e to s up po rt im pr ov em en t o f th e pr oc es s pe rf or m an ce a nd o ut co m e. Id en tif y a se t o f m et ri cs th at p ro vi de s in si gh t i nt o th e ou tc om es a nd p er fo rm an ce of th e pr oc es s. E st ab lis h ta rg et s th at r ef le ct o n th e pr oc es s go al s an d th e pe rf or m an ce d ri ve rs th at e na bl e th e ac hi ev em en t o f pr oc es s go al s. D ef in e ho w th e da ta a re to b e ob ta in ed . C om pa re a ct ua l m ea su re m en t t o th e ta rg et a nd ta ke ac tio n up on d ev ia tio ns , w he re n ec es sa ry . A lig n m et ri cs , t ar ge ts a nd m et ho ds w ith IT ’s o ve ra ll pe rf or m an ce m on ito ri ng a pp ro ac h. Va lu e D riv er s C on tr ol O bj ec ti ve • Pr oc es s co st s op tim is ed • Pr oc es se s ni m bl e an d re sp on si ve to bu si ne ss n ee ds R is k D riv er s • Pr oc es s ou tc om es a nd d el iv er ab le s no t in li ne w ith o ve ra ll IT a nd b us in es s ob je ct iv es • Pr oc es se s to o co st ly • Pr oc es se s sl ow to r ea ct to b us in es s ne ed s P C 6 P ro c e s s P e rf o rm a n c e I m p ro ve m e n t A P P E N D IX II— P L A N A N D O R G A N ISE (P O )A P P E N D I X I I — P L A N A N D O R G A N I S E ( P O ) PO1 Define a Strategic IT Plan PO2 Define the Information Architecture PO3 Determine Technological Direction PO4 Define the IT Processes, Organisation and Relationships PO5 Manage the IT Investment PO6 Communicate Management Aims and Direction PO7 Manage IT Human Resources PO8 Manage Quality PO9 Assess and Manage IT Risks PO10 Manage Projects 51© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II A PP E N D IX II — PL A N A N D O R G A N IS E (P O ) P R O C ES S A SS U R A N C E ST EP S P O 1 D e fi n e a S tr a te g ic I T P la n IT s tr at eg ic p la nn in g is r eq ui re d to m an ag e an d di re ct a ll IT r es ou rc es in li ne w ith th e bu si ne ss s tr at eg y an d pr io ri tie s. T he I T f un ct io n an d bu si ne ss s ta ke ho ld er s ar e re sp on si bl e fo r en su ri ng th at o pt im al v al ue is r ea lis ed f ro m p ro je ct a nd s er vi ce p or tf ol io s. T he s tr at eg ic p la n sh ou ld im pr ov e ke y st ak eh ol de rs ’u nd er st an di ng o f IT op po rt un iti es a nd li m ita tio ns , a ss es s cu rr en t p er fo rm an ce a nd c la ri fy th e le ve l o f in ve st m en t r eq ui re d. T he b us in es s st ra te gy a nd p ri or iti es a re to b e re fl ec te d in p or tf ol io s an d ex ec ut ed b y th e IT ta ct ic al p la n( s) , w hi ch e st ab lis he s co nc is e ob je ct iv es , p la ns a nd ta sk s un de rs to od a nd a cc ep te d by b ot h bu si ne ss a nd I T. • E nq ui re w he th er a nd c on fi rm th at th e pr oc es s fo r pr ep ar in g a bu si ne ss c as e ex is ts ( e. g. , t he p ro ce ss w ill g ui de e nt ry /e xi t c ri te ri a fo r bu si ne ss c as e de ve lo pm en t, th e re vi ew p ro ce ss , m ea su re m en ts , t he c ha ng e m an ag em en t p ro ce ss f or th e bu si ne ss c as e) . • E nq ui re w he th er a nd c on fi rm th at th e m on ito ri ng p ro ce ss f or th e bu si ne ss c as e is b as ed u po n es ta bl is he d be nc hm ar ks , s uc h as th os e in o rg an is at io na l S L A s or in du st ry an d te ch ni ca l s ta nd ar ds . • E nq ui re w he th er a nd c on fi rm th at th e su cc es se s an d fa ilu re s of I T in ve st m en t p ro gr am m es a re r ev ie w ed a nd th e bu si ne ss c as e an al ys is p ro ce ss is e nh an ce d as r eq ui re d (e .g ., hi st or ic al d at a sh ou ld b e an al ys ed , a nd im pr ov em en ts , l es so ns le ar ne d an d be st p ra ct ic es s ho ul d be r ef er en ce d) . Te st t he C on tr ol D es ig n P O 1. 1 IT V al ue M an ag em en t W or k w ith th e bu si ne ss to e ns ur e th at th e en te rp ri se p or tf ol io o f IT -e na bl ed in ve st m en ts c on ta in s pr og ra m m es th at h av e so lid b us in es s ca se s. R ec og ni se th at th er e ar e m an da to ry , s us ta in in g an d di sc re tio na ry in ve st m en ts th at d if fe r in co m pl ex ity a nd d eg re e of f re ed om in a llo ca tin g fu nd s. I T p ro ce ss es s ho ul d pr ov id e ef fe ct iv e an d ef fi ci en t d el iv er y of th e IT c om po ne nt s of p ro gr am m es a nd ea rl y w ar ni ng o f an y de vi at io ns f ro m p la n, in cl ud in g co st , s ch ed ul e or fu nc tio na lit y, th at m ig ht im pa ct th e ex pe ct ed o ut co m es o f th e pr og ra m m es . I T se rv ic es s ho ul d be e xe cu te d ag ai ns t e qu ita bl e an d en fo rc ea bl e SL A s. A cc ou nt ab ili ty f or a ch ie vi ng the be ne fi ts a nd c on tr ol lin g th e co st s sh ou ld b e cl ea rl y as si gn ed a nd m on ito re d. E st ab lis h fa ir , t ra ns pa re nt , r ep ea ta bl e an d co m pa ra bl e ev al ua tio n of b us in es s ca se s, in cl ud in g fi na nc ia l w or th , t he r is k of no t d el iv er in g a ca pa bi lit y an d th e ri sk o f no t r ea lis in g th e ex pe ct ed b en ef its . Va lu e D riv er s C on tr ol O bj ec ti ve • IT in ve st m en ts ’b en ef it tr an sp ar en t an d ef fe ct iv e to th e en te rp ri se • A n ef fe ct iv e de ci si on -m ak in g pr oc es s to e ns ur e th at in ve st m en ts in I T de liv er ta ng ib le b us in es s be ne fi t • IT in ve st m en ts in li ne w ith th e bu si ne ss o bj ec tiv es • Sh ar ed u nd er st an di ng r eg ar di ng c os t, ri sk a nd b en ef its o f IT -e na bl ed bu si ne ss in iti at iv es • D ir ec t r el at io ns hi p be tw ee n bu si ne ss go al s an d us e of r es ou rc es f or I T R is k D riv er s • In ef fe ct iv e de ci si on m ak in g le ad in g to in ve st m en ts in I T th at h av e in su ff ic ie nt r et ur n or a n eg at iv e im pa ct o n th e or ga ni sa tio n • IT n ot a lig ne d w ith th e bu si ne ss • IT v al ue m an ag em en t l ac ki ng th e su pp or t a nd c om m itm en t o f se ni or m an ag em en t • U nd ef in ed o r co nf us in g ac co un ta bi lit y an d re sp on si bi lit y • C os ts , b en ef its a nd r is ks o f IT -e na bl ed bu si ne ss in iti at iv es u nc le ar o r m is un de rs to od • IT n ot c om pl ia nt w ith g ov er na nc e re qu ir em en ts , p ot en tia lly im pa ct in g m an ag em en t’s a nd th e bo ar d’ s pu bl ic re sp on si bi lit y IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org52 Te st t he C on tr ol D es ig n • C on fi rm th at th e pr oc es s fo r co m m un ic at in g bu si ne ss o pp or tu ni tie s w ith I T m an ag em en t i s re vi ew ed a nd th e im po rt an ce o f th e pr oc es s is c om m un ic at ed to th e bu si ne ss an d IT . C on si de r th e up da te f re qu en cy o f th os e pr oc es se s. • E nq ui re w he th er a nd c on fi rm th ro ug h in te rv ie w s w ith m em be rs o f IT m an ag em en t t ha t t he y he lp ed d ef in e en te rp ri se g oa ls . A sk th em a bo ut th ei r ac co un ta bi lit y fo r ac hi ev in g en te rp ri se g oa ls , d et er m in e if th ey u nd er to ok w ha t- if a na ly se s an d co nf ir m th ei r co m m itm en t t o th e go al s. • E nq ui re w ith b us in es s m an ag em en t a nd I T m an ag em en t t o id en tif y bu si ne ss p ro ce ss es th at a re d ep en de nt o n IT . C on si de r w he th er t he b us in es s an d IT s ha re th e sa m e vi ew o f sy st em s, in cl ud in g th ei r cr iti ca lit y, u sa ge a nd r ep or tin g. Va lu e D riv er s C on tr ol O bj ec ti ve R is k D riv er s P O 1. 2 B us in es s- IT A lig nm en t E st ab lis h pr oc es se s of b i- di re ct io na l e du ca tio n an d re ci pr oc al in vo lv em en t i n st ra te gi c pl an ni ng to a ch ie ve b us in es s an d IT a lig nm en t a nd in te gr at io n. M ed ia te be tw ee n bu si ne ss a nd I T im pe ra tiv es s o pr io ri tie s ca n be m ut ua lly a gr ee d. • IT a lig ne d w ith th e or ga ni sa tio n’ s m is si on a nd g oa ls • IT e na bl in g th e ac hi ev em en t o f th e st ra te gi c bu si ne ss o bj ec tiv es • O pt im is ed r et ur n on I T in ve st m en t • O pp or tu ni tie s fo r in no va tio n id en tif ie d an d ex pl oi te d • IT s ee n as a c os t f ac to r • T he e nt er pr is e’ s m is si on n ot b ei ng su pp or te d by it s IT • IT m an ag em en t d ec is io ns n ot fo llo w in g th e bu si ne ss d ir ec tio n • L ac k of c om m on u nd er st an di ng o f bu si ne ss a nd I T p ri or iti es , l ea di ng to co nf lic ts a bo ut a llo ca tio n of r es ou rc es an d pr io ri tie s • M is se d op po rt un iti es to e xp lo it ne w IT c ap ab ili tie s P O 1 D e fi n e a S tr a te g ic I T P la n ( c o n t. ) 53© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • C on fi rm th at a pp ro pr ia te c ri te ri a, s ta nd ar ds a nd p er fo rm an ce in di ca to rs h av e be en e st ab lis he d an d us ed to a ss es s an d re po rt p er fo rm an ce to m an ag em en t a nd k ey st ak eh ol de rs . A n ac tio n pl an f or v ar ia tio ns a nd a d ev ia tio n pr oc es s sh ou ld e xi st . • R ev ie w th e pe rf or m an ce in di ca to rs e st ab lis he d fo r ke y sy st em s an d pr oc es se s (e .g ., st re ng th s an d w ea kn es se s, f un ct io na lit y, d eg re e of b us in es s au to m at io n, s ta bi lit y, co m pl ex ity , d ev el op m en t r eq ui re m en ts , t ec hn ol og y al ig nm en t a nd d ir ec tio n, s up po rt a nd m ai nt en an ce r eq ui re m en ts , c os ts , e xt er na l p ar tie s’ in pu t) . • C on fi rm th at r ev ie w s ex is t w ith r eg ar d to th e ac hi ev em en t o f ag re ed -u po n ta rg et s de fi ne d w ith in th e pr ev io us ta ct ic al I T p la n. • C on fi rm th at a c om pa ri so n ag ai ns t w el l- un de rs to od a nd r el ia bl e in du st ry , t ec hn ol og y or o th er r el ev an t b en ch m ar ks is p er fo rm ed to h el p as se ss e xi st in g sy st em s an d ca pa bi lit ie s. C on tr ol O bj ec ti ve R is k D riv er s Va lu e D riv er s P O 1. 3 A ss es sm en t of C ur re nt C ap ab ili ty a nd P er fo rm an ce A ss es s th e cu rr en t c ap ab ili ty a nd p er fo rm an ce o f so lu tio n an d se rv ic e de liv er y to es ta bl is h a ba se lin e ag ai ns t w hi ch f ut ur e re qu ir em en ts c an b e co m pa re d. D ef in e pe rf or m an ce in te rm s of I T ’s c on tr ib ut io n to b us in es s ob je ct iv es , f un ct io na lit y, st ab ili ty , c om pl ex ity , c os ts , s tr en gt hs a nd w ea kn es se s. • IT p la ns c on tr ib ut in g tr an sp ar en tly to th e or ga ni sa tio n’ s m is si on a nd g oa ls • C la ri ty o f co st s, b en ef its a nd r is ks o f IT ’s c ur re nt p er fo rm an ce • Te ch no lo gi ca l o pp or tu ni tie s id en tif ie d an d ca pa bi lit ie s le ve ra ge d • IT ca pa bi lit ie s kn ow n an d op er at io na lis ed e ff ec tiv el y an d ef fi ci en tly to d el iv er th e re qu ir ed so lu tio ns a nd s er vi ce s • IT c ap ab ili tie s no t c on tr ib ut in g to th e or ga ni sa tio n’ s m is si on a nd g oa ls • In ve st m en t d ec is io ns ta ke n to o la te • O pp ortu ni tie s an d ca pa bi lit ie s no t le ve ra ge d • In ef fe ct iv e us e of e xi st in g re so ur ce s • In ab ili ty to id en tif y ba se lin es f or cu rr en t, an d re qu ir em en ts f or f ut ur e, sy st em c ap ab ili ty a nd p er fo rm an ce P O 1 D e fi n e a S tr a te g ic I T P la n ( c o n t. ) IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org54 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss w as f ol lo w ed to d oc um en t I T ’s g oa ls a nd o bj ec tiv es n ec es sa ry to p er fo rm it s ta sk s. T he y sh ou ld b e de fi ne d, d oc um en te d an d co m m un ic at ed , i nc lu di ng th e: – A ch ie ve m en t o f th e be ne fi ts a nd m an ag em en t o f th e ri sk s of th e IT c ap ab ili tie s – E st ab lis hm en t o f th e cu rr en t a nd f ut ur e pe rf or m an ce r eq ui re d to r es po nd to b us in es s ex pe ct at io ns – Pr ov is io n of in fo rm at io n on tr an sp ar en cy a nd h ow I T d el iv er s va lu e to th e bu si ne ss • E nq ui re w he th er a nd c on fi rm th at th er e is a ti m e fr am e fo r th e de ve lo pm en t a nd e xe cu tio n of th e st ra te gi c an d ta ct ic al p la ns . T hi s tim e fr am e sh ou ld in cl ud e th e in te rr el at io ns hi ps a nd d ep en de nc ie s of th e ex ec ut io n of th e ta ct ic al p la ns . T he ti m e fr am e co ul d va ry b as ed o n sc op e, f un di ng a nd p ri or iti sa tio n. • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss to c ap tu re o ut co m e m ea su re s, r ep re se nt ed b y m et ri cs ( w ha t) a nd ta rg et s (h ow m uc h) , o f IT o bj ec tiv es e xi st s an d th at th e m ea su re s re la te to b us in es s- id en tif ie d be ne fi ts a nd th e st ra te gy ’s d ir ec tio n. • C on fi rm a nd r ev ie w th e po lic ie s an d pr oc ed ur es s up po rt in g th e st ru ct ur ed p la nn in g ap pr oa ch to d et er m in e if th ey e ff ec tiv el y su pp or t t he p ro ce ss f or c re at in g an I T st ra te gi c pl an . P O 1. 4 IT S tr at eg ic P la n C re at e a st ra te gi c pl an th at d ef in es , i n co -o pe ra tio n w ith r el ev an t s ta ke ho ld er s, ho w I T g oa ls w ill c on tr ib ut e to th e en te rp ri se ’s s tr at eg ic o bj ec tiv es a nd r el at ed co st s an d ri sk s. I t s ho ul d in cl ud e ho w I T w ill s up po rt I T- en ab le d in ve st m en t pr og ra m m es , I T s er vi ce s an d IT a ss et s. I T s ho ul d de fi ne h ow th e ob je ct iv es w ill be m et , t he m ea su re m en ts to b e us ed a nd th e pr oc ed ur es to o bt ai n fo rm al s ig n- of f fr om th e st ak eh ol de rs . T he I T s tr at eg ic p la n sh ou ld c ov er in ve st m en t/o pe ra tio na l b ud ge t, fu nd in g so ur ce s, s ou rc in g st ra te gy , a cq ui si tio n st ra te gy , a nd le ga l a nd r eg ul at or y re qu ir em en ts . T he s tr at eg ic p la n sh ou ld b e su ff ic ie nt ly d et ai le d to a llo w f or th e de fi ni tio n of ta ct ic al I T p la ns . • St ra te gi c IT p la ns c on si st en t w ith bu si ne ss o bj ec tiv es • St ra te gi c ob je ct iv es a nd a ss oc ia te d ac co un ta bi lit ie s cl ea r an d un de rs to od by a ll • IT s tr at eg ic o pt io ns id en tif ie d an d st ru ct ur ed , a nd in te gr at ed w ith th e bu si ne ss p la ns • R ed uc ed li ke lih oo d of u nn ec es sa ry I T in iti at iv es • St ra te gi c IT p la ns c om pl et e an d us ab le • B us in es s re qu ir em en ts n ot u nd er st oo d or a dd re ss ed b y IT m an ag em en t • N o re gu la r an d fo rm al c on su lta tio n be tw ee n IT m an ag em en t a nd b us in es s an d se ni or m an ag em en t • IT p la ns n ot a lig ne d w ith b us in es s ne ed s • U nn ec es sa ry I T in iti at iv es a nd in ve st m en ts • IT p la ns in co ns is te nt w ith th e or ga ni sa tio n’ s ex pe ct at io ns o r re qu ir em en ts • IT n ot f oc us ed o n th e ri gh t p ri or iti es P O 1 D e fi n e a S tr a te g ic I T P la n ( c o n t. ) R is k D riv er s Va lu e D riv er s C on tr ol O bj ec ti ve 55© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at ta ct ic al I T p la ns e xi st a nd th at th ey h av e be en b as ed o n th e IT s tr at eg ic p la n. • C on fi rm th at th is is d on e in a s tr uc tu re d m an ne r in a cc or da nc e w ith e st ab lis he d pr oc es se s an d th at th er e is n o un du e de la y be tw ee n up da te s of th e st ra te gi c pl an a nd th e su bs eq ue nt u pd at e of th e ta ct ic al p la ns . • V al id at e th at th e co nt en ts o f th e IT ta ct ic al p la n ar e ad eq ua te a nd th at it c on ta in s pr op er p ro je ct d ef in iti on s, p la nn in g in fo rm at io n, d el iv er ab le s an d qu an tif ie d es tim at ed be ne fi ts . • R ev ie w w he th er th e ta ct ic al p la n ad dr es se s IT -r el at ed r is k. Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss is in p la ce th at e na bl es id en tif ic at io n an d pr io ri tis at io n (b as ed o n bu si ne ss b en ef its ) of I T p ro gr am m es a nd p ro je ct s su pp or tin g th e IT ta ct ic al p la n. • C on fi rm th at th is p ro ce ss o f po rt fo lio m an ag em en t u se s ap pr op ri at e cr ite ri a to d ef in e an d pr io ri tis e th e di ff er en t p ro je ct s an d pr og ra m m es . • V er if y w he th er b us in es s go al s an d ex pe ct ed b us in es s ou tc om es a re d oc um en te d an d re as on ab le , a nd w he th er s uf fi ci en t i nf or m at io n re la te d to b ud ge t a nd e ff or t i s pr es en t. • C on fi rm th at th e pr og ra m m e/ pr oj ec t o ut co m es a re d ul y co m m un ic at ed to a ll st ak eh ol de rs . P O 1. 5 IT T ac ti ca l P la ns C re at e a po rt fo lio o f ta ct ic al I T p la ns th at a re d er iv ed f ro m th e IT s tr at eg ic p la n. T he ta ct ic al p la ns s ho ul d ad dr es s IT -e na bl ed p ro gr am m e in ve st m en ts , I T s er vi ce s an d IT a ss et s. T he ta ct ic al p la ns s ho ul d de sc ri be r eq ui re d IT in iti at iv es , r es ou rc e re qu ir em en ts , a nd h ow th e us e of r es ou rc es a nd a ch ie ve m en t o f be ne fi ts w ill b e m on ito re d an d m an ag ed . T he ta ct ic al p la ns s ho ul d be s uf fi ci en tly det ai le d to al lo w th e de fi ni tio n of p ro je ct p la ns . A ct iv el y m an ag e th e se t o f ta ct ic al I T p la ns an d in iti at iv es th ro ug h an al ys is o f pr oj ec t a nd s er vi ce p or tf ol io s. • L on g- ra ng e st ra te gi c IT p la ns c ap ab le of b ei ng o pe ra tio na lis ed b y sh or t- ra ng e ta ct ic al I T p la ns • E ff ec tiv e IT r es ou rc e al lo ca tio n • IT p la ns c ap ab le o f be in g co nt in uo us ly m on ito re d an d ev al ua te d • D ay -t o- da y pe rf or m an ce a nd r es ou rc e us ag e ca pa bl e of b ei ng m on ito re d ag ai ns t s tr at eg ic ta rg et s • Fo cu s pr ov id ed f or I T d ep ar tm en t an d st af f • IT lo ng -r an ge p la ns n ot a ch ie ve d • A va ila bl e IT r es ou rc es n ot le ve ra ge d fo r bu si ne ss b en ef its • D ev ia tio ns in I T p la ns n ot id en tif ie d • IT ’s p ri or iti es m is un de rs to od a nd su bj ec t t o ch an ge • In fo rm at io n to m on ito r IT ’s pe rf or m an ce n ot a va ila bl e P O 1 D e fi n e a S tr a te g ic I T P la n ( c o n t. ) R is k D riv er s Va lu e D riv er s C on tr ol O bj ec ti ve P O 1. 6 IT P or tf ol io M an ag em en t A ct iv el y m an ag e w ith th e bu si ne ss th e po rt fo lio o f IT -e na bl ed in ve st m en t pr og ra m m es r eq ui re d to a ch ie ve s pe ci fi c st ra te gi c bu si ne ss o bj ec tiv es b y id en tif yi ng , d ef in in g, e va lu at in g, p ri or iti si ng , s el ec tin g, in iti at in g, m an ag in g an d co nt ro lli ng p ro gr am m es . T hi s sh ou ld in cl ud e cl ar if yi ng d es ir ed b us in es s ou tc om es , e ns ur in g th at p ro gr am m e ob je ct iv es s up po rt a ch ie ve m en t o f th e ou tc om es , u nd er st an di ng th e fu ll sc op e of e ff or t r eq ui re d to a ch ie ve th e ou tc om es , a ss ig ni ng c le ar a cc ou nt ab ili ty w ith s up po rt in g m ea su re s, d ef in in g pr oj ec ts w ith in th e pr og ra m m e, a llo ca tin g re so ur ce s an d fu nd in g, d el eg at in g au th or ity , a nd c om m is si on in g re qu ir ed p ro je ct s at p ro gr am m e la un ch . • E ff ic ie nt I T r es ou rc e m an ag em en t • IT in iti at iv es c on tin uo us ly m on ito re d an d ev al ua te d • T he r ig ht m ix o f IT in iti at iv es f or a po si tiv e an d ri sk -a dj us te d re tu rn o n in ve st m en t ( R O I) • Pe rf or m an ce a nd r es ou rc e re qu ir em en ts o f IT in iti at iv es m on ito re d ag ai ns t d ef in ed ta rg et s • M is se d bu si ne ss o pp or tu ni tie s du e to a to o- co ns er va tiv e po rt fo lio • L ow R O I du e to a to o- ag gr es si ve po rt fo lio • A va ila bl e IT r es ou rc es n ot le ve ra ge d • D ev ia tio ns in I T p la ns n ot id en tif ie d R is k D riv er s Va lu e D riv er s C on tr ol O bj ec ti ve IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org56 Take the following steps to test the outcome of the control objectives: • Confirm through interviews with steering committee members and other sources that the steering committee members are appropriately represented by IT and business unit leadership (e.g., awareness of roles, responsibility, decision matrix and their ownership). • Review the approved steering committee charter and assess for relevance (e.g., roles, responsibility, authority, accountability, scope and objectives are communicated and understood by all members of the committee). • Inspect business cases to determine that the documentation has appropriate content (e.g., scope, objectives, cost-benefit analysis, high-level road map, measures for success, roles and responsibilities, impact of existing IT investment programmes) and that the business cases were developed and approved in a timely manner. Confirm through interviews whether IT-enabled investment programmes, IT services and IT assets are evaluated against the prioritisation criteria (review the documented prioritisation criteria). • Confirm through interviews with members of IT management that they are informed of future business directions and goals, long- term and short-terms goals, mission, and values. • Enquire whether and confirm that enterprisewide goals and objectives are incorporated into IT strategic and tactical planning processes and that the strategic planning process includes all business and support activities. • Confirm by examining documentation, such as meeting minutes or correspondence, that business and IT are both involved in leveraging current technology to create new business opportunities. • Confirm that a report on current information systems (including feedback on the system, use of the system improvements of changes done on the system) is maintained on regular basis. • Review the achievement of agreed-upon targets defined within the previous tactical IT plan (e.g., outcome of the performance evaluation could include, but may not be restricted to, current requirements, current delivery compared with requirements, barriers to achieving requirements, and the steps and costs required to achieve agreed-upon business goals and performance requirements). • Enquire whether and confirm that the risk and cost implications of the required IT capabilities have been documented in the IT strategic plan. • Confirm that the outcome measures that relate to business-identified benefits have been signed off on by the stakeholders and that the feedback from stakeholders has been taken into consideration. • Enquire whether and confirm that the approved IT strategic plan is communicated and that there is a process to determine that the plan is clearly understood. • Confirm through interviews, meeting minutes, presentations and correspondence that the IT strategic plan has been approved by the IT steering committee and the board. Enquire whether and confirm that a formal approval process was followed. • Enquire whether and confirm that tactical plans are aligned to strategic plans and regularly updated. Confirm through interviews that tactical plans are used as the basis for identifying and planning the projects, acquiring and scheduling resources, and implementing monitoring techniques. • Enquire whether and confirm that the content of the tactical plans includes clearly stated project definitions, project time frames and deliverables, the required resources and the business benefits to be monitored, performance indicator goals, mitigation plan, contingency plan, communication protocol, roles, and responsibilities. • Confirm that the selected portfolio/project has been translated into the required effort, resources, finding, achievement, etc., and is approved by business (e.g., meeting minutes, senior management review records). • Confirm that the required authority to launch the approved projects within the selected programmes has been obtained (meeting minutes, formal approval process, communication of approved project) from business and IT. • Confirm that projects that have been delayed or postponed or that have not proceeded are communicated to business owners and involved IT staff members. Take the following steps to document the impact of the control weaknesses: • Assess the risks (e.g., threats, potential vulnerabilities, security, internal controls) due to the improper allocation of IT investment. • Assess theadditional cost due to the return on investment (ROI) not being maximised in terms of business goals. • Assess the risks (e.g., threats, potential vulnerabilities, security, internal controls) due to the IT investments not being properly aligned with the overall business strategy. • Assess the impact of the business investing in self-contained IT systems to meet its requirements. • Assess the possibility of business dissatisfaction with IT service delivery. • Assess the risks (e.g., threats, potential vulnerabilities, security, internal controls) due to the inability to execute IT strategic plans. • Assess the risks (e.g., threats, potential vulnerabilities, security, internal controls) due to projects being started and then failing or incurring unnecessary expenditure. • Assess the additional cost due to the implementation of a suboptimal solution. • Assess the risks (e.g., threats, potential vulnerabilities, security, internal controls) due to business outcomes not being understood and, hence, being less effective. 57© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II P O 2 D e fi n e t h e I n fo rm a ti o n A rc h it e c tu re T he in fo rm at io n sy st em s fu nc tio n cr ea te s an d re gu la rl y up da te s a bu si ne ss in fo rm at io n m od el a nd d ef in es th e ap pr op ri at e sy st em s to o pt im is e th e us e of th is in fo rm at io n. T hi s en co m pa ss es th e de ve lo pm en t o f a co rp or at e da ta d ic tio na ry w ith th e or ga ni sa tio n’ s da ta s yn ta x ru le s, d at a cl as si fi ca tio n sc he m e an d se cu ri ty le ve ls . T hi s pr oc es s im pr ov es th e qu al ity o f m an ag em en t d ec is io n m ak in g by m ak in g su re th at r el ia bl e an d se cu re in fo rm at io n is p ro vi de d, a nd it e na bl es r at io na lis in g in fo rm at io n sy st em s re so ur ce s to a pp ro pr ia te ly m at ch b us in es s st ra te gi es . T hi s IT p ro ce ss is a ls o ne ed ed to in cr ea se a cc ou nt ab ili ty f or th e in te gr ity a nd s ec ur ity o f da ta a nd to e nh an ce th e ef fe ct iv en es s an d co nt ro l o f sh ar in g in fo rm at io n ac ro ss a pp lic at io ns a nd e nt iti es . Te st t he C on tr ol D es ig n • V er if y w he th er a n en te rp ri se in fo rm at io n m od el e xi st s, b as ed o n w el l- ac ce pt ed s ta nd ar ds , a nd w he th er it is k no w n by a pp ro pr ia te b us in es s an d IT s ta ke ho ld er s. • V er if y w he th er th e m od el is e ff ec tiv el y us ed a nd m ai nt ai ne d in p ar al le l w ith th e pr oc es s th at tr an sl at es I T s tr at eg y in to I T ta ct ic al p la ns a nd ta ct ic al p la ns in to p ro je ct s. • A ss es s w he th er th e m od el c on si de rs f le xi bi lit y, f un ct io na lit y, c os t- ef fe ct iv en es s, s ec ur ity , f ai lu re r es ili en cy , c om pl ia nc e, e tc . P O 2. 1 E nt er pr is e In fo rm at io n A rc hi te ct ur e M od el E st ab lis h an d m ai nt ai n an e nt er pr is e in fo rm at io n m od el to e na bl e ap pl ic at io ns de ve lo pm en t a nd d ec is io n- su pp or tin g ac tiv iti es , c on si st en t w ith I T p la ns a s de sc ri be d in P O 1. T he m od el s ho ul d fa ci lit at e th e op tim al c re at io n, u se a nd sh ar in g of in fo rm at io n by th e bu si ne ss in a w ay th at m ai nt ai ns in te gr ity a nd is fl ex ib le , f un ct io na l, co st -e ff ec tiv e, ti m el y, s ec ur e an d re si lie nt to f ai lu re . • Im pr ov ed d ec is io n m ak in g ba se d on re le va nt , r el ia bl e an d us ab le in fo rm at io n • Im pr ov ed I T a gi lit y an d re sp on si ve ne ss to b us in es s re qu ir em en ts • Su pp or t f or b us in es s fu nc tio ns th ro ug h ac cu ra te , c om pl et e an d va lid d at a • E ff ic ie nt d at a m an ag em en t a nd re du ce d re du nd an cy a nd d up lic at io n • Im pr ov ed d at a in te gr ity • M ee tin g fi du ci ar y re qu ir em en ts re ga rd in g co m pl ia nc e re po rt in g, se cu ri ty a nd p ri va cy o f da ta • In ad eq ua te in fo rm at io n fo r bu si ne ss fu nc tio ns • In co ns is te nc y be tw ee n in fo rm at io n re qu ir em en ts a nd a pp lic at io n de ve lo pm en ts • D at a in co ns is te nc y be tw ee n th e or ga ni sa tio n an d sy st em s • H ig h ef fo rt r eq ui re d or in ab ili ty to co m pl y w ith f id uc ia ry o bl ig at io ns (e .g ., co m pl ia nc e re po rt in g, s ec ur ity , pr iv ac y) • In ef fi ci en t p la nn in g of I T- en ab le d in ve st m en t p ro gr am m es d ue to la ck of in fo rm at io n • A cc um ul at io n of d at a th at a re n ot re le va nt , c on si st en t o r us ab le in a n ec on om ic al m an ne r R is k D riv er s Va lu e D riv er s C on tr ol O bj ec ti ve IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org58 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at d at a sy nt ax g ui de lin es a re m ai nt ai ne d. • E nq ui re w he th er a nd c on fi rm th at th e da ta d ic tio na ry is d ef in ed to id en tif y re du nd an cy a nd in co m pa tib ili ty o f da ta a nd th at th e im pa ct o f an y m od if ic at io ns to th e da ta di ct io na ry a nd c ha ng es m ad e to th e da ta d ic tio na ry a re e ff ec tiv el y co m m un ic at ed . • R ev ie w v ar io us a pp lic at io n sy st em s an d de ve lo pm en t p ro je ct s to v er if y th at th e da ta d ic tio na ry is u se d fo r da ta d ef in iti on s. • E nq ui re w he th er a nd c on fi rm th at s en io r m an ag er s ag re e up on th e pr oc es s fo r de fi ni ng d at a sy nt ax r ul es , d at a va lid at io n ru le s an d bu si ne ss r ul es ( e. g. , c on si st en cy , in te gr ity , q ua lit y) . • In sp ec t t he d at a qu al ity p ro gr am m e’ s pl an s, p ol ic ie s an d pr oc ed ur es to e va lu at e its e ff ec tiv en es s. P O 2. 2 E nt er pr is e D at a D ic ti on ar y an d D at a Sy nt ax R ul es M ai nt ai n an e nt er pr is e da ta d ic tio na ry th at in co rp or at es th e or ga ni sa tio n’ s da ta sy nt ax r ul es . T hi s di ct io na ry s ho ul d en ab le th e sh ar in g of d at a el em en ts a m on gs t ap pl ic at io ns a nd s ys te m s, p ro m ot e a co m m on u nd er st an di ng o f da ta a m on gs t I T an d bu si ne ss u se rs , a nd p re ve nt in co m pa tib le d at a el em en ts f ro m b ei ng c re at ed . • C om m on u nd er st an di ng o f bu si ne ss da ta a cr os s th e en te rp ri se • Fa ci lit at ed s ha ri ng o f da ta a m on gs t a ll ap pl ic at io ns , s ys te m s an d en tit ie s • R ed uc ed c os ts f or a pp lic at io n de ve lo pm en ta nd m ai nt en an ce • Im pr ov ed d at a in te gr ity • C om pr om is ed in fo rm at io n in te gr ity • In co m pa tib le a nd in co ns is te nt d at a • In ef fe ct iv e ap pl ic at io n co nt ro ls P O 2 D e fi n e t h e I n fo rm a ti o n A rc h it e c tu re ( c o n t. ) Va lu e D riv er s R is k D riv er s C on tr ol O bj ec ti ve 59© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • R ev ie w th e da ta c la ss if ic at io n sc he m e an d ve ri fy th at a ll si gn if ic an t c om po ne nt s ar e co ve re d an d co m pl et ed , a nd th at th e sc he m e is r ea so na bl e in b al an ci ng c os t v s. r is k. T hi s in cl ud es d at a ow ne rs hi p w ith b us in es s ow ne rs a nd d ef in iti on o f ap pr op ri at e se cu ri ty m ea su re s re la te d to c la ss if ic at io n le ve ls . • V er if y th at s ec ur ity c la ss if ic at io ns h av e be en c ha lle ng ed a nd c on fi rm ed w ith th e bu si ne ss o w ne rs a t r eg ul ar in te rv al s. • E nq ui re w he th er a nd c on fi rm th at in te gr ity a nd c on si st en cy c ri te ri a fo r al l i nf or m at io n ar e de fi ne d in c ol la bo ra tio n w ith b us in es s m an ag em en t. • E nq ui re w he th er a nd c on fi rm th at p ro ce du re s ar e im pl em en te d to m an ag e an d m ai nt ai n da ta in te gr ity a nd c on si st en cy th ro ug ho ut th e co m pl et e da ta p ro ce ss a nd lif e cy cl e. • E nq ui re w he th er a nd c on fi rm th at a d at a qu al ity p ro gr am m e is im pl em en te d to v al id at e an d en su re d at a in te gr ity a nd c on si st en cy o n a re gu la r ba si s. Te st t he C on tr ol D es ig n R is k D riv er s Va lu e D riv er s C on tr ol O bj ec ti ve P O 2. 3 D at a C la ss if ic at io n Sc he m e E st ab lis h a cl as si fi ca tio n sc he m e th at a pp lie s th ro ug ho ut th e en te rp ri se , b as ed o n th e cr iti ca lit y an d se ns iti vi ty ( e. g. , p ub lic , c on fi de nt ia l, to p se cr et ) of e nt er pr is e da ta . T hi s sc he m e sh ou ld in cl ud e de ta ils a bo ut d at a ow ne rs hi p; d ef in iti on o f ap pr op ri at e se cu ri ty le ve ls a nd p ro te ct io n co nt ro ls ; a nd a b ri ef d es cr ip tio n of da ta r et en tio n an d de st ru ct io n re qu ir em en ts , c ri tic al ity a nd s en si tiv ity . I t s ho ul d be u se d as th e ba si s fo r ap pl yi ng c on tr ol s su ch a s ac ce ss c on tr ol s, a rc hi vi ng or e nc ry pt io n. • E ns ur ed a va ila bi lit y of in fo rm at io n th at s up po rt s de ci si on m ak in g • T he f oc us o f se cu ri ty in ve st m en ts ba se d on c ri tic al ity • D ef in ed a cc ou nt ab ili ty f or in fo rm at io n in te gr ity , a va ila bi lit y an d se cu ri ty • D at a ac ce ss c on si st en tly p er m itt ed ba se d on d ef in ed s ec ur ity le ve ls • In ap pr op ri at e se cu ri ty r eq ui re m en ts • In ad eq ua te o r ex ce ss iv e in ve st m en ts in se cu ri ty c on tr ol s • O cc ur re nc e of p ri va cy , d at a co nf id en tia lit y, in te gr ity a nd av ai la bi lit y in ci de nt s • N on -c om pl ia nc e w ith r eg ul at or y or th ir d- pa rt y re qu ir em en ts • In ef fi ci en t o r in co ns is te nt in fo rm at io n fo r de ci si on m ak in g P O 2 D e fi n e t h e I n fo rm a ti o n A rc h it e c tu re ( c o n t. ) P O 2. 4 In te gr it y M an ag em en t D ef in e an d im pl em en t p ro ce du re s to e ns ur e th e in te gr ity a nd c on si st en cy o f al l da ta s to re d in e le ct ro ni c fo rm , s uc h as d at ab as es , d at a w ar eh ou se s an d da ta ar ch iv es . Va lu e D riv er s C on tr ol O bj ec ti ve • C on si st en cy o f da ta in te gr ity a cr os s al l da ta s to re d • Im pr ov ed d at a in te gr ity R is k D riv er s • D at a in te gr ity e rr or s an d in ci de nt s • U nr el ia bl e da ta o n w hi ch to b as e bu si ne ss d ec is io ns • N on -c om pl ia nc e w ith r eg ul at or y or th ir d- pa rt y re qu ir em en ts • U nr el ia bl e ex te rn al r ep or ts IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org60 Take the following steps to test the outcome of the control objectives: • Review documentation of the information architecture model to determine whether it addresses all significant applications and their interfaces and relationships. • Review information architecture documentation to verify that it is consistent with the organisation’s strategy and strategic and tactical IT plans. • Ensure that changes made to the information architecture model reflect those in the IT strategic and tactical plans and that associated costs and risks are identified. • Enquire whether and confirm that business management and IT understand relevant parts of the information architecture model (e.g., data ownership, accountability, data governance). • Enquire whether and confirm that the information architecture model is regularly checked for adequacy, flexibility, integrity and security and that it is subject to frequent user reviews (e.g., impact of information system changes). • Enquire whether and confirm that data administration controls exist, and co-ordinate the definitions and usage of reliable and relevant data consistent with the enterprise information model. • Review the data dictionary and verify that all significant data elements are described properly as per the defined process. • Verify defined data syntax rules, data validation rules and business rules as per the defined process. • Enquire whether and confirm that metadata in data dictionaries are sufficiently detailed to communicate syntax in an integrated manner across applications and that they include data attributes and security levels for each data item. • Enquire whether and confirm that data dictionary management is implemented, maintained and reviewed periodically to manage the organisation’s data dictionary and data syntax rules. • Verify whether the system covers all relevant data elements by comparing a list of data with actual implementation in the tool. • Enquire whether and confirm that a data quality programme is implemented to increase data integrity, standardisation, consistency, one-time data entry and storage (e.g., use automated evidence collection when possible to test data integrity, standardisation, consistency, one-time data-entry and storage from sample data, embedded audit modules, data analysis using audit software or other integration tools). Use automated tools (e.g., computer-assisted audit techniques [CAATs]) to verify data integrity. • Enquire whether and confirm that a data classification scheme is defined and approved (e.g, security levels, access levels and defaults are appropriate). • Enquire whether and confirm that data classification levels are defined based on organisation needs for information protection and the business impact of unprotected information. • Verify that business owners review the actual classification of information and areaware of their roles, responsibilities and accountability for data. • Enquire whether and confirm that components inherit the classification of the original assets. • Verify that all deviations from the data classification inheritance policy have been approved by the data owner. • Enquire whether and confirm that information and data (including hard copies of data) are labelled, handled, protected and otherwise secured in a manner consistent with the data classification categories. • Inspect evidence that the required integrity and consistency criteria for data are defined and implemented (e.g., data stored in databases and data warehouses are consistent). • Enquire whether and confirm that a data quality programme is implemented to validate and ensure data integrity and consistency on a regular basis. Take the following steps to document the impact of the control weaknesses: • Assess the impact of inconsistency amongst IT plans described in strategic planning and the enterprise information architecture model. • Assess the impact of ineffective interface between business and IT decision making. • Assess the vulnerability to disclosure of sensitive information. 61© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II P O 3 D e te rm in e T e c h n o lo g ic a l D ir e c ti o n T he in fo rm at io n se rv ic es f un ct io n de te rm in es th e te ch no lo gy d ir ec tio n to s up po rt th e bu si ne ss . T hi s re qu ir es th e cr ea tio n of a te ch no lo gi ca l i nf ra st ru ct ur e pl an a nd a n ar ch ite ct ur e bo ar d th at s et s an d m an ag es c le ar a nd r ea lis tic e xp ec ta tio ns o f w ha t t ec hn ol og y ca n of fe r in te rm s of p ro du ct s, s er vi ce s an d de liv er y m ec ha ni sm s. T he p la n is re gu la rl y up da te d an d en co m pa ss es a sp ec ts s uc h as s ys te m s ar ch ite ct ur e, te ch no lo gi ca l d ir ec tio n, a cq ui si tio n pl an s, s ta nd ar ds , m ig ra tio n st ra te gi es a nd c on tin ge nc y. T hi s en ab le s tim el y re sp on se s to c ha ng es in th e co m pe tit iv e en vi ro nm en t, ec on om ie s of s ca le f or in fo rm at io n sy st em s st af fi ng a nd in ve st m en ts , a s w el l a s im pr ov ed in te ro pe ra bi lit y of p la tf or m s an d ap pl ic at io ns . Te st t he C on tr ol D es ig n • R ev ie w th e pr oc es s of s tr en gt hs , w ea kn es se s, o pp or tu ni tie s an d th re at s (S W O T ) an al ys is p er fo rm an ce to e ns ur e ef fe ct iv en es s of p ro ce ss ( e. g. , c he ck f or m ea su re m en ts o f th e pr oc es s an d ch an ge s m ad e to th e pr oc es s as a r es ul t o f im pr ov em en t) . • C on fi rm th ro ug h in te rv ie w s w ith th e C IO a nd o th er m em be rs o f se ni or m an ag em en t t ha t a n ap pr op ri at e te ch no lo gi ca l r is k ap pe tit e ha s be en e st ab lis he d ba se d on th e bu si ne ss s tr at eg y. P O 3. 1 T ec hn ol og ic al D ir ec ti on P la nn in g A na ly se e xi st in g an d em er gi ng te ch no lo gi es , a nd p la n w hi ch te ch no lo gi ca l di re ct io n is a pp ro pr ia te to r ea lis e th e IT s tr at eg y an d th e bu si ne ss s ys te m s ar ch ite ct ur e. A ls o id en tif y in th e pl an w hi ch te ch no lo gi es h av e th e po te nt ia l t o cr ea te b us in es s op po rt un iti es . T he p la n sh ou ld a dd re ss s ys te m s ar ch ite ct ur e, te ch no lo gi ca l d ir ec tio n, m ig ra tio n st ra te gi es a nd c on tin ge nc y as pe ct s of in fr as tr uc tu re c om po ne nt s. Va lu e D riv er s C on tr ol O bj ec ti ve • Im pr ov ed le ve ra gi ng o f te ch no lo gy f or bu si ne ss o pp or tu ni tie s • Im pr ov ed in te gr at io n of in fr as tr uc tu re an d ap pl ic at io ns v ia d ef in ed s ta nd ar ds fo r te ch ni ca l d ir ec tio n • Im pr ov ed u se o f re so ur ce s an d ca pa bi lit ie s • R ed uc ed c os ts f or te ch no lo gi ca l ac qu is iti on s th ro ug h re du ce d pl at fo rm s an d in cr em en ta lly m an ag ed in ve st m en ts R is k D riv er s • Te ch no lo gi ca l a cq ui si tio ns in co ns is te nt w ith s tr at eg ic p la ns • IT in fr as tr uc tu re in ap pr op ri at e fo r or ga ni sa tio na l r eq ui re m en ts • D ev ia tio ns f ro m th e ap pr ov ed te ch no lo gi ca l d ir ec tio n • In cr ea se d co st s du e to u nc o- or di na te d an d un st ru ct ur ed a cq ui si tio n pl an s IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org62 Te st t he C on tr ol D es ig n • D et er m in e w he th er , b y w ho m a nd h ow c ur re nt a nd f ut ur e tr en ds a nd r eg ul at io ns a re m on ito re d (e .g ., te ch no lo gi ca l d ev el op m en ts , c om pe tit or a ct iv iti es , i nf ra st ru ct ur e is su es , l eg al r eq ui re m en ts a nd r eg ul at or y en vi ro nm en t c ha ng es , t hi rd -p ar ty e xp er ts ) an d w he th er r el at ed r is ks o r re la te d op po rt un iti es f or v al ue c re at io n ar e pr op er ly as se ss ed . • V er if y w he th er th e re su lt of th e m on ito ri ng is c on si st en tly p as se d on to th e ap pr op ri at e bo di es ( e. g. , I T s te er in g co m m itt ee ) an d to th e IT ta ct ic al a nd in fr as tr uc tu re pl an ni ng p ro ce ss es f or a ct io n. P O 3. 3 M on it or F ut ur e T re nd s an d R eg ul at io ns E st ab lis h a pr oc es s to m on ito r th e bu si ne ss s ec to r, in du st ry , t ec hn ol og y, in fr as tr uc tu re , l eg al a nd r eg ul at or y en vi ro nm en t t re nd s. I nc or po ra te th e co ns eq ue nc es o f th es e tr en ds in to th e de ve lo pm en t o f th e IT te ch no lo gy in fr as tr uc tu re p la n. Va lu e D riv er s C on tr ol O bj ec ti ve • Im pr ov ed a w ar en es s of te ch no lo gi ca l op po rt un iti es a nd im pr ov ed s er vi ce s • Im pr ov ed a w ar en es s of te ch ni ca l a nd re gu la to ry r is ks • Im pr ov ed e va lu at io n of te ch no lo gi ca l ch an ge s in li ne w ith th e bu si ne ss p la n R is k D riv er s • N on -c om pl ia nc e w ith r eg ul at or y re qu ir em en ts • H ig h ef fo rt r eq ui re d to a ch ie ve co m pl ia nc e be ca us e of w ro ng o r la te de ci si on s • Te ch ni ca l i nc om pa tib ili tie s or m ai nt en an ce is su es w ith in th e IT in fr as tr uc tu re • O rg an is at io na l f ai lu re to m ax im is e th e us e of e m er gi ng te ch no lo gi ca l op po rt un iti es to im pr ov e bu si ne ss a nd IT c ap ab ili ty Te st t he C on tr ol D es ig n • C on fi rm w ith k ey s ta ff m em be rs th at a te ch no lo gy in fr as tr uc tu re p la n ba se d on th e IT s tr at eg ic a nd ta ct ic al p la ns is c re at ed . • R ev ie w th e pl an to c on fi rm th at it incl ud es f ac to rs s uc h as c on si st en t i nt eg ra te d te ch no lo gi es , b us in es s sy st em s ar ch ite ct ur e an d co nt in ge nc y as pe ct s of in fr as tr uc tu re co m po ne nt s, tr an si tio na l a nd o th er c os ts , c om pl ex ity , t ec hn ic al r is ks , f ut ur e fl ex ib ili ty v al ue , a nd p ro du ct /v en do r su st ai na bi lit y an d di re ct io ns f or a cq ui si tio n of I T a ss et s. • E nq ui re w ith k ey s ta ff m em be rs a nd in sp ec t t he te ch no lo gy in fr as tr uc tu re p la n to c on fi rm th at c ha ng es in th e co m pe tit iv e en vi ro nm en t, ec on om ie s of s ca le f or in fo rm at io n sy st em s st af fi ng a nd in ve st m en ts , a nd im pr ov ed in te ro pe ra bi lit y of p la tf or m s an d ap pl ic at io ns a re id en tif ie d. P O 3 D e te rm in e T e c h n o lo g ic a l D ir e c ti o n ( c o n t. ) P O 3. 2 T ec hn ol og y In fr as tr uc tu re P la n C re at e an d m ai nt ai n a te ch no lo gy in fr as tr uc tu re p la n th at is in a cc or da nc e w ith th e IT s tr at eg ic a nd ta ct ic al p la ns . T he p la n sh ou ld b e ba se d on th e te ch no lo gi ca l di re ct io n an d in cl ud e co nt in ge nc y ar ra ng em en ts a nd d ir ec tio n fo r ac qu is iti on o f te ch no lo gy r es ou rc es . I t s ho ul d co ns id er c ha ng es in th e co m pe tit iv e en vi ro nm en t, ec on om ie s of s ca le f or in fo rm at io n sy st em s st af fi ng a nd in ve st m en ts , a nd im pr ov ed in te ro pe ra bi lit y of p la tf or m s an d ap pl ic at io ns . Va lu e D riv er s C on tr ol O bj ec ti ve • Im pr ov ed in te ro pe ra bi lit y • Im pr ov ed e co no m ie s of s ca le f or in ve st m en ts a nd s up po rt s ta ff in g • A te ch no lo gy p la n w ith g oo d ba la nc e in c os t, re qu ir em en ts a gi lit y an d ri sk s • Su ff ic ie nt , s ta bl e an d fl ex ib le te ch no lo gi ca l i nf ra st ru ct ur e to r es po nd to in fo rm at io n re qu ir em en ts R is k D riv er s • In co ns is te nt s ys te m im pl em en ta tio ns • D ev ia tio ns f ro m th e ap pr ov ed te ch no lo gi ca l d ir ec tio n • In cr ea se d co st s du e to u nc o- or di na te d an d un st ru ct ur ed a cq ui si tio n pl an s • O rg an is at io na l f ai lu re to m ax im is e th e us e of e m er gi ng te ch no lo gi ca l op po rt un iti es to im pr ov e bu si ne ss a nd IT c ap ab ili ty 63© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • V er if y th at th e co rp or at e te ch no lo gy s ta nd ar ds a re b ei ng a pp ro ve d by th e IT a rc hi te ct ur e bo ar d. A ss es s th e ef fe ct iv en es s of th e pr oc es s fo r co m m un ic at io n of te ch ni ca l st an da rd s to I T s ta ff m em be rs ( e. g. , p ro je ct m an ag er s, in fo rm at io n ar ch ite ct s) . I nt er vi ew r el ev an t I T p er so nn el to d et er m in e th ei r un de rs ta nd in g of te ch ni ca l s ta nd ar ds . • A sc er ta in f ro m I T m an ag em en t t ha t m on ito ri ng a nd b en ch m ar ki ng p ro ce ss es a re p ut in p la ce to c on fi rm c om pl ia nc e to e st ab lis he d te ch no lo gy s ta nd ar ds a nd g ui de lin es . • E va lu at e te ch ni ca l f ea si bi lit y an al ys is d oc um en ta tio n fo r se le ct ed p ro je ct s to a ss es s co m pl ia nc e w ith c or po ra te te ch no lo gy s ta nd ar ds . Te st t he C on tr ol D es ig n • R ev ie w th e gu id el in es , p la ns , p ro ce ss es a nd m ee tin g m in ut es o f th e ar ch ite ct ur e bo ar d. V er if y w he th er th ey p ro vi de a rc hi te ct ur e gu id el in es a nd r el at ed a dv ic e in li ne w ith th e bu si ne ss s tr at eg y an d es ta bl is he d in fo rm at io n ar ch ite ct ur e. • V er if y w he th er th e ar ch ite ct ur e bo ar d ha s co ns id er ed r eg ul at or y co m pl ia nc e an d bu si ne ss c on tin ui ty in it s de ci si on s. • V er if y th at m ec ha ni sm s ar e in p la ce th at e ns ur e de te ct io n of n on -c om pl ia nc e w ith th e st an da rd s an d gu id el in es o f th e ar ch ite ct ur e bo ar d w ith in th e pr oj ec t m an ag em en t pr oc es s. • A ss es s th e ro le o f th e ar ch ite ct ur e bo ar d in f ol lo w in g th ro ug h on r eq ui re d co rr ec tio ns a ri si ng f ro m n on -c om pl ia nc e w ith s ta nd ar ds in th e pr oj ec t m an ag em en t p ro ce ss . P O 3. 4 T ec hn ol og y St an da rd s To p ro vi de c on si st en t, ef fe ct iv e an d se cu re te ch no lo gi ca l s ol ut io ns en te rp ri se w id e, e st ab lis h a te ch no lo gy f or um to p ro vi de te ch no lo gy g ui de lin es , ad vi ce o n in fr as tr uc tu re p ro du ct s an d gu id an ce o n th e se le ct io n of te ch no lo gy , an d m ea su re c om pl ia nc e w ith th es e st an da rd s an d gu id el in es . T hi s fo ru m s ho ul d di re ct te ch no lo gy s ta nd ar ds a nd p ra ct ic es b as ed o n th ei r bu si ne ss r el ev an ce , r is ks an d co m pl ia nc e w ith e xt er na l r eq ui re m en ts . Va lu e D riv er s C on tr ol O bj ec ti ve • In cr ea se d co nt ro l o ve r in fo rm at io n sy st em s as se t a cq ui si tio ns , c ha ng es an d di sp os al s • St an da rd is ed a cq ui si tio ns s up po rt in g th e te ch no lo gi ca l d ir ec tio n, in cr ea si ng al ig nm en t a nd r ed uc in g ri sk s • Sc al ab le in fo rm at io n sy st em s re du ci ng re pl ac em en t c os ts • C on si st en cy in te ch no lo gy th ro ug ho ut th e en te rp ri se , i m pr ov in g ef fi ci en cy an d re du ci ng s up po rt , l ic en si ng a nd m ai nt en an ce c os ts R is k D riv er s • In co m pa tib ili tie s be tw ee n te ch no lo gy pl at fo rm s an d ap pl ic at io ns • D ev ia tio ns f ro m th e ap pr ov ed te ch no lo gi ca l d ir ec tio n • L ic en si ng v io la tio ns • In cr ea se d su pp or t, re pl ac em en t a nd m ai nt en an ce c os ts • In ab ili ty to a cc es s hi st or ic al d at a on un su pp or te d te ch no lo gy P O 3 D e te rm in e T e c h n o lo g ic a l D ir e c ti o n ( c o n t. ) P O 3. 5 IT A rc hi te ct ur e B oa rd E st ab lis h an I T a rc hi te ct ur e bo ar d to p ro vi de a rc hi te ct ur e gu id el in es a nd a dv ic e on th ei r ap pl ic at io n, a nd to v er if y co m pl ia nc e. T hi s en tit y sh ou ld d ir ec t I T ar ch ite ct ur e de si gn , e ns ur in g th at it e na bl es th e bu si ne ss s tr at eg y an d co ns id er s re gu la to ry c om pl ia nc e an d co nt in ui ty r eq ui re m en ts. T hi s is r el at ed /li nk ed to P O 2 D ef in e th e in fo rm at io n ar ch it ec tu re . Va lu e D riv er s C on tr ol O bj ec ti ve • In cr ea se d ac co un ta bi lit y an d re sp on si bi lit y fo r ar ch ite ct ur al de ci si on s • In cr ea se d al ig nm en t b et w ee n bu si ne ss st ra te gy a nd te ch ni ca l I T d ir ec tio n • C on si st en t u nd er st an di ng o f te ch no lo gy a rc hi te ct ur e th ro ug ho ut th e en te rp ri se R is k D riv er s • In co m pa tib ili tie s be tw ee n te ch no lo gy pl at fo rm s an d ap pl ic at io ns • D ev ia tio ns f ro m th e ap pr ov ed te ch no lo gi ca l d ir ec tio n • U nc on tr ol le d ac qu is iti on , u se a nd po ss ib le p ro lif er at io n of in fo rm at io n sy st em s as se ts IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org64 Take the following steps to test the outcome of the control objectives: • Review the result of the SWOT analysis to verify that business systems architecture, technological direction, migration strategies and contingency aspects are included in the technological direction and infrastructure plans. • Review appropriate documents to confirm whether market evolutions, legal and regulatory conditions, and emerging technologies (e.g., technological developments, competitor activities, infrastructure issues, legal requirements and regulatory environment changes, third-party experts) are being monitored (e.g., review the output and results of the monitoring activity and verify the action taken based on the analysis). • Review the IT strategy and IT technological infrastructure plan to ensure that it is aligned with the latest developments in IT that have the potential to impact the success of the business. • Confirm with the chief architect that ongoing assessments of current status vs. planned infrastructure are taking place. Review the corrective actions identified and executed, and compare these against the approved technology infrastructure plans. • Inspect the technology infrastructure plan to confirm that changes in the competitive environment, economies of scale for information systems staffing and investments, and improved interoperability of platforms and applications are identified. • Enquire whether the technology research budget is used in an effective and efficient manner (e.g., number of improvements based on research, improvement in services). • Inspect technology guidelines to determine that they appropriately support the technological solutions, accurately represent the organisation’s technological direction and provide sufficient direction for a wide range of problems. • Enquire whether and confirm that an IT architecture board has been established and roles, responsibility and accountability have been formally defined. • Confirm with members of the IT architecture board that meetings are held frequently (e.g., periodic/event basis). • Determine that all agreed-upon actions from IT architecture board meetings are appropriately recorded, tracked and implemented. Take the following steps to document the impact of the control weaknesses: • Assess the risks (e.g., threats, potential vulnerabilities, security, internal controls) that the organisation may not select appropriate technologies that achieve business goals or create new business opportunities (e.g., market leadership). • Assess the risks (e.g., threats, potential vulnerabilities, security, internal controls) that the technology plans may not consider changes in the competitive environment. • Assess the impact of economies of scale for information systems staffing and investments that are not achieved. • Assess the opportunity cost of not realising opportunities to integrate platforms and applications. • Assess the opportunity cost that potential business opportunities may not be realised. • Assess the opportunity cost that technology trends may not be taken into account in the development of the IT technology infrastructure plan. • Assess the risk of non-compliance to legal and regulatory regulations. 65© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II P O 4 D e fi n e t h e I T P ro c e s s e s , O rg a n is a ti o n a n d R e la ti o n s h ip s A n IT o rg an is at io n is d ef in ed b y co ns id er in g re qu ir em en ts f or s ta ff , s ki lls , f un ct io ns , a cc ou nt ab ili ty , a ut ho ri ty , r ol es a nd r es po ns ib ili tie s, a nd s up er vi si on . T hi s or ga ni sa tio n is em be dd ed in to a n IT p ro ce ss f ra m ew or k th at e ns ur es tr an sp ar en cy a nd c on tr ol a s w el l a s th e in vo lv em en t o f se ni or e xe cu tiv es a nd b us in es s m an ag em en t. A s tr at eg y co m m itt ee en su re s bo ar d ov er si gh t o f IT , a nd o ne o r m or e st ee ri ng c om m itt ee s in w hi ch b us in es s an d IT p ar tic ip at e de te rm in e th e pr io ri tis at io n of I T r es ou rc es in li ne w ith b us in es s ne ed s. Pr oc es se s, a dm in is tr at iv e po lic ie s an d pr oc ed ur es a re in p la ce f or a ll fu nc tio ns , w ith s pe ci fi c at te nt io n to c on tr ol , q ua lit y as su ra nc e, r is k m an ag em en t, in fo rm at io n se cu ri ty , d at a an d sy st em s ow ne rs hi p, a nd s eg re ga tio n of d ut ie s. T o en su re ti m el y su pp or t o f bu si ne ss r eq ui re m en ts , I T is to b e in vo lv ed in r el ev an t d ec is io n pr oc es se s. Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at : – T he I T p ro ce ss es r eq ui re d to r ea lis e th e IT s tr at eg ic p la n ha ve b ee n id en tif ie d an d co m m un ic at ed – A f ra m ew or k to e na bl e th e de fi ni tio n an d fo llo w -u p of p ro ce ss g oa ls , m ea su re s, c on tr ol s an d m at ur ity h as b ee n de fi ne d an d im pl em en te d – R el at io ns hi ps a nd to uc hp oi nt s (e .g ., in pu ts /o ut pu ts , a nd a m on gs t t he I T p ro ce ss es , e nt er pr is e po rt fo lio m an ag em en t a nd b us in es s pr oc es se s) h av e be en d ef in ed . P O 4. 1 IT P ro ce ss F ra m ew or k D ef in e an I T p ro ce ss f ra m ew or k to e xe cu te th e IT s tr at eg ic p la n. T hi s fr am ew or k sh ou ld in cl ud e an I T p ro ce ss s tr uc tu re a nd r el at io ns hi ps ( e. g. , t o m an ag e pr oc es s ga ps a nd o ve rl ap s) , o w ne rs hi p, m at ur ity , p er fo rm an ce m ea su re m en t, im pr ov em en t, co m pl ia nc e, q ua lit y ta rg et s an d pl an s to a ch ie ve th em . I t s ho ul d pr ov id e in te gr at io n am on gs t t he p ro ce ss es th at a re s pe ci fi c to I T, e nt er pr is e po rt fo lio m an ag em en t, bu si ne ss p ro ce ss es a nd b us in es s ch an ge p ro ce ss es . T he IT p ro ce ss f ra m ew or k sh ou ld b e in te gr at ed in to a q ua lit y m an ag em en t s ys te m (Q M S) a nd th e in te rn al c on tr ol f ra m ew or k. Va lu e D riv er s C on tr ol O bj ec ti ve • C on si st en t a pp ro ac h fo r th e de fi ni tio n of I T p ro ce ss es • O rg an is at io n of k ey a ct iv iti es in to lo gi ca l, in te rd ep en de ntp ro ce ss es • C le ar d ef in iti on o f ow ne rs hi p of a nd re sp on si bi lit y fo r pr oc es se s an d ke y ac tiv iti es • R el ia bl e an d re pe at ab le e xe cu tio n of ke y ac tiv iti es • Fl ex ib le a nd r es po ns iv e IT p ro ce ss es R is k D riv er s • Fr am ew or k no t b ei ng a cc ep te d by th e bu si ne ss a nd I T p ro ce ss es n ot b ei ng re la te d to b us in es s re qu ir em en ts • In co m pl et e fr am ew or k of I T p ro ce ss es • C on fl ic ts a nd u nc le ar in te rd ep en de nc ie s am on gs t p ro ce ss es • O ve rl ap s be tw ee n ac tiv iti es • In fl ex ib le I T o rg an is at io n • G ap s be tw ee n pr oc es se s • D up lic at io n of p ro ce ss es IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org66 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at th e: – C ha rt er , s co pe , o bj ec tiv es , m em be rs hi p, r ol es , r es po ns ib ili tie s, e tc ., of th e IT s tr at eg y co m m itt ee h av e be en d ef in ed in a m an ne r th at w ill e ns ur e co m pl ia nc e w ith st ra te gi c di re ct io ns o f th e en te rp ri se – IT s tr at eg y co m m itt ee is c om po se d of b oa rd a nd n on -b oa rd m em be rs w ith a pp ro pr ia te e xp er tis e on th e or ga ni sa tio n’ s de pe nd en cy o n IT a nd o pp or tu ni tie s pr ov id ed by I T • R ev ie w a ge nd as , p ap er s an d m in ut es o f th e IT s tr at eg y co m m itt ee to : – E ns ur e th at th e co m m itt ee m ee ts o n a re gu la r ba si s to a dd re ss s tr at eg ic is su es , i nc lu di ng m aj or in ve st m en t d ec is io ns , r ai se d by th e bo ar d of d ir ec to rs o r th e or ga ni sa tio n – A ss es s th at th e co m m itt ee is g iv in g ap pr op ri at e gu id an ce to th e bo ar d of d ir ec to rs o n IT go ve rn an ce a nd I T s tr at eg ic is su es P O 4. 2 IT S tr at eg y C om m it te e E st ab lis h an I T s tr at eg y co m m itt ee a t t he b oa rd le ve l. T hi s co m m itt ee s ho ul d en su re th at I T g ov er na nc e, a s pa rt o f en te rp ri se g ov er na nc e, is a de qu at el y ad dr es se d; a dv is e on s tr at eg ic d ir ec tio n; a nd r ev ie w m aj or in ve st m en ts o n be ha lf of th e fu ll bo ar d. Va lu e D riv er s C on tr ol O bj ec ti ve • Su pp or t o f th e bo ar d • B oa rd in si gh t i nt o IT v al ue a nd r is ks • Fa st er d ec is io ns o n im po rt an t in ve st m en ts • C le ar r es po ns ib ili ty a nd a cc ou nt ab ili ty fo r st ra te gi c de ci si on s • IT g ov er na nc e in te gr at ed in to co rp or at e go ve rn an ce • W el l- go ve rn ed I T f un ct io n R is k D riv er s • L ac k of r ep re se nt at io n of I T o n th e bo ar d ag en da • IT -r el at ed r is ks a nd v al ue u nk no w n at th e bo ar d le ve l • D ec is io ns o n in ve st m en ts a nd pr io ri tie s no t b as ed o n jo in t ( bu si ne ss an d IT ) pr io ri tie s • IT g ov er na nc e se pa ra te f ro m c or po ra te go ve rn an ce • IT no t c om pl ia nt w ith g ov er na nc e re qu ir em en ts , p ot en tia lly im pa ct in g m an ag em en t’s a nd th e bo ar d’ s pu bl ic ac co un ta bi lit y P O 4 D e fi n e t h e I T P ro c e s s e s , O rg a n is a ti o n a n d R e la ti o n s h ip s ( c o n t. ) 67© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II P O 4 D e fi n e t h e I T P ro c e s s e s , O rg a n is a ti o n a n d R e la ti o n s h ip s ( c o n t. ) Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at th e ch ar te r, sc op e, o bj ec tiv es , m em be rs hi ps , r ol es , r es po ns ib ili tie s, e tc ., of th e IT s te er in g co m m itt ee r es ul t i n ap pr op ri at e im pl em en ta tio n of th e IT s tr at eg ic d ir ec tio ns o f th e en te rp ri se . • In sp ec t d oc um en ts s uc h as m ee tin g m in ut es a nd th e IT s te er in g co m m itt ee c ha rt er to id en tif y th e pa rt ic ip an ts in vo lv ed in th e co m m itt ee , t he ir r es pe ct iv e jo b fu nc tio ns an d th e re po rt in g re la tio ns hi p of th e co m m itt ee to e xe cu tiv e m an ag em en t ( e. g. , d et er m in e pr io ri tis at io n of I T- en ab le d in ve st m en t p ro gr am m es , t ra ck s ta tu s of p ro je ct s, an d m on ito r se rv ic e le ve ls a nd s er vi ce im pr ov em en ts ). • E nq ui re a nd c on fi rm w ith b us in es s m an ag em en t t o en su re th at th e bu si ne ss ta ke s an a ct iv e ro le in th e w or k of th e IT s te er in g co m m itt ee a nd m an ag em en t i s ap pr op ri at el y co ns ul te d. P O 4. 3 IT S te er in g C om m it te e E st ab lis h an I T s te er in g co m m itt ee ( or e qu iv al en t) c om po se d of e xe cu tiv e, bu si ne ss a nd I T m an ag em en t t o: • D et er m in e pr io ri tis at io n of I T- en ab le d in ve st m en t p ro gr am m es in li ne w ith th e en te rp ri se ’s b us in es s st ra te gy a nd p ri or iti es • T ra ck s ta tu s of p ro je ct s an d re so lv e re so ur ce c on fl ic t • M on ito r se rv ic e le ve ls a nd s er vi ce im pr ov em en ts Va lu e D riv er s C on tr ol O bj ec ti ve • IT s tr at eg y in li ne w ith th e or ga ni sa tio n’ s st ra te gy • IT -e na bl ed in ve st m en t p ro gr am m es in lin e w ith th e or ga ni sa tio n’ s st ra te gy • B us in es s an d IT in vo lv em en t i n th e pr io ri tis at io n pr oc es s • B us in es s an d IT in vo lv em en t i n co nf lic t r es ol ut io n • B us in es s an d IT in vo lv em en t i n m on ito ri ng p er fo rm an ce R is k D riv er s • IT s tr at eg y no t i n lin e w ith th e or ga ni sa tio n’ s st ra te gy • IT -e na bl ed in ve st m en t p ro gr am m es no t i n su pp or t o f th e or ga ni sa tio na l go al s an d ob je ct iv es • In su ff ic ie nt s up po rt a nd in vo lv em en t of I T a nd s en io r or ga ni sa tio na l m an ag em en t i n ke y de ci si on -m ak in g pr oc es se s IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org68 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at th e IT f un ct io n is : – H ea de d by a C IO o r si m ila r fu nc tio n, o f w hi ch th e au th or ity , r es po ns ib ili ty , a cc ou nt ab ili ty a nd r ep or tin g lin e ar e co m m en su ra te w ith th e im po rt an ce o f IT w ith in th e en te rp ri se – D ef in ed a nd f un de d in s uc h a w ay th at in di vi du al u se r gr ou ps /dep ar tm en ts c an no t e xe rt u nd ue in fl ue nc e ov er th e IT f un ct io n an d un de rm in e th e pr io ri tie s ag re ed u po n by th e IT s tr at eg y co m m itt ee a nd I T s te er in g co m m itt ee – A pp ro pr ia te ly r es ou rc ed ( e. g. , s ta ff in g, c on tin ge nt w or ke rs , b ud ge t) to e na bl e th e im pl em en ta tio n an d m an ag em en t o f ap pr op ri at e IT s ol ut io ns a nd s er vi ce s to s up po rt th e bu si ne ss a nd to e na bl e re la tio ns hi ps w ith th e bu si ne ss Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at : – Pe ri od ic r ev ie w s ar e pe rf or m ed o ve r th e im pa ct o f or ga ni sa tio na l c ha ng es a s th ey a ff ec t t he o ve ra ll or ga ni sa tio n an d th e st ru ct ur e of th e IT f un ct io n its el f – T he I T o rg an is at io n ha s fl ex ib le r es ou rc e ar ra ng em en ts , s uc h as th e us e of e xt er na l c on tr ac to rs a nd f le xi bl e th ir d- pa rt y se rv ic e ar ra ng em en ts , t o su pp or t c ha ng in g bu si ne ss n ee ds P O 4. 4 O rg an is at io na l P la ce m en t of t he I T F un ct io n Pl ac e th e IT f un ct io n in th e ov er al l o rg an is at io na l s tr uc tu re w ith a b us in es s m od el c on tin ge nt o n th e im po rt an ce o f IT w ith in th e en te rp ri se , s pe ci fi ca lly it s cr iti ca lit y to b us in es s st ra te gy a nd th e le ve l o f op er at io na l d ep en de nc e on I T. T he r ep or tin g lin e of th e ch ie f in fo rm at io n of fi ce r (C IO ) sh ou ld b e co m m en su ra te w ith th e im po rt an ce o f IT w ith in th e en te rp ri se . Va lu e D riv er s C on tr ol O bj ec ti ve • IT r es ou rc es a lig ne d to th e st ra te gi c pr io ri tie s • E ff ec tiv e m an ag em en t o f IT su pp or tin g th e bu si ne ss o bj ec tiv es • Se ni or m an ag em en t c om m itm en t i n IT de ci si on m ak in g at th e ap pr op ri at e le ve l • B us in es s/ IT a lig nm en t a t t he or ga ni sa tio na l l ev el R is k D riv er s • In su ff ic ie nt c om m itm en t f ro m s en io r or ga ni sa tio na l m an ag em en t • IT r es ou rc es n ot e ff ec tiv el y su pp or tin g th e bu si ne ss • IT n ot g iv en s uf fi ci en t s tr at eg ic im po rt an ce • IT r eg ar de d as s ep ar at e fr om th e bu si ne ss a nd v ic e ve rs a • L ac k of b us in es s di re ct io n an d co m m un ic at io n of b us in es s in iti at iv es P O 4. 5 IT O rg an is at io na l S tr uc tu re E st ab lis h an in te rn al a nd e xt er na l I T o rg an is at io na l s tr uc tu re th at r ef le ct s bu si ne ss n ee ds . I n ad di tio n, p ut a p ro ce ss in p la ce f or p er io di ca lly r ev ie w in g th e IT o rg an is at io na l s tr uc tu re to a dj us t s ta ff in g re qu ir em en ts a nd s ou rc in g st ra te gi es to m ee t e xp ec te d bu si ne ss o bj ec tiv es a nd c ha ng in g ci rc um st an ce s. Va lu e D riv er s C on tr ol O bj ec ti ve • E ff ec tiv e an d ef fi ci en t s up po rt f or th e bu si ne ss • St af fi ng r eq ui re m en ts a nd s ou rc in g st ra te gi es th at s up po rt s tr at eg ic bu si ne ss g oa ls • Fl ex ib le a nd r es po ns iv e IT or ga ni sa tio na l s tr uc tu re • B us in es s/ IT a lig nm en t a t t he or ga ni sa tio na l l ev el R is k D riv er s • In su ff ic ie nt b us in es s su pp or t • In su ff ic ie nt s ta ff in g re qu ir em en ts • In ap pr op ri at e so ur ci ng s tr at eg ie s • In fl ex ib ili ty o f IT to c ha ng es in bu si ne ss n ee ds P O 4 D e fi n e t h e I T P ro c e s s e s , O rg a n is a ti o n a n d R e la ti o n s h ip s ( c o n t. ) 69© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II P O 4 D e fi n e t h e I T P ro c e s s e s , O rg a n is a ti o n a n d R e la ti o n s h ip s ( c o n t. ) Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at : – E ac h IT ta sk h as b ee n fo rm al is ed b y re vi ew in g do cu m en ta tio n an d de te rm in in g w he th er I T ta sk d es cr ip tio ns a re a pp ro pr ia te a nd u pd at ed a s re qu ir ed – A r ol e ha s be en a ss ig ne d to I T p er so nn el w ith c or re sp on di ng I T ta sk s. A ss es s w he th er p er so nn el u nd er st an d th e ro le a nd ta sk s th at h av e be en a ss ig ne d, a nd th at th e ta sk s ar e be in g pe rf or m ed . – A cc ou nt ab ili tie s an d re sp on si bi lit ie s ha ve b ee n as si gn ed to r ol es . V er if y by in sp ec tio n of jo b de sc ri pt io ns , c ha rt er s, e tc ., th at e ac h ro le h as th e ne ce ss ar y ac co un ta bi lit ie s an d re sp on si bi lit ie s to e xe cu te th e ro le . – IT p er so nn el h av e be en in fo rm ed o f th ei r ro le s. A ss es s w he th er c ha ng es a re c om m un ic at ed to I T p er so nn el a nd w he th er th e ch an ge s ar e be in g im pl em en te d. – M an ag er s pe ri od ic al ly c on fi rm th e ac cu ra cy o f th e ro le d es cr ip tio ns . R ev ie w r ol e de sc ri pt io ns to d et er m in e w he th er th ey a cc ur at el y re fl ec t t he r ol es o f te am m em be rs . – R ol e de sc ri pt io ns o ut lin e ke y go al s an d ob je ct iv es a nd in cl ud e SM A R R T m ea su re s – SM A R R T m ea su re s ar e us ed in s ta ff p er fo rm an ce e va lu at io ns – A ll ro le d es cr ip tio ns in th e or ga ni sa tio n in cl ud e re sp on si bi lit ie s re ga rd in g in fo rm at io n sy st em s, in te rn al c on tr ol a nd s ec ur ity – M an ag em en t t ra in s st af f m em be rs r eg ul ar ly o n th ei r ro le s. I nt er vi ew s ta ff m em be rs to d et er m in e w he th er a k no w le dg e of th e ro le h as b ee n co m m un ic at ed an d un de rs to od . • To d et er m in e w he th er e m pl oy ee s ar e pr ov id ed w ith e nt er pr is ew id e an d de pa rt m en ta l p ol ic ie s an d pr oc ed ur es , r ev ie w th e: – A nn ua l p ol ic y ac kn ow le dg em en t – H R r ec or ds in di ca tin g w he th er e m pl oy ee s w er e pr ov id ed w ith p ol ic y do cu m en ta tio n du ri ng n ew h ir e or ie nt at io n – E m pl oy ee tr ai ni ng r ec or ds P O 4. 6 E st ab lis hm en t of R ol es a nd R es po ns ib ili ti es E st ab lis h an d co m m un ic at e ro le s an d re sp on si bi lit ie s fo r IT p er so nn el a nd e nd us er s th at d el in ea te b et w ee n IT p er so nn el a nd e nd -u se r au th or ity , r es po ns ib ili tie s an d ac co un ta bi lit y fo r m ee tin g th eor ga ni sa tio n’ s ne ed s. Va lu e D riv er s C on tr ol O bj ec ti ve • E ff ec tiv e in di vi du al p er fo rm an ce • A ct iv iti es a llo ca te d to s pe ci fi c po si tio ns • E ff ic ie nt r ec ru itm en t o f ap pr op ri at el y sk ill ed a nd e xp er ie nc ed I T s ta ff • E ff ec tiv e st af f pe rf or m an ce R is k D riv er s • N on -c om pl ia nc e w ith r eg ul at io ns • C om pr om is ed in fo rm at io n • R ec ru itm en t o f st af f no t w or ki ng a s in te nd ed • Fr au du le nt s ys te m u sa ge • N on -r es po ns iv e IT o rg an is at io n IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org70 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at th e Q A f un ct io n in cl ud es : – A r ep or tin g lin e su ch th at it c an o pe ra te w ith a de qu at e in de pe nd en ce a nd r ep or t i ts f in di ng s ob je ct iv el y – M on ito ri ng p ro ce ss es to e ns ur e co m pl ia nc e w ith th e or ga ni sa tio n’ s Q A -r el at ed p ol ic ie s, s ta nd ar ds a nd p ro ce du re s (e .g ., co m pl ia nc e w ith th e or ga ni sa tio n’ s de ve lo pm en t m et ho do lo gy ) – A ct in g as a c en tr e of e xp er tis e fo r th e de ve lo pm en t o f Q A -r el at ed p ol ic ie s (e .g ., Q A r eq ui re m en ts in a s ys te m s de ve lo pm en t l if e cy cl e) , s ta nd ar ds a nd p ro ce du re s – A p ro ce ss a do pt ed a nd a lig ne d w ith Q A b es t p ra ct ic es a nd s ta nd ar ds – St af f le ve ls a nd s ki lls c om m en su ra te w ith th e si ze o f th e or ga ni sa tio n an d th e Q A f un ct io n’ s re sp on si bi lit ie s. A ss es s th e sk ill s to v er if y th at th ey in cl ud e qu al ity as su ra nc e, I T, c on tr ol s, p ro ce ss es a nd c om m un ic at io n. – A ct iv e su pp or t f ro m s en io r m an ag em en t s po ns or s – A d ef in ed a nd d oc um en te d pr oc es s fo r id en tif yi ng , e sc al at in g an d re so lv in g is su es id en tif ie d to th e Q A p ro ce ss – A p ro ce ss to r ep or t p er io di ca lly o n its f in di ng s an d re co m m en da tio ns P O 4. 7 R es po ns ib ili ty f or I T Q ua lit y A ss ur an ce A ss ig n re sp on si bi lit y fo r th e pe rf or m an ce o f th e qu al ity a ss ur an ce ( Q A ) fu nc tio n an d pr ov id e th e Q A g ro up w ith a pp ro pr ia te Q A s ys te m s, c on tr ol s an d co m m un ic at io ns e xp er tis e. E ns ur e th at th e or ga ni sa tio na l p la ce m en t a nd th e re sp on si bi lit ie s an d si ze o f th e Q A g ro up s at is fy th e re qu ir em en ts o f th e or ga ni sa tio n. Va lu e D riv er s C on tr ol O bj ec ti ve • Q ua lit y as su ra nc e as a n in te gr al p ar t of I T ’s r es po ns ib ili tie s • Pr oc es se s in li ne w ith th e or ga ni sa tio n’ s qu al ity e xp ec ta tio ns • Pr oa ct iv e id en tif ic at io n of im pr ov em en ts to I T f un ct io na lit y an d bu si ne ss p ro ce ss es • Pr oa ct iv e id en tif ic at io n of q ua lit y is su es a nd b us in es s ri sk s R is k D riv er s • R ep ut at io na l d am ag e • U nd et ec te d qu al ity -r el at ed r is ks th at im pa ct th e ov er al l b us in es s • In cr ea se d co st s an d tim e de la ys d ue to po or q ua lit y co nt ro l • Q ua lit y as su ra nc e no t a pp lie d co ns is te nt ly o r ef fe ct iv el y • In co ns is te nc ie s in q ua lit y ac ro ss th e or ga ni sa tio n • R ed uc ed b us in es s pe rf or m an ce P O 4 D e fi n e t h e I T P ro c e s s e s , O rg a n is a ti o n a n d R e la ti o n s h ip s ( c o n t. ) 71© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II P O 4 D e fi n e t h e I T P ro c e s s e s , O rg a n is a ti o n a n d R e la ti o n s h ip s ( c o n t. ) Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at : – Se ni or m an ag em en t h as e st ab lis he d an o rg an is at io nw id e, a de qu at el y st af fe d ri sk m an ag em en t a nd in fo rm at io n se cu ri ty f un ct io n w ith o ve ra ll ac co un ta bi lit y fo r ri sk m an ag em en t a nd in fo rm at io n se cu ri ty . V er if y by in te rv ie w in g ke y pe rs on ne l t ha t t he r ep or tin g lin e of th e ri sk m an ag em en t a nd in fo rm at io n se cu ri ty f un ct io n is s uc h th at it c an e ff ec tiv el y de si gn , i m pl em en t a nd , i n co nj un ct io n w ith li ne m an ag em en t, en fo rc e co m pl ia nc e w ith th e or ga ni sa tio n’ s ri sk m an ag em en t a nd in fo rm at io n se cu ri ty p ol ic ie s, s ta nd ar ds a nd p ro ce du re s. – R ol es a nd r es po ns ib ili tie s fo r th e ri sk m an ag em en t a nd in fo rm at io n se cu ri ty f un ct io n ha ve b ee n fo rm al is ed a nd d oc um en te d – R es po ns ib ili tie s ha ve b ee n al lo ca te d to a pp ro pr ia te ly s ki lle d an d ex pe ri en ce d st af f m em be rs a nd , i n th e ca se o f in fo rm at io n se cu ri ty , u nd er th e di re ct io n of a n in fo rm at io n se cu ri ty o ff ic er – T he r es ou rc e re qu ir em en ts in r el at io n to r is k m an ag em en t a nd in fo rm at io n se cu ri ty h av e be en r eg ul ar ly a ss es se d by m an ag em en t t o en su re th at a pp ro pr ia te r es ou rc es ar e pr ov id ed to m ee t t he n ee ds o f th e bu si ne ss – A p ro ce ss is in p la ce to o bt ai n se ni or m an ag em en t g ui da nc e co nc er ni ng th e ri sk p ro fi le a nd a cc ep ta nc e of s ig ni fi ca nt r es id ua l r is ks . V er if y th at it f un ct io ns p ro pe rl y by ex am in in g re ce nt s itu at io ns . P O 4. 8 R es po ns ib ili ty f or R is k, Se cu ri ty a nd C om pl ia nc e E m be d ow ne rs hi p an d re sp on si bi lit y fo r IT -r el at ed r is ks w ith in th e bu si ne ss a t a n ap pr op ri at e se ni or le ve l. D ef in e an d as si gn r ol es c ri tic al f or m an ag in g IT r is ks , in cl ud in g th e sp ec if ic r es po ns ib ili ty f or in fo rm at io n se cu ri ty , p hy si ca l s ec ur ity an d co m pl ia nc e. E st ab lis h ri sk a nd s ec ur ity m an ag em en t r es po ns ib ili ty a t t he en te rp ri se le ve l t o de al w ith o rg an is at io nw id e is su es . A dd iti on al s ec ur ity m an ag em en t r es po ns ib ili tie s m ay n ee d to b e as si gn ed a t a s ys te m -s pe ci fi c le ve l to d ea l w ith r el at ed s ec ur ity is su es . O bt ai n di re ct io n fr om s en io r m an ag em en t o n th e ap pe tit e fo r IT r is k an d ap pr ov al o f an y re si du alI T r is ks . Va lu e D riv er s C on tr ol O bj ec ti ve • Im pr ov ed p ro te ct io n an d in te gr ity o f in fo rm at io n as se ts • R is k, s ec ur ity a nd c om pl ia nc e re sp on si bi lit ie s em be dd ed a t s en io r m an ag em en t l ev el • Se ni or m an ag em en t s up po rt in r is k, se cu ri ty a nd c om pl ia nc e is su es • Se cu ri ty m ec ha ni sm s as e ff ec tiv e an d ef fi ci en t c ou nt er m ea su re s fo r th e or ga ni sa tio n’ s th re at s • Pr oa ct iv e id en tif ic at io n an d re so lu tio n of r is k, s ec ur ity a nd c om pl ia nc e is su es R is k D riv er s • Im pr op er p ro te ct io n of in fo rm at io n as se ts • L os s of c on fi de nt ia l i nf or m at io n • Fi na nc ia l l os se s • L ac k of m an ag em en t c om m itm en t f or or ga ni sa tio nw id e se cu ri ty • N on -c om pl ia nc e ri sk • U nc le ar u nd er st an di ng o f th e or ga ni sa tio n’ s IT r is k ap pe tit e IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org72 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a p ol ic y fo r da ta c la ss if ic at io n an d sy st em o w ne rs hi p ha s be en d ev el op ed a nd c om m un ic at ed . • V al id at e th at th e po lic y ha s be en a pp lie d to m aj or a pp lic at io n sy st em s an d en te rp ri se a rc hi te ct ur e an d in te rn al a nd e xt er na l d at a co m m un ic at io n. • V er if y th at th e po lic y fo r da ta c la ss if ic at io n an d sy st em o w ne rs hi p su pp or ts th e pr ot ec tio n of in fo rm at io n as se ts , e na bl es e ff ic ie nt d el iv er y an d us e of b us in es s ap pl ic at io ns , a nd f ac ili ta te s ef fe ct iv e se cu ri ty d ec is io n m ak in g. • O bs er ve th e pr oc es s to r eg is te r an d m ai nt ai n sy st em o w ne rs hi p an d da ta c la ss if ic at io n, a nd a ss es s w he th er th e pr oc es s is b ei ng c on si st en tly a pp lie d. P O 4. 9 D at a an d Sy st em O w ne rs hi p Pr ov id e th e bu si ne ss w ith p ro ce du re s an d to ol s, e na bl in g it to a dd re ss it s re sp on si bi lit ie s fo r ow ne rs hi p of d at a an d in fo rm at io n sy st em s. O w ne rs s ho ul d m ak e de ci si on s ab ou t c la ss if yi ng in fo rm at io n an d sy st em s an d pr ot ec tin g th em in li ne w ith th is c la ss if ic at io n. Va lu e D riv er s C on tr ol O bj ec ti ve • U se rs c on tr ol lin g th ei r da ta a nd sy st em s • D ef in ed a cc ou nt ab ili ty f or th e m ai nt en an ce o f da ta a nd s ys te m se cu ri ty m ea su re s • E ff ec tiv e an d tim el y in fo rm at io n m an ag em en t p ro ce ss es • R ed uc ed f in an ci al lo ss es c au se d by th ef t o f as se ts R is k D riv er s • Im pr op er ly s ec ur ed b us in es s da ta • Im pr op er p ro te ct io n of in fo rm at io n as se ts • R eq ui re m en ts f or p ro te ct in g bu si ne ss da ta n ot in li ne w ith th e bu si ne ss re qu ir em en ts • In ad eq ua te s ec ur ity m ea su re s fo r da ta an d sy st em s • B us in es s pr oc es s ow ne rs n ot ta ki ng re sp on si bi lit y fo r da ta P O 4 D e fi n e t h e I T P ro c e s s e s , O rg a n is a ti o n a n d R e la ti o n s h ip s ( c o n t. ) Te st t he C on tr ol D es ig n • C on fi rm th ro ug h in te rv ie w s th at s up er vi so ry p ra ct ic es h av e be en e st ab lis he d, in cl ud in g gu id an ce a nd tr ai ni ng f or p er fo rm an ce r ev ie w s. • R ev ie w r ec or ds to a ss es s th e fr eq ue nc y an d ex te nt o f su pe rv is or y re vi ew s an d st af f ap pr ai sa ls . • A ss es s w he th er r ev ie w s ha ve a s ou nd s et o f pe rf or m an ce e xp ec ta tio ns a nd p er fo rm an ce c ri te ri a. • E nq ui re w he th er a nd c on fi rm th at f in di ng s fr om s up er vi so ry r ev ie w s an d st af f ap pr ai sa ls a re p ro pe rl y es ca la te d, c om m un ic at ed a nd f ol lo w ed u p. P O 4. 10 S up er vi si on Im pl em en t a de qu at e su pe rv is or y pr ac tic es in th e IT f un ct io n to e ns ur e th at r ol es an d re sp on si bi lit ie s ar e pr op er ly e xe rc is ed , t o as se ss w he th er a ll pe rs on ne l h av e su ff ic ie nt a ut ho ri ty a nd r es ou rc es to e xe cu te th ei r ro le s an d re sp on si bi lit ie s, a nd to g en er al ly r ev ie w k ey p er fo rm an ce in di ca to rs . Va lu e D riv er s C on tr ol O bj ec ti ve • E ff ec tiv e an d ef fi ci en t e xe cu tio n of IT ’s r ol es a nd r es po ns ib ili tie s • A pp ro pr ia te c on tr ol s ov er I T f un ct io ns • Pr om pt id en tif ic at io n of r es ou rc in g is su es • Pr om pt id en tif ic at io n of p er fo rm an ce is su es R is k D riv er s • O rg an is at io n’ s go al s an d ob je ct iv es no t m et • R es ou rc in g an d pe rf or m an ce is su es no t i de nt if ie d an d re so lv ed • M al fu nc tio n of I T a nd b us in es s pr oc es se s • In ad eq ua te m on ito ri ng o f co nt ro ls a nd ob je ct iv es • K ey r ol es a nd r es po ns ib ili tie s no t ex er ci se d 73© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a va ila bl e an d re qu ir ed I T s ki lls a nd c om pe te nc ie s ar e re gu la rl y re vi ew ed a nd th ei r im pa ct o n IT s ta ff in g is a na ly se d, e sc al at ed a nd ac te d up on , a s ne ed ed . • R ev ie w m aj or b us in es s an d op er at io na l c ha ng es , a nd a ss es s w he th er th ei r im pa ct o n sk ill s, c om pe te nc ie s an d st af fi ng r eq ui re m en ts a re a ss es se d an d fo llo w ed u p. • A ss es s th e so ur ci ng s tr at eg ie s an d ve ri fy th at th ey s up po rt th e sk ill a nd c om pe te nc y re qu ir em en ts . P O 4. 12 I T S ta ff in g E va lu at e st af fi ng r eq ui re m en ts o n a re gu la r ba si s or u po n m aj or c ha ng es to th e bu si ne ss , o pe ra tio na l o r IT e nv ir on m en ts to e ns ur e th at th e IT f un ct io n ha s su ff ic ie nt r es ou rc es to a de qu at el y an d ap pr op ri at el y su pp or t t he b us in es s go al s an d ob je ct iv es . Va lu e D riv er s C on tr ol O bj ec ti ve • A bi lit y of I T s ta ff to s up po rt b us in es s ne ed s • C os t c on tr ol • A pp ro pr ia te s iz e of th e IT d ep ar tm en t • A pp ro pr ia te s ki lls in th e IT de pa rt m en t R is k D riv er s • IT s ta ff r es ou rc es u na bl e to m ee t bu sine ss n ee ds • E xc es si ve I T in te rn al a nd /o r ex te rn al st af fi ng c os ts • U nd er - or o ve rr es ou rc ed I T de pa rt m en t • L ac k of a pp ro pr ia te s ki lls in th e IT de pa rt m en t P O 4 D e fi n e t h e I T P ro c e s s e s , O rg a n is a ti o n a n d R e la ti o n s h ip s ( c o n t. ) Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at s ta nd ar ds h av e be en e st ab lis he d to e nf or ce a nd e ns ur e ap pr op ri at e se gr eg at io n of d ut ie s an d th at th es e st an da rd s ar e re vi ew ed a nd ch an ge d as n ee de d. • A ss es s w he th er s ta nd ar ds h av e be en im pl em en te d in a ss ig ni ng r ol es a nd r es po ns ib ili tie s. • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss e xi st s to id en tif y cr iti ca l p os iti on s an d pr oc es se s th at m us t b e su bj ec t t o se gr eg at io n of d ut ie s. P O 4. 11 S eg re ga ti on o f D ut ie s Im pl em en t a d iv is io n of r ol es a nd r es po ns ib ili tie s th at r ed uc es th e po ss ib ili ty f or a si ng le in di vi du al to c om pr om is e a cr iti ca l p ro ce ss . M ak e su re th at p er so nn el ar e pe rf or m in g on ly a ut ho ri se d du tie s re le va nt to th ei r re sp ec tiv e jo bs a nd po si tio ns . Va lu e D riv er s C on tr ol O bj ec ti ve • E ff ec tiv e an d ef fi ci en t f un ct io ni ng o f bu si ne ss -c ri tic al s ys te m s an d pr oc es se s • Pr op er p ro te ct io n of in fo rm at io n as se ts • R ed uc ed r is k of f in an ci al lo ss a nd re pu ta tio na l d am ag e R is k D riv er s • In ap pr op ri at e su bv er si on o f cr iti ca l pr oc es se s • Fi na nc ia l l os s an d re pu ta tio na l da m ag e • M al ic io us o r un in te nt io na l d am ag es • N on -c om pl ia nc e w ith e xt er na l re qu ir em en ts f or s eg re ga tio n of m at er ia lly s ig ni fi ca nt s ys te m s an d bu si ne ss p ro ce ss es IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org74 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at m an ag em en t h as f or m al p ro ce du re s fo r co ns id er in g th e st af fi ng c ov er ag e fo r ke y pr oc es se s w he n ap pr ov in g or b ei ng n ot if ie d of a bs en ce s. • A ss es s w he th er m an ag em en t r ev ie w s its d ep en de nc y on k ey s ta ff m em be rs a nd h as c on si de re d co nt in ge nc y ac tio ns s uc h as a lte rn at iv e so ur ci ng , d oc um en tin g ke y kn ow le dg e, tr ai ni ng o f ot he r st af f m em be rs , a nd tr an sf er ri ng r es po ns ib ili tie s fr om k ey s ta ff m em be rs to o th er s. Te st t he C on tr ol D es ig n • In sp ec t t he p ol ic ie s an d pr oc ed ur es d es cr ib in g w he n, h ow a nd w ha t t yp e of w or k ca n be o ut so ur ce d, a nd d et er m in e w he th er th ey a re b ei ng im pl em en te d. • In sp ec t t he p ol ic ie s an d pr oc ed ur es f or in fo rm at io n se cu ri ty r es po ns ib ili tie s of c on tr ac to rs , a nd a ss es s th ro ug h en qu ir y w he th er th ey a re b ei ng f ol lo w ed ( e. g. , b ac kg ro un d ch ec ks a re c on du ct ed , p hy si ca l a nd lo gi ca l a cc es s co nt ro l r eq ui re m en ts a re f ol lo w ed , p er so na l i de nt if ic at io n is s ec ur e, a nd c on tr ac to rs a re a dv is ed th at m an ag em en t re se rv es th e ri gh t t o m on ito r an d in sp ec t a ll us ag e of I T r es ou rc es , i nc lu di ng e -m ai l, vo ic e co m m un ic at io ns , a nd a ll pr og ra m s an d da ta f ile s) . • R ev ie w th e po lic ie s an d pr oc ed ur es f or s el ec tin g a co nt ra ct or , a nd a ss es s w he th er th ey a re b ei ng im pl em en te d. P O 4. 13 K ey I T P er so nn el D ef in e an d id en tif y ke y IT p er so nn el ( e. g. , r ep la ce m en ts /b ac ku p pe rs on ne l) , a nd m in im is e re lia nc e on a s in gl e in di vi du al p er fo rm in g a cr iti ca l j ob f un ct io n. Va lu e D riv er s C on tr ol O bj ec ti ve • Pr op er ly tr ai ne d ke y IT p er so nn el • R ed uc ed d ep en de nc y on in di vi du al ke y IT p er so nn el • K no w le dg e sh ar in g • C on tin ui ty o f IT s er vi ce s • C ri tic al I T r ol es r el ia bl y su pp or te d • Su cc es si on p la nn in g R is k D riv er s • In su ff ic ie nt s ki lls o f ke y IT p er so nn el • R el ia nc e on s in gl e kn ow le dg e ex pe rt s • In ad eq ua te k no w le dg e sh ar in g or su cc es si on p la nn in g • C ri tic al ta sk s an d ro le s no t p er fo rm ed P O 4. 14 C on tr ac te d St af f P ol ic ie s an d P ro ce du re s E ns ur e th at c on su lta nt s an d co nt ra ct p er so nn el w ho s up po rt th e IT f un ct io n kn ow a nd c om pl y w ith th e or ga ni sa tio n’ s po lic ie s fo r th e pr ot ec tio n of th e or ga ni sa tio n’ s in fo rm at io n as se ts s uc h th at th ey m ee t a gr ee d- up on c on tr ac tu al re qu ir em en ts . Va lu e D riv er s C on tr ol O bj ec ti ve • C on tr ac te d st af f su pp or tin g th e ne ed s of th e bu si ne ss • K no w le dg e sh ar in g an d re te nt io n w ith in th e or ga ni sa tio n • Pr ot ec tio n of th e in fo rm at io n as se ts • C on tr ol o ve r th e co nt ra ct ed pe rs on ne l’s a ct iv iti es R is k D riv er s • In cr ea se d de pe nd en ce o n ke y (c on tr ac te d) in di vi du al s • G ap s be tw ee n ex pe ct at io ns a nd th e ca pa bi lit y of c on tr ac te d pe rs on ne l • W or k pe rf or m ed n ot a lig ne d w ith bu si ne ss r eq ui re m en ts • N o kn ow le dg e ca pt ur e or s ki lls tr an sf er f ro m c on tr ac te d pe rs on ne l • In ef fi ci en t a nd in ef fe ct iv e us e of co nt ra ct ed s ta ff • Fa ilu re o f co nt ra ct ed s ta ff to a dh er e to or ga ni sa tio na l p ol ic ie s fo r th e pr ot ec tio n of in fo rm at io n as se ts • L iti ga tio n co st s fr om d is ag re em en ts ov er e xp ec ta tio ns f or r es po ns ib ili ty an d ac co un ta bi lit y P O 4 D e fi n e t h e I T P ro c e s s e s , O rg a n is a ti o n a n d R e la ti o n s h ip s ( c o n t. ) 75© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss f or id en tif yi ng s ta ke ho ld er s ha s be en d ef in ed a nd th at a c om m un ca tio ns c ha nn el a nd c om m un ic at io n pl an h av e be en es ta bl is he d fo r ea ch . • V er if y thro ug h in te rv ie w s w ith k ey s ta ke ho ld er s th ei r sa tis fa ct io n w ith I T ’s c om m un ic at io ns , t he e ff ec tiv en es s of I T ’s c om m un ic at io ns a nd th e ad eq ua cy w ith w hi ch fe ed ba ck f ro m s ta ke ho ld er s is b ei ng d ea lt. P O 4. 15 R el at io ns hi ps E st ab lis h an d m ai nt ai n an o pt im al c o- or di na tio n, c om m un ic at io n an d lia is on st ru ct ur e be tw ee n th e IT f un ct io n an d va ri ou s ot he r in te re st s in si de a nd o ut si de th e IT f un ct io n, s uc h as th e bo ar d, e xe cu tiv es , b us in es s un its , i nd iv id ua l u se rs , su pp lie rs , s ec ur ity o ff ic er s, r is k m an ag er s, th e co rp or at e co m pl ia nc e gr ou p, ou ts ou rc er s an d of fs ite m an ag em en t. Va lu e D riv er s C on tr ol O bj ec ti ve • E ff ic ie nt id en tif ic at io n an d re so lu tio n of is su es • A lig nm en t o f go al s an d ap pr oa ch es w ith b us in es s ob je ct iv es a nd m et ho do lo gi es • Po si tiv e in vo lv em en t o f st ak eh ol de rs • C le ar ly d ef in ed o w ne rs hi p an d ac co un ta bi lit y fo r re la tio ns hi p m an ag em en t R is k D riv er s • E xt en de d ga ps b et w ee n th e id en tif ic at io n an d re so lu tio n of is su es • In ad eq ua te id en tif ic at io n of im pr ov em en ts • G ap s be tw ee n bu si ne ss o bj ec tiv es a nd IT p ol ic ie s, g ui de lin es a nd m et ho do lo gi es P O 4 D e fi n e t h e I T P ro c e s s e s , O rg a n is a ti o n a n d R e la ti o n s h ip s ( c o n t. ) IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org76 Take the following steps to test the outcome of the control objectives: • Review the IT process framework and determine if it supports the IT strategic plan and integrates with the business process, IT processes and enterprise portfolio management. • Enquire through interviews whether this framework is being communicated, executed and understood by business and IT. • Enquire whether and confirm that the IT process framework has been integrated with the quality management system and internal control framework. • Enquire whether and confirm that the scope, membership, responsibilities, etc., of the IT strategy committee are defined, that the committee is composed of board and non-board members, and that each has appropriate expertise. • Confirm through interviews, meeting minutes and reports to the board of directors that the IT strategy committee reports to the board on governance and IT strategic issues. • Enquire whether and confirm that senior IT management understands which processes are used to monitor, measure and report on IT function performance. • Confirm the existence of an IT steering committee with representation from the executive level, key business operations areas, IT and key business support areas. • Enquire whether and confirm that formal documentation of the role and authority of the IT steering committee includes key sponsorship at the executive level. • Inspect documents such as meeting minutes and an IT steering committee charter to identify the participants involved in the committee, their respective job functions and the reporting relationship of the committee to executive management. • Enquire whether and confirm that IT is headed by a CIO or similar function and the reporting line is commensurate with the importance of IT. • Confirm through interviews and organisational chart reviews that no individual user groups/departments can exert undue influence over the IT function (e.g., reporting relationship of the IT function and its independence from a single business unit or department, and identifying how projects are funded). • Confirm through interviews and documentation reviews that the IT function is adequately resourced and funded to support the business function (e.g., review the business case, IT strategy and IT tactical plan for resource requirements). • Enquire whether and confirm that periodic reviews of the IT organisational structure occur, with the aim of ensuring that they reflect business needs. • Confirm with the head of IT administration that access to external resources is available as needed. • Confirm through interviews with IT personnel that a role has been assigned to each with corresponding IT tasks (e.g., assess whether personnel understand the role and tasks that have been assigned and the tasks are being performed). • Enquire whether and confirm that responsibilities have been assigned to roles (e.g., verify that each role has the necessary responsibilities to execute the role). • Enquire whether and confirm that role descriptions have been created, and delineate authority and responsibilities. • Enquire whether and confirm that a QA function exists. • Determine the role of the QA functions (e.g., monitoring processes to ensure compliance with the organisation’s QA-related policies, standards and procedures; and acting as a centre of expertise for the development of QA-related policies, standards and procedures). • Enquire whether and confirm that the QA function is adequately staffed with the appropriate skills. • Enquire whether and confirm that members of senior management have established risk management and information security functions that are accountable for the respective areas. • Enquire whether and confirm that the reporting line of the risk management and security function allows it to effectively design, implement and, in conjunction with line management, enforce compliance with the organisation’s policies and procedures. • Enquire whether and confirm that a process is in place to obtain senior management guidance on the acceptable level of risk associated with IT. • Enquire whether and confirm that roles and responsibilities for the risk management and information security function have been formalised and documented and that responsibilities have been appropriately allocated. Review the documentation and determine whether roles and responsibilities are being fulfiled as outlined. • Enquire whether and confirm that resource requirements are assessed regularly and are provided as needed. Assess whether the staffing levels are appropriate based on the the results of the resource requirement assessments. • Confirm through interview and documentation reviews that an inventory of information assets has been created, tracked and maintained. • Confirm through interviews that supervisors have the required skill set to perform supervisory functions (e.g., tracking of critical tasks, key performance indicators, staff performance appraisals and risk assessment). • Review the escalation procedure and verify that it has been implemented and is being applied consistently (e.g., issues are recorded, tracked and analysed periodically). • Enquire whether and confirm during periodic employee reviews that supervisory skills are assessed and required actions are taken to ensure competency. • Enquire whether and confirm that there is a process to identify conflicting functions. • Enquire whether and confirm that conflicting functions have been remediated. • Enquire whether and confirm that procedures address how appropriate segregation is maintained during periods when typical personnel are unavailable. 77© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II • Enquire whether segregation of duties is reviewed when job roles and responsibilities are created or updated and whether responsibilities are reassigned where necessary. Determine whether the changes are implemented (e.g., job descriptions clearly delineateauthority and responsibility). • Enquire whether and confirm that compensating controls have been designed and implemented as necessary (e.g., confirm with senior IT management or supervisors on the effectiveness of the compensating controls). Enquire whether and confirm that management periodically reviews staffing requirements in consideration of business/IT environment and strategy, and identifies skills and resource gaps. • Enquire whether and confirm that management is evaluating sourcing strategies (e.g., business/IT staff co-location, cross- functional training and job rotation) in conjunction with reviewing staffing requirements. • Enquire whether and confirm that management periodically identifies key processes, skills required to support the processes and key areas that lack job redundancy (e.g., determine the availability of individuals with relevant skills, experience and knowledge to fulfil the critical roles, and inspect documentation that lists the key processes and the designated individuals who support them). • Enquire whether and confirm that management has considered outsourcing or other support arrangements to provide job redundancy for key processes (e.g., inspect available contracts with third parties to identify the existence of outsourcing provisions). • Confirm the existence and maintenance of key contact lists and their availability to the appropriate personnel in a timely manner. Confirm that backup personnel are cross-trained. • Enquire whether and confirm that the policies, procedures, rules and responsibilities are being communicated to the contractor and that the contractor understands that management reserves the right to monitor and inspect all usage of IT resources. • Enquire whether and confirm that an appropriate individual has responsibility for reviewing the contractor’s work and approval of payments. • Enquire whether and confirm that IT management has defined the key stakeholders and relationships and that roles and responsibilities are communicated with stakeholders (e.g., users, suppliers, security officers, risk managers, regulators). • Confirm with management that appropriately skilled IT personnel are assigned to manage the relationship (e.g., inspect documents that list the IT contact for each key stakeholder). • Enquire whether and confirm that feedback is obtained from the key stakeholders (e.g., issues, action items, reports), and assess whether the feedback is being properly used to drive continuous improvement. Take the following steps to document the impact of the control weaknesses: • Assess the risk (e.g., threats, potential vulnerabilities, security, internal controls) that a road map to achieve the strategic goals will not be established. • Assess the risk and additional cost due to IT not being organised optimally to achieve strategic goals. • Assess the risk (e.g., threats, potential vulnerabilities, security, internal controls) that an IT strategic plan may not be effectively executed. • Assess the risks (e.g., threats, potential vulnerabilities, security, internal controls) of overreliance on key IT personnel. • Assess the additional cost of staffing requirements and sourcing strategies not being adjusted to meet expected business objectives and changing circumstances. • Assess the additional cost of personnel performing unauthorised duties relevant to their respective jobs and positions. • Assess the risks (e.g., threats, potential vulnerabilities, security, internal controls) that uncontrolled activities of external personnel may compromise the organisation’s information assets. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org78 P O 5 M a n a g e t h e I T I n ve s tm e n t A f ra m ew or k is e st ab lis he d an d m ai nt ai ne d to m an ag e IT -e na bl ed in ve st m en t p ro gr am m es a nd th at e nc om pa ss es c os t, be ne fi ts , p ri or iti sa tio n w ith in b ud ge t, a fo rm al bu dg et in g pr oc es s an d m an ag em en t a ga in st th e bu dg et . S ta ke ho ld er s ar e co ns ul te d to id en tif y an d co nt ro l t he to ta l c os ts a nd b en ef its w ith in th e co nt ex t o f th e IT s tr at eg ic an d ta ct ic al p la ns , a nd in iti at e co rr ec tiv e ac tio n w he re n ee de d. T he p ro ce ss f os te rs p ar tn er sh ip b et w ee n IT a nd b us in es s st ak eh ol de rs ; e na bl es th e ef fe ct iv e an d ef fi ci en t u se o f IT r es ou rc es ; a nd p ro vi de s tr an sp ar en cy a nd a cc ou nt ab ili ty in to th e to ta l c os t o f ow ne rs hi p, th e re al is at io n of b us in es s be ne fi ts a nd th e R O I of I T- en ab le d in ve st m en ts . Te st t he C on tr ol D es ig n • V er if y th at a f in an ci al m an ag em en t f ra m ew or k ex is ts , i nc lu di ng p ro ce ss es a nd r es po ns ib ili tie s, a s a ba si s fo r co st , b en ef it an d bu dg et m an ag em en t. E nq ui re w he th er a nd co nf ir m th at in pu ts a nd o ut pu ts o f th e fi na nc ia l f ra m ew or k ha ve b ee n de fi ne d an d th at m an ag em en t m ak es r eg ul ar im pr ov em en ts to th e fr am ew or k ba se d on a va ila bl e fi na nc ia l i nf or m at io n. • V er if y th at a p or tf ol io o f in ve st m en t p ro gr am m es , s er vi ce s an d as se ts h as b ee n cr ea te d an d m ai nt ai ne d. P er fo rm a h ig h- le ve l r ev ie w o f th e po rt fo lio to c he ck f or co m pl et en es s an d al ig nm en t w ith th e st ra te gi c an d ta ct ic al I T p la ns . • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss e xi st s to c om m un ic at e re le va nt c os t a nd b en ef it as pe ct s of th e po rt fo lio to th e ap pr op ri at e bu dg et p ri or iti sa tio n (b us in es s ca se s) , c os t m an ag em en t a nd b en ef it m an ag em en t p ro ce ss es . • C on fi rm th at th e co m m un ic at ed c os t a nd b en ef it in pu ts a re c om pa ra bl e an d co ns is te nt . • V er if y th at th e cr ea te d IT b ud ge t i nc lu de s pr oj ec ts , a ss et s an d se rv ic es . P O 5. 1 F in an ci al M an ag em en t F ra m ew or k E st ab lis h an d m ai nt ai n a fi na nc ia l f ra m ew or k to m an ag e th e in ve st m en t a nd c os t of I T a ss et s an d se rv ic es th ro ug h po rt fo lio s of I T- en ab le d in ve st m en ts , b us in es s ca se s an d IT b ud ge ts . Va lu e D riv er s C on tr ol O bj ec ti ve • In si gh t i nt o th e va lu e of I T ’s co nt ri bu tio n to th e bu si ne ss , b y us in g st an da rd is ed in ve st m en t c ri te ri a • IT p ri or iti es b as ed o n IT v al ue co nt ri bu tio n • C le ar a nd a gr ee d- up on b ud ge ts • Im pr ov ed a bi lit y to a ss ig n pr io ri tie s ba se d on b us in es s ca se s R is k D riv er s • U nc le ar p ri or iti es f or I T p ro je ct s • In ef fi ci en t p ro ce ss f or f in an ci al m an ag em en t • IT b ud ge t n ot r ef le ct in g bu si ne ss ne ed s • W ea k co nt ro l o ve r IT b ud ge ts • Fa ilu re o f se ni or m an ag em en t t o ap pr ov e th e IT b ud ge ts • L ac k of s en io r m an ag em en t s up po rt 79© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIXII Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss a nd d ec is io n- m ak in g co m m itt ee f or th e pr io ri tis at io n of I T in iti at iv es a nd r es ou rc es h as b ee n cr ea te d. V er if y th at th e co m m itt ee ’s r es po ns ib ili tie s ha ve b ee n de fi ne d in r el at io n to o th er c om m itt ee s. • E nq ui re w he th er a nd c on fi rm th at a ll IT in iti at iv es a re p ri or iti se d w ith in p or tf ol io s ba se d on b us in es s ca se s an d st ra te gi c an d ta ct ic al p la ns . • R ev ie w th e al lo ca te d bu dg et s an d cu t- of fs f or c on si st en cy a nd a cc ur ac y. • V er if y th ro ug h in sp ec tio n of m ee tin g m in ut es w he th er th e pr io rt is ia tio n de ci si on s ha ve b ee n co m m un ic at ed , a nd e nq ui re th ro ug h in te rv ie w s w he th er th e de ci si on s ar e re vi ew ed b y th e bu dg et s ta ke ho ld er . • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss e xi st s to id en tif y, c om m un ic at e an d re so lv e si gn if ic an t b ud ge t d ec is io ns th at im pa ct th e bu si ne ss c as e, p or tf ol io o r st ra te gi c pl an s. • V er if y th at th e IT st ra te gy c om m itt ee a nd e xe cu tiv e co m m itt ee h av e ra tif ie d ch an ge s to th e ov er al l I T b ud ge t f or it em s th at n eg at iv el y im pa ct th e en tit y’ s st ra te gi c or ta ct ic al p la ns a nd h av e su gg es te d ac tio ns to r es ol ve th es e im pa ct s. P O 5. 2 P ri or it is at io n W it hi n IT B ud ge t Im pl em en t a d ec is io n- m ak in g pr oc es s to p ri or iti se th e al lo ca tio n of I T r es ou rc es fo r op er at io ns , p ro je ct s an d m ai nt en an ce to m ax im is e IT ’s c on tr ib ut io n to op tim is in g th e re tu rn o n th e en te rp ri se ’s p or tf ol io o f IT -e na bl ed in ve st m en t pr og ra m m es a nd o th er I T s er vi ce s an d as se ts . Va lu e D riv er s C on tr ol O bj ec ti ve • Pr io ri tie s th at r ef le ct I T g oa ls a nd re qu ir em en ts o f th e bu si ne ss a nd a re tr an sp ar en t t o al l s ta ke ho ld er s • Fo cu se d us e of r es ou rc es • A pp ro pr ia te d ec is io n m ak in g, b al an ci ng co st , c on tin uo us im pr ov em en t, qu al ity an d re ad in es s fo r th e fu tu re R is k D riv er s • In ef fi ci en t r es ou rc e m an ag em en t • In ab ili ty to o pt im is e go al s an d ob je ct iv es • C on fu si on , d em ot iv at io n an d lo ss o f ag ili ty d ue to u nc le ar p ri or iti es • IT b ud ge t n ot in li ne w ith th e IT st ra te gy a nd in ve st m en t d ec is io ns P O 5 M a n a g e t h e I T In ve s tm e n t (c o n t. ) IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org80 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a m et ho do lo gy h as b ee n im pl em en te d to e st ab lis h, c ha ng e, a pp ro ve a nd c om m un ic at e a fo rm al I T b ud ge t. • R ev ie w th e IT b ud ge t t o ve ri fy w he th er r el ev an t e le m en ts ( e. g. , a ut ho ri se d so ur ce s of f un di ng , i nt er na l r es ou rc e co st s, th ir d- pa rt y co st s, c ap ita l a nd o pe ra tio na l e xp en se s) ar e ta ke n in to a cc ou nt w he n cr ea tin g th e bu dg et . • E nq ui re w he th er a nd c on fi rm th at b ud ge t c on tin ge nc ie s ha ve b ee n id en tif ie d an d a ra tio na le f or th es e co nt in ge nc ie s ha s be en a pp ro ve d. • V er if y th at th e ef fe ct iv en es s of th e bu dg et in g pr oc es s is m on ito re d (c os t a llo ca tio n, s er vi ce c os t a llo ca tio n an d bu dg et v ar ia nc e an al ys is ), a nd r ev ie w r ep or ts to v er if y th at le ss on s le ar ne d ar e re co rd ed to m ak e fu tu re b ud ge tin g m or e ac cu ra te a nd r el ia bl e. • E nq ui re w he th er a nd c on fi rm th at th e pe op le in vo lv ed in th e bu dg et in g pr oc es s (e .g ., pr oc es s, s er vi ce a nd p ro gr am m e ow ne rs , a ss et m an ag er s) a re p ro pe rl y in st ru ct ed . • E nq ui re w he th er a nd c on fi rm th at th er e is a n ap pr ov ed a nd c on si st en t b ud ge t c re at io n pr oc es s (e .g ., re vi ew th e bu dg et p la ns , m ak e de ci si on s ab ou t b ud ge t a llo ca tio ns , an d co m pi le a nd c om m un ic at e th e ov er al l I T b ud ge ts , p ro je ct c os t a llo ca tio n, s er vi ce c os t a llo ca tio n an d bu dg et v ar ia nc e an al ys is ). P O 5. 3 IT B ud ge ti ng E st ab lis h an d im pl em en t p ra ct ic es to p re pa re a b ud ge t r ef le ct in g th e pr io ri tie s es ta bl is he d by th e en te rp ri se ’s p or tf ol io o f IT -e na bl ed in ve st m en t p ro gr am m es , an d in cl ud in g th e on go in g co st s of o pe ra tin g an d m ai nt ai ni ng th e cu rr en t in fr as tr uc tu re . T he p ra ct ic es s ho ul d su pp or t d ev el op m en t o f an o ve ra ll IT b ud ge t as w el l a s de ve lo pm en t o f bu dg et s fo r in di vi du al p ro gr am m es , w ith s pe ci fi c em ph as is o n th e IT c om po ne nt s of th os e pr og ra m m es . T he p ra ct ic es s ho ul d al lo w f or o ng oi ng r ev ie w , r ef in em en t a nd a pp ro va l o f th e ov er al l b ud ge t a nd th e bu dg et s fo r in di vi du al p ro gr am m es . Va lu e D riv er s C on tr ol O bj ec ti ve • A n ef fe ct iv e de ci si on -m ak in g pr oc es s fo r bu dg et f or ec as tin g an d al lo ca tio n • Fo rm al ly d ef in ed s pe ct ru m o f fu nd in g op tio ns f or I T o pe ra tio ns • Id en tif ie d an d cl as si fi ed I T c os ts • C le ar a cc ou nt ab ili ty f or s pe nd in g R is k D riv er s • R es ou rc e co nf lic ts • In ap pr op ri at e al lo ca tio n of f in an ci al re so ur ce s of I T o pe ra tio ns • Fi na nc ia l r es ou rc es n ot a lig ne d w ith th e or ga ni sa tio n’ s go al s • L ac k of e m po w er m en t, le ad in g to lo ss of a gi lit y • L ac k of s en io r m an ag em en t s up po rt fo r th e IT b ud ge t P O 5 M a n a g e t h e I T In ve s tm e n t (c o n t. ) 81© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a f ra m ew or k ha s be en d ef in ed to m an ag e IT -r el at ed c os ts a nd th at I T e xp en di tu re c at eg or ie s ar e co m pr eh en si ve , a pp ro pr ia te a nd pr op er ly c la ss if ie d. •C on fi rm th at th er e is a pp ro pr ia te in de pe nd en ce b et w ee n in di vi du al s w ho c ap tu re , a na ly se a nd r ep or t f in an ci al in fo rm at io n, a nd th e IT b ud ge t h ol de rs . • R ev ie w e st ab lis he d tim es ca le s to d et er m in e w he th er th ey a re a lig ne d w ith b ud ge tin g an d ac co un tin g re qu ir em en ts a nd , w ith in I T p ro je ct s, w he th er th ey a re s tr uc tu re d ac co rd in g to th e de liv er ab le s tim et ab le . • E nq ui re w he th er a nd c on fi rm th at a m et ho d ha s be en d ef in ed th at c ol le ct s da ta to id en tif y sp ec if ie d de vi at io ns . • V er if y th at s ys te m s fr om w hi ch d at a ar e co lle ct ed h av e be en id en tif ie d. • D et er m in e w he th er th e in fo rm at io n pr ov id ed b y th e sy st em s is c om pl et e, a cc ur at e an d co ns is te nt . • D et er m in e ho w c os t- re la te d in fo rm at io n is c on so lid at ed , h ow it is p re se nt ed a t v ar io us le ve ls in th e or ga ni sa tio n an d to s ta ke ho ld er s, a nd w he th er it h el ps e na bl e th e tim el y id en tif ic at io n of r eq ui re d co rr ec tiv e ac tio ns . P O 5. 4 C os t M an ag em en t Im pl em en t a c os t m an ag em en t p ro ce ss c om pa ri ng a ct ua l c os ts to b ud ge ts . C os ts sh ou ld b e m on ito re d an d re po rt ed . W he re th er e ar e de vi at io ns , t he se s ho ul d be id en tif ie d in a ti m el y m an ne r an d th e im pa ct o f th os e de vi at io ns o n pr og ra m m es sh ou ld b e as se ss ed . T og et he r w ith th e bu si ne ss s po ns or o f th os e pr og ra m m es , ap pr op ri at e re m ed ia l a ct io n sh ou ld b e ta ke n an d, if n ec es sa ry , t he p ro gr am m e bu si ne ss c as e sh ou ld b e up da te d. Va lu e D riv er s C on tr ol O bj ec ti ve • A cc ur at e an d tim el y id en tif ic at io n of bu dg et v ar ia nc es • M ax im is ed a nd c os t- ef fi ci en t ut ili sa tio n of I T r es ou rc es • C on si st en tly p ri ce d se rv ic e de liv er y • T ra ns pa re nt I T v al ue c on tr ib ut io n • B us in es s un de rs ta nd in g of a ct ua l c os t an d be ne fi t o f IT R is k D riv er s • M is sp en di ng o f IT in ve st m en ts • In ap pr op ri at e se rv ic e pr ic in g • IT v al ue c on tr ib ut io n no t t ra ns pa re nt P O 5 M a n a g e t h e I T In ve s tm e n t (c o n t. ) IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org82 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at th e co st m an ag em en t p ro ce ss p ro vi de s su ff ic ie nt in fo rm at io n to id en tif y, q ua nt if y an d qu al if y be ne fi ts o f de liv er in g IT s ol ut io ns , pr ov id in g IT s er vi ce s an d m an ag in g IT a ss et s. • E nq ui re w he th er a nd c on fi rm th at th e al lo ca tio n of b en ef its a cr os s tim e al lo w s fo r m ea ni ng fu l a na ly si s of b en ef its . • R ev ie w th e pr oc es s fo r de ve lo pi ng m et ri cs f or m ea su ri ng b en ef its ( e. g. , o bt ai ni ng g ui da nc e fr om e xt er na l e xp er ts , i nd us tr y le ad er s an d co m pa ra tiv e be nc hm ar ki ng d at a) . • E nq ui re w he th er a nd c on fi rm th at th er e is a r em ed ia tio n pr oc es s fo r id en tif ie d be ne fi t d ev ia tio ns . P O 5. 5 B en ef it M an ag em en t Im pl em en t a p ro ce ss to m on ito r th e be ne fi ts f ro m p ro vi di ng a nd m ai nt ai ni ng ap pr op ri at e IT c ap ab ili tie s. I T ’s c on tr ib ut io n to th e bu si ne ss , e ith er a s a co m po ne nt o f IT -e na bl ed in ve st m en t p ro gr am m es o r as p ar t o f re gu la r op er at io na l s up po rt , s ho ul d be id en tif ie d an d do cu m en te d in a b us in es s ca se , ag re ed to , m on ito re d an d re po rt ed . R ep or ts s ho ul d be r ev ie w ed a nd , w he re th er e ar e op po rt un iti es to im pr ov e IT ’s c on tr ib ut io n, a pp ro pr ia te a ct io ns s ho ul d be de fi ne d an d ta ke n. W he re c ha ng es in I T ’s c on tr ib ut io n im pa ct th e pr og ra m m e, o r w he re c ha ng es to o th er r el at ed p ro je ct s im pa ct th e pr og ra m m e, th e pr og ra m m e bu si ne ss c as e sh ou ld b e up da te d. Va lu e D riv er s C on tr ol O bj ec ti ve • A cc ur at e id en tif ic at io n of b en ef it va ri an ce s du ri ng a nd a ft er im pl em en ta tio n • A cc ur at e in fo rm at io n fo r po rt fo lio de ci si on s, i. e. , c on tin ue , a dj us t o r re tir e pr og ra m m es • Pr op er ly p ri ce d se rv ic e de liv er y • T ra ns pa re nc y of I T ’s c on tr ib ut io n to th e bu si ne ss • B us in es s un de rs ta nd in g of a ct ua l c os t an d be ne fi t o f IT R is k D riv er s • M is sp en di ng o f IT in ve st m en ts • In ap pr op ri at e se rv ic e pr ic in g • IT v al ue c on tr ib ut io n no t t ra ns pa re nt • In co rr ec t p er ce pt io n of I T v al ue co nt ri bu tio n P O 5 M a n a g e t h e I T In ve s tm e n t (c o n t. ) 83© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Take the following steps to test the outcome of the control objectives: • Enquire whether and confirm that a financial management framework, processes and responsibilities have been defined and maintained to enable fair, transparent, repeatable and comparable estimation of IT costs and benefits for input to the portfolio of IT-enabled business programmes. • Assess whether the financial management framework provides information to enable effective and efficient IT investment and portfolio decisions, enables estimation of IT costs and benefits, and provides input into the maintenance of IT asset and services portfolios. Determine whether the financial management framework and processes provide sufficient financial information to assist in the development of business cases and facilitate the budget process. • Verify that investments, IT assets and services are being taken into account in preparing IT budgets. • Enquire whether and confirm that the current IT budget is tracked against actual costs and that variations are analysed. • Enquire whether and confirm that information provided by the budgeting process is sufficient to track project costs and assist in the allocation of IT resources. • Enquire whether and confirm that an effective decision-making process is implemented to prioritise all IT initiatives and allocate budgets accordingly. • Enquire whether and confirm that a methodology has been implemented to establish, maintain and communicate for change and approval of a formal IT budget. • Enquire whether and confirm that process, service and programme owners as well as project and asset managers have been instructed in how to capture budget requirements andplan budgets. • Confirm that there is a budgeting process and that this process is reviewed/improved on a periodic basis. • Review the cost management framework and verify that it defines all IT-related costs. Verify that the tools used to monitor costs are effective and used properly (i.e., how costs are allocated across budgets and projects, how costs are captured and analysed, and to whom and how they are reported). • Enquire whether and confirm that the allocation of the budget across time is aligned with IT projects and support activities to allow for meaningful analysis of budget variances. • Enquire whether and confirm that IT financial management members have been instructed in how to capture, consolidate and report the cost data. • Enquire whether and confirm that the appropriate level of management reviews the results of cost analysis and approves corrective actions. • Enquire whether and confirm that responsibility and accountability for achieving benefits as recorded in the business case have been assigned. • Enquire whether and confirm that the metrics for monitoring IT’s and the business’s contribution to the business case are collected, reported and analysed at regular intervals. • Enquire whether and confirm that the identified budget deviations are approved by business and IT management. Take the following steps to document the impact of the control weaknesses: • Assess the risks (e.g., threats, potential vulnerabilities, security, internal controls) that: – Input into business cases may not take into account current IT asset and service portfolios – New investment and maintenance may not influence the future IT budget – Cost/benefit aspects of projects may not be communicated to the budget prioritisation, cost management and benefit management processes – The allocation of IT resources may not be prioritised as a result of IT’s contribution to optimising ROI – Ongoing review, refinement and approval of the overall budget and the budgets for individual programmes may not occur – Cost deviations may not be identified in a timely manner and the impact of those deviations may not be assessed – Opportunities to improve IT’s contribution to business solutions may not be considered – Not all benefits may be identified in a cost-benefits analysis, resulting in poor prioritisation of projects and projects that could have been considered may be rejected P O 6 C o m m u n ic a te M a n a g e m e n t A im s a n d D ir e c ti o n M an ag em en t d ev el op s an e nt er pr is e IT c on tr ol f ra m ew or k an d de fi ne s an d co m m un ic at es p ol ic ie s. A n on go in g co m m un ic at io n pr og ra m m e is im pl em en te d to a rt ic ul at e th e m is si on , s er vi ce o bj ec tiv es , p ol ic ie s an d pr oc ed ur es , e tc ., ap pr ov ed a nd s up po rt ed b y m an ag em en t. T he c om m un ic at io n su pp or ts a ch ie ve m en t o f IT o bj ec tiv es a nd e ns ur es aw ar en es s an d un de rs ta nd in g of b us in es s an d IT r is ks , o bj ec tiv es a nd d ir ec tio n. T he p ro ce ss e ns ur es c om pl ia nc e w ith r el ev an t l aw s an d re gu la tio ns . IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org84 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th e ex is te nc e of f or m al ‘ to ne a t t he to p’ co m m un ic at io n (e .g ., C IO n ew sl et te r or in tr an et p ag e, p er io di c e- m ai ls , I T v is io n or g ui di ng pr in ci pl es ) de si gn ed to d ef in e an d m an ag e th e IT r is k an d co nt ro l e nv ir on m en t a nd e ns ur e th at it a lig ns w ith th e or ga ni sa tio n’ s ge ne ra l r is k an d co nt ro l e nv ir on m en t. • D et er m in e w he th er a cc ou nt ab ili ty a nd r es po ns ib ili ty h av e be en a ss ig ne d to in di vi du al s fo r es ta bl is hi ng a nd r ei nf or ci ng th e co m m un ic at io ns o f th e co nt ro l c ul tu re . • C on fi rm th e ex is te nc e of p ol ic ie s an d pr ac tic es to s up po rt th e co nt ro l e nv ir on m en t ( e. g. , a cc ep ta bl e us e po lic ie s, b ac kg ro un d ch ec ks ). • In sp ec t f or e vi de nc e of p er io di c aw ar en es s tr ai ni ng o n th es e po lic ie s an d pr ac tic es . • D et er m in e if a p ro ce ss e xi st s to p er io di ca lly ( at le as t a nn ua lly ) re as se ss th e ad eq ua cy o f th e co nt ro l e nv ir on m en t a nd r is k ap pe tit e to e ns ur e th at it is a lig ne d w ith th e or ga ni sa tio n’ s ch an gi ng e nv ir on m en t. • E nq ui re w he th er a nd c on fi rm th at H R p ol ic ie s (e .g ., ba ck gr ou nd c he ck s on jo b ap pl ic an ts , a w ar en es s tr ai ni ng f or n ew h ir es , s ig ne d co de o f co nd uc t d oc um en ta tio n, ap pr op ri at e co ns eq ue nc es f or u ne th ic al b eh av io ur ) su pp or t t he I T c on tr ol e nv ir on m en t. P O 6. 1 IT P ol ic y an d C on tr ol E nv ir on m en t D ef in e th e el em en ts o f a co nt ro l e nv ir on m en t f or I T, a lig ne d w ith th e en te rp ri se ’s m an ag em en t p hi lo so ph y an d op er at in g st yl e. T he se e le m en ts s ho ul d in cl ud e ex pe ct at io ns /r eq ui re m en ts r eg ar di ng d el iv er y of v al ue f ro m I T in ve st m en ts , ap pe tit e fo r ri sk , i nt eg ri ty , e th ic al v al ue s, s ta ff c om pe te nc e, a cc ou nt ab ili ty a nd re sp on si bi lit y. T he c on tr ol e nv ir on m en t s ho ul d be b as ed o n a cu ltu re th at su pp or ts v al ue d el iv er y w hi ls t m an ag in g si gn if ic an t r is ks , e nc ou ra ge s cr os s- di vi si on al c o- op er at io n an d te am w or k, p ro m ot es c om pl ia nc e an d co nt in uo us pr oc es s im pr ov em en t, an d ha nd le s pr oc es s de vi at io ns ( in cl ud in g fa ilu re ) w el l. Va lu e D riv er s C on tr ol O bj ec ti ve • C om pr eh en si ve I T c on tr ol en vi ro nm en t • C om pr eh en si ve s et o f IT p ol ic ie s • In cr ea se d aw ar en es s of th e or ga ni sa tio n’ s m is si on • Pr op er u se o f ap pl ic at io ns a nd I T se rv ic es R is k D riv er s • M is co m m un ic at io ns a bo ut or ga ni sa tio na l m is si on • M an ag em en t’s p hi lo so ph y m is in te rp re te d • A ct io ns n ot a lig ne d w ith th e or ga ni sa tio n’ s bu si ne ss o bj ec tiv es • N o tr an sp ar en t I T c on tr ol e nv ir on m en t • C om pl ia nc e an d se cu ri ty is su es 85© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a f or m al I T r is k an d co nt ro l f ra m ew or k ex is ts b as ed o n ac kn ow le dg ed in du st ry s ta nd ar ds /le ad in g pr ac tic es ( e. g. , C O SO , C O SO -E R M , C O B IT ). • A ss es s w he th er th e IT r is k an d co nt ro l f ra m ew or k is a lig ne d w ith th e or ga ni sa tio n’ s en te rp ri se r is k an d co nt ro l f ra m ew ork an d co ns id er s th e en te rp ri se r is k to le ra nc e le ve l. • E nq ui re w he th er a nd c on fi rm th at th e IT r is k an d co nt ro l f ra m ew or k sp ec if ie s its s co pe a nd p ur po se a nd o ut lin es m an ag em en t’s e xp ec ta tio ns o f w ha t n ee ds to b e co nt ro lle d. • E nq ui re w he th er a nd c on fi rm th at th e st ru ct ur e of th e IT r is k an d co nt ro l f ra m ew or k is w el l d ef in ed a nd r es po ns ib ili tie s ha ve b ee n cl ea rl y st at ed a nd a ss ig ne d to ap pr op ri at e in di vi du al s. • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss is in p la ce to p er io di ca lly r ev ie w ( pr ef er ab ly a nn ua lly ) th e IT r is k an d co nt ro l f ra m ew or k to m ai nt ai n its a de qu ac y an d re le va nc y. Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a h ie ra rc hi ca l s et o f po lic ie s, s ta nd ar ds a nd p ro ce du re s ha ve b ee n cr ea te d an d al ig n w ith th e IT s tr at eg y an d co nt ro l e nv ir on m en t. • E nq ui re w he th er a nd c on fi rm th at s pe ci fi c po lic ie s ex is t o n re le va nt k ey to pi cs , s uc h as q ua lit y, s ec ur ity , c on fi de nt ia lit y, in te rn al c on tr ol s, e th ic s an d in te lle ct ua l pr op er ty r ig ht s. • E nq ui re w he th er a nd c on fi rm th at a p ol ic y up da te p ro ce ss h as b ee n de fi ne d th at r eq ui re s, a t m in im um , a nn ua l r ev ie w s. • E nq ui re w he th er a nd c on fi rm th at p ro ce du re s ar e in p la ce to tr ac k co m pl ia nc e an d de fi ne c on se qu en ce s of n on -c om pl ia nc e. • E nq ui re w he th er a nd c on fi rm th at a cc ou nt ab ili ty h as b ee n de fi ne d an d do cu m en te d fo r fo rm ul at in g, d ev el op in g, d oc um en tin g, r at if yi ng , d is se m in at in g an d co nt ro lli ng po lic ie s to e ns ur e th at a ll el em en ts o f th e po lic y m an ag em en t p ro ce ss h av e be en a ss ig ne d to a cc ou nt ab le in di vi du al s. P O 6. 2 E nt er pr is e IT R is k an d C on tr ol F ra m ew or k D ev el op a nd m ai nt ai n a fr am ew or k th at d ef in es th e en te rp ri se ’s o ve ra ll ap pr oa ch to I T r is k an d co nt ro l a nd th at a lig ns w ith th e IT p ol ic y an d co nt ro l e nv ir on m en t an d th e en te rp ri se r is k an d co nt ro l f ra m ew or k. Va lu e D riv er s C on tr ol O bj ec ti ve • C om pr eh en si ve I T c on tr ol a nd r is k fr am ew or k • IT r is k an d co nt ro l a w ar en es s an d un de rs ta nd in g • R ed uc tio n of n eg at iv e bu si ne ss im pa ct w he n pl an ne d an d un pl an ne d is su es oc cu r R is k D riv er s • Se ns iti ve c or po ra te in fo rm at io n di sc lo se d • Ir re gu la ri tie s no t i de nt if ie d • Fi na nc ia l l os se s • C om pl ia nc e an d se cu ri ty is su es P O 6 C o m m u n ic a te M a n a g e m e n t A im s a n d D ir e c ti o n ( c o n t. ) P O 6. 3 IT P ol ic ie s M an ag em en t D ev el op a nd m ai nt ai n a se t o f po lic ie s to s up po rt I T s tr at eg y. T he se p ol ic ie s sh ou ld in cl ud e po lic y in te nt ; r ol es a nd r es po ns ib ili tie s; e xc ep tio n pr oc es s; co m pl ia nc e ap pr oa ch ; a nd r ef er en ce s to p ro ce du re s, s ta nd ar ds a nd g ui de lin es . T he ir r el ev an ce s ho ul d be c on fi rm ed a nd a pp ro ve d re gu la rl y. Va lu e D riv er s C on tr ol O bj ec ti ve • A pp ro pr ia te p ol ic ie s an d pr oc ed ur es fo r th e or ga ni sa tio n • Q ua lit y w ith in th e or ga ni sa tio n • Pr op er u se o f ap pl ic at io ns a nd I T se rv ic es • T ra ns pa re nc y an d un de rs ta nd in g of I T co st s, b en ef its , s tr at eg y an d se cu ri ty le ve ls R is k D riv er s • G re at er n um be r an d im pa ct o f se cu ri ty br ea ch es • U na cc ep te d or u nk no w n po lic ie s • M is un de rs ta nd in g of m an ag em en t’s ai m s an d di re ct io ns • O ut -o f- da te o r in co m pl et e po lic ie s • Po or o rg an is at io na l s ec ur ity c ul tu re • L ac k of tr an sp ar en cy IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org86 Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss is in p la ce to tr an sl at e IT p ol ic ie s an d st an da rd s in to o pe ra tio na l p ro ce du re s. • E nq ui re w he th er a nd c on fi rm th at e m pl oy m en t c on tr ac ts a nd in ce nt iv e m ec ha ni sm s ar e al ig ne d w ith p ol ic ie s. • E nq ui re w he th er a nd c on fi rm th at a p ro ce ss is in p la ce to r eq ui re u se rs to e xp lic itl y ac kn ow le dg e th at th ey r ec ei ve d, u nd er st an d an d ac ce pt r el ev an t I T p ol ic ie s, s ta nd ar ds an d pr oc ed ur es . T he a ck no w le dg em en t s ho ul d be p er io di ca lly r ef re sh ed ( e. g. , b ia nn ua lly ). • E nq ui re w he th er s uf fi ci en t a nd s ki lle d re so ur ce s ar e av ai la bl e to s up po rt p ol ic y ro llo ut . Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at th er e ar e m an ag em en t p ro ce ss es to r eg ul ar ly c om m un ic at e IT o bj ec tiv es a nd d ir ec tio n. • V er if y w ith a r ep re se nt at iv e sa m pl e of s ta ff m em be rs a t d if fe re nt le ve ls th at I T o bj ec tiv es h av e be en c le ar ly c om m un ic at ed a nd u nd er st oo d. • R ev ie w p as t c om m un ic at io ns a nd v er if y th at th ey c ov er th e m is si on , s er vi ce o bj ec tiv es , s ec ur ity , i nt er na l c on tr ol s, q ua lit y, c od e of e th ic s/ co nd uc t, po lic ie s an d pr oc ed ur es , e tc . P O 6. 4 P ol ic y, St an da rd a nd P ro ce du re s R ol lo ut R ol l o ut a nd e nf or ce I T p ol ic ie s to a ll re le va nt s ta ff , s o th ey a re b ui lt in to a nd a re an in te gr al p ar t o f en te rp ri se o pe ra tio ns . Va lu e D riv er s C on tr ol O bj ec ti ve • A pp ro pr ia te p ro te ct io n of th e or ga ni sa tio n’ s as se ts • D ec is io ns a lig ne d w ith th e or ga ni sa tio n’ s bu si ne ss o bj ec tiv es • E ff ic ie nt m an ag em en t o f th e or ga ni sa tio n’ s as se ts • Pr op er u se o f IT r es ou rc es a nd I T se rv ic es R is k D riv er s • O rg an is at io n’ s po lic ie s, s ta nd ar ds a nd pr oc ed ur es u nk no w n or n ot a cc ep te d • L ac k of c om m un ic at io n of m an ag em en t’s a im s and di re ct io ns • C on tr ol c ul tu re n ot a lig ne d w ith m an ag em en t’s a im s • Po lic ie s m is un de rs to od o r no t ac ce pt ed • B us in es s ri sk o f po lic ie s an d pr oc ed ur es n ot f ol lo w ed P O 6 C o m m u n ic a te M a n a g e m e n t A im s a n d D ir e c ti o n ( c o n t. ) P O 6. 5 C om m un ic at io n of I T O bj ec ti ve s an d D ir ec ti on C om m un ic at e aw ar en es s an d un de rs ta nd in g of b us in es s an d IT o bj ec tiv es a nd di re ct io n to a pp ro pr ia te s ta ke ho ld er s an d us er s th ro ug ho ut th e en te rp ri se . Va lu e D riv er s C on tr ol O bj ec ti ve • C le ar ly c om m un ic at ed m an ag em en t ph ilo so ph y • In cr ea se d aw ar en es s of th e or ga ni sa tio n’ s m is si on • A w ar en es s an d un de rs ta nd in g of r is ks , se cu ri ty , o bj ec tiv es , e tc ., w ith in th e or ga ni sa tio n • D ec is io ns a lig ne d w ith th e or ga ni sa tio n’ s bu si ne ss o bj ec tiv es R is k D riv er s • IT o bj ec tiv es n ot a ch ie ve d • Po or a cc ep ta nc e or u nd er st an di ng o f th e or ga ni sa tio na l p ol ic y • B us in es s th re at s no t i de nt if ie d in a tim el y m an ne r • L ac k of u nd er st an di ng o f m an ag em en t’s a im s an d di re ct io ns • L ac k of c on fi de nc e an d tr us t i n IT ’s m is si on • B re ak do w n in c on tr ol a nd s ec ur ity cu ltu re 87© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Take the following steps to test the outcome of the control objectives: • Assess the frequency, format and content of the communication of the ‘tone at the top’ messages to determine if it will effectively define and reinforce the control culture, risk appetite, ethical values, code of conduct and requirements of management integrity. • Inspect for evidence of periodic awareness training on policies and practices that are relevant to support the control environment (e.g., annual code of conduct or ethics training, periodic acknowledgement of acceptable use policies). Assess employees’ understanding of IT management’s philosophy and risk appetite to determine the extent to which it is aligned with management. Assess through inquiry and observation whether there is a general understanding of key risks and regulatory requirements that affect the IT control environment, or a general understanding of the importance of adhering to IT policies and procedures. • Determine whether there is an IT risk and control framework that defines the enterprise’s overall approach to IT risk and control and that aligns the IT policy and control environment to the enterprise risk and control framework. • Determine whether the responsibilities associated with implementing and maintaining the IT risk and control framework are being adequately carried out by qualified individuals. Inspect defined risks and controls to determine their adequacy in controlling the confidentiality, integrity and availability of information systems and networks. • Review IT policies to determine the frequency of updates and whether a re-evaluation has occurred at least annually. Make necessary adjustments and amendments, and determine whether updated IT policies are appropriately communicated across the enterprise. • Confirm through interviews that resources have been allocated to those who perform appropriate roles and responsibilities for formulating, developing, documenting, ratifying, disseminating and controlling IT policies. • Verify that sufficient and skilled resources have been allocated to support the rollout process, including monitoring and enforcing compliance. Examine and verify through interviews that operational procedures that support the IT policies and standards have been communicated, understood and accepted by appropriate staff. • Inspect documentation of acknowledgement and acceptance of IT policies for a sample of employees to determine that it is being consistently administered and periodically refreshed. • Inspect evidence to ensure that communication takes place to articulate IT objectives and direction and that management support is visible. • Enquire whether and confirm that the communication process has the necessary resources and skills for effective communication. Take the following steps to document the impact of the control weaknesses: • Determine whether lack of appropriate IT policy management has resulted in lack of adequate control over IT resources and lack of achievement of business objectives. • Determine whether lack of adequate communication, monitoring, and enforcement of IT policies and standards has resulted in a lack of compliance with those standards and the associated non-achievement of business goals. • Determine whether lack of awareness of IT objectives and direction has resulted in the lack of achievement of business goals. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org88 P O 7 M a n a g e I T H u m a n R e s o u rc e s A c om pe te nt w or kf or ce is a cq ui re d an d m ai nt ai ne d fo r th e cr ea tio n an d de liv er y of I T s er vi ce s to th e bu si ne ss . T hi s is a ch ie ve d by f ol lo w in g de fi ne d an d ag re ed -u po n pr ac tic es s up po rt in g re cr ui tin g, tr ai ni ng , e va lu at in g pe rf or m an ce , p ro m ot in g an d te rm in at in g. T hi s pr oc es s is c ri tic al , a s pe op le a re im po rt an t a ss et s, a nd g ov er na nc e an d th e in te rn al c on tr ol e nv ir on m en t a re h ea vi ly d ep en de nt o n th e m ot iv at io n an d co m pe te nc e of p er so nn el . Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a n IT H R m an ag em en t p la n ex is ts th at r ef le ct s th e de fi ni tio n of s ki ll re qu ir em en ts a nd p re fe rr ed p ro fe ss io na l q ua lif ic at io ns to m ee t ta ct ic al a nd s tr at eg ic I T n ee ds o f th e or ga ni sa tio n. T he p la n sh ou ld b e up da te d at le as t a nn ua lly a nd s ho ul d in cl ud e sp ec if ic r ec ru itm en t a nd r et en tio n ac tio n pl an s to ad dr es s cu rr en t a nd f ut ur e re qu ir em en ts . I t s ho ul d al so in cl ud e po lic ie s fo r th e en fo rc em en t o f un in te rr up te d ho lid ay p ol ic y pr oc ed ur es , a s ap pl ic ab le . • E nq ui re w he th er a nd c on fi rm th at a d oc um en te d pr oc es s fo r th e re cr ui tm en t a nd r et en tio n of I T p er so nn el is in p la ce a nd r ef le ct s th e ne ed s id en tif ie d in th e IT H R p la n. • C on fi rm th at H R p ro fe ss io na ls r eg ul ar ly r ev ie w a nd a pp ro ve th e IT r ec ru itm en t a nd r et en tio n pr oc es s to e ns ur e al ig nm en t w ith o rg an is at io na l p ol ic ie s. Te st t he C on tr ol D es ig n • In sp ec t a s am pl e of jo b de sc ri pt io ns f or a c om pl et e an d ap pr op ri at e de sc ri pt io n of r eq ui re d sk ill s, c om pe te nc ie s an d qu al if ic at io ns . • V er if y th at p ro ce ss es e xi st a nd a re c on du ct ed o n a re gu la r ba si s to r ev ie w a nd r ef re sh jo b de sc ri pt ions . • E nq ui re w he th er a nd c on fi rm th at m an ag em en t h as id en tif ie d sk ill n ee ds , i nc lu di ng a pp ro pr ia te e du ca tio n, c ro ss -t ra in in g an d ce rt if ic at io n re qu ir em en ts to a dd re ss sp ec if ic r eq ui re m en ts o f th e or ga ni sa tio n. P O 7. 1 P er so nn el R ec ru it m en t an d R et en ti on M ai nt ai n IT p er so nn el r ec ru itm en t p ro ce ss es in li ne w ith th e ov er al l or ga ni sa tio n’ s pe rs on ne l p ol ic ie s an d pr oc ed ur es ( e. g. , h ir in g, p os iti ve w or k en vi ro nm en t, or ie nt in g) . I m pl em en t p ro ce ss es to e ns ur e th at th e or ga ni sa tio n ha s an a pp ro pr ia te ly d ep lo ye d IT w or kf or ce w ith th e sk ill s ne ce ss ar y to a ch ie ve or ga ni sa tio na l g oa ls . Va lu e D riv er s C on tr ol O bj ec ti ve • IT s ki lls o pt im is ed a nd a lig ne d w ith or ga ni sa tio na l g oa ls • Im pr ov ed r ec ru itm en t a nd r et en tio n of th e ri gh t I T s ki lls to s up po rt f ut ur e bu si ne ss r eq ui re m en ts R is k D riv er s • IT s er vi ce s fo r bu si ne ss -c ri tic al pr oc es se s no t s up po rt ed a de qu at el y • In ef fe ct iv e IT s ol ut io ns • L ac k of a pp ro pr ia te I T s ki lls d ue to I T hu m an r es ou rc es m an ag em en t n ot be in g in li ne w ith m ar ke t c on di tio ns P O 7. 2 P er so nn el C om pe te nc ie s R eg ul ar ly v er if y th at p er so nn el h av e th e co m pe te nc ie s to f ul fi l t he ir r ol es o n th e ba si s of th ei r ed uc at io n, tr ai ni ng a nd /o r ex pe ri en ce . D ef in e co re I T c om pe te nc y re qu ir em en ts a nd v er if y th at th ey a re b ei ng m ai nt ai ne d, u si ng q ua lif ic at io n an d ce rt if ic at io n pr og ra m m es w he re a pp ro pr ia te . Va lu e D riv er s C on tr ol O bj ec ti ve • A pp ro pr ia te ly q ua lif ie d an d ex pe ri en ce d st af f fo r sp ec if ic jo b re sp on si bi lit ie s • Im pr ov ed p er so na l c ar ee r de ve lo pm en t, co nt ri bu tio n an d jo b sa tis fa ct io n • C on tin uo us d ev el op m en t o f sk ill s in lin e w ith b us in es s ne ed s R is k D riv er s • IT s ta ff n ot s ki lle d as r eq ui re d fo r bu si ne ss c ri tic al r eq ui re m en ts • IT s ta ff d is sa tis fi ed w ith c ar ee r pr og re ss io n • M or e in ci de nt s an d er ro rs w ith gr ea te r im pa ct 89© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • In sp ec t a s am pl e of r ol e de sc ri pt io ns to e ns ur e in cl us io n of a n ad eq ua te d ef in iti on o f re sp on si bi lit ie s, c om pe te nc ie s, a nd s en si tiv e se cu ri ty a nd c om pl ia nc e re qu ir em en ts . • In sp ec t a s am pl e of a ck no w le dg em en ts f or a cc ep ta nc e of r ol e de sc ri pt io ns a nd r es po ns ib ili tie s fo r IT p er so nn el . • R ev ie w te rm s an d co nd iti on s of e m pl oy m en t f or e xi st en ce o f no n- di sc lo su re , i nt el le ct ua l p ro pe rt y ri gh ts , r es po ns ib ili ty f or in fo rm at io n se cu ri ty , i nt er na l c on tr ol , ap pl ic ab le la w s an d re qu ir em en ts . T he se s ho ul d al ig n w ith th e or ga ni sa tio n’ s re qu ir em en ts f or n on -d is cl os ur e of c on fi de nt ia l i nf or m at io n. • In sp ec t t he s am pl e of jo b de sc ri pt io ns f or h ig h- ri sk p os iti on s to d et er m in e w he th er th e sp an o f co nt ro l a nd r eq ui re d su pe rv is io n is a pp ro pr ia te f or e ac h ro le . P O 7. 3 St af fi ng o f R ol es D ef in e, m on ito r an d su pe rv is e ro le s, r es po ns ib ili tie s an d co m pe ns at io n fr am ew or ks f or p er so nn el , i nc lu di ng th e re qu ir em en t t o ad he re to m an ag em en t po lic ie s an d pr oc ed ur es , t he c od e of e th ic s, a nd p ro fe ss io na l p ra ct ic es . T he le ve l of s up er vi si on s ho ul d be in li ne w ith th e se ns iti vi ty o f th e po si tio n an d ex te nt o f re sp on si bi lit ie s as si gn ed . Va lu e D riv er s C on tr ol O bj ec ti ve • C om m un ic at io n of a nd a dh er en ce to o rg an is at io n po lic ie s, p ra ct ic es an d et hi cs • C le ar a cc ou nt ab ili ty a nd r es po ns ib ili ty fo r ke y fu nc tio ns • Im pr ov ed a lig nm en t o f st af f co nt ri bu tio n to b us in es s go al s R is k D riv er s • In co rr ec t a ct io ns a nd d ec is io ns b as ed on u nc le ar d ir ec tio n se tti ng • In cr ea se d er ro rs a nd in ci de nt s ca us ed by la ck o f su pe rv is io n • St af f di ss at is fa ct io n th ro ug h po or m an ag em en t a nd o ve rs ig ht P O 7 M a n a g e I T H u m a n R e s o u rc e s ( c o n t. ) Te st t he C on tr ol D es ig n • W al k th ro ug h th e tr ai ni ng e ff ec tiv en es s m ea su re m en t p ro ce ss to c on fi rm th at th e cr iti ca l t ra in in g an d aw ar en es s re qu ir em en ts a re in cl ud ed . • In sp ec t t ra in in g pr og ra m m e co nt en t f or c om pl et en es s an d ap pr op ri at en es s. I ns pe ct d el iv er y m ec ha ni sm s to d et er m in e w he th er th e in fo rm at io n is d el iv er ed to a ll us er s of IT r es ou rc es , i nc lu di ng c on su lta nt s, c on tr ac to rs , t em po ra ry s ta ff m em be rs a nd , w he re a pp lic ab le , c us to m er s an d su pp lie rs . • In sp ec t t ra in in g pr og ra m m e co nt en t t o de te rm in e if a ll in te rn al c on tr ol f ra m ew or ks a nd s ec ur ity r eq ui re m en ts a re in cl ud ed b as ed o n th e or ga ni sa tio n’ s se cu ri ty p ol ic ie s an d in te rn al c on tr ol s (e .g ., im pa ct o f no n- ad he re nc e to s ec ur ity r eq ui re m en ts , a pp ro pr ia te u se o f co m pa ny r es ou rc es a nd f ac ili tie s, in ci de nt h an dl in g, e m pl oy ee re sp on si bi lit y fo r in fo rm at io n se cu ri ty ). • E nq ui re w he th er a nd c on fi rm th at tr ai ni ng m at er ia ls a nd p ro gr am m es h av e be en r ev ie w ed r eg ul ar ly f or a de qu ac y. • In sp ec t t he p ol ic y fo r de te rm in in g tr ai ni ng r eq ui re m en ts . C on fi rm th at th e tr ai ni ng r eq ui re m en t’s p ol ic y en su re s th at th e or ga ni sa tio n’ s cr iti ca l r eq ui re m en ts a re r ef le ct ed in tr ai ni ng a nd a w ar en es s pr og ra m m es . P O 7. 4 P er so nn el T ra in in g Pr ov id e IT e m pl oy ee s w ith a pp ro pr ia te o ri en ta tio n w he n hi re d an d on go in g tr ai ni ng to m ai nt ai n th ei r know le dg e, s ki lls , a bi lit ie s, in te rn al c on tr ol s an d se cu ri ty a w ar en es s at th e le ve l r eq ui re d to a ch ie ve o rg an is at io na l g oa ls . Va lu e D riv er s C on tr ol O bj ec ti ve • E nh an ce d pe rs on al c on tr ib ut io n an d pe rf or m an ce to w ar d or ga ni sa tio na l su cc es s • E ff ec tiv e an d ef fi ci en t d el iv er y of ea ch e m pl oy ee ’s r ol e • Su pp or t o f te ch ni ca l a nd m an ag em en t de ve lo pm en t, in cr ea si ng p er so nn el re te nt io n • In cr ea se in e m pl oy ee s’ va lu e to th e en te rp ri se R is k D riv er s • In su ff ic ie nt s ec ur ity a w ar en es s, ca us in g er ro rs o r in ci de nt s • K no w le dg e ga ps r eg ar di ng p ro du ct s, se rv ic es a nd p ra ct ic es • In su ff ic ie nt s ki lls , l ea di ng to s er vi ce de gr ad at io n an d in cr ea se d er ro rs a nd in ci de nt s Te st t he C on tr ol D es ig n • In sp ec t d oc um en ta tio n on k ey r ol e pe rs on ne l f or r el ia nc e on s in gl e in di vi du al s fo r cr iti ca l p ro ce ss es w ith in th e IT o rg an is at io n. • E nq ui re w he th er tr ai ni ng p ro gr am m es in co rp or at e te ch ni qu es to m iti ga te th e ri sk o f ov er de pe nd en ce o n ke y re so ur ce s. P ro gr am m es s ho ul d in cl ud e cr os s- tr ai ni ng , do cu m en ta tio n of k ey ta sk s, jo b ro ta tio n, k no w le dg e sh ar in g an d su cc es si on p la nn in g fo r cr iti ca l r ol es w ith in th e or ga ni sa tio n. Te st t he C on tr ol D es ig n • In sp ec t s el ec tio n cr ite ri a fo r pe rf or m an ce o f se cu ri ty c le ar an ce b ac kg ro un d ch ec ks . • R ev ie w f or a pp ro pr ia te d ef in iti on o f cr iti ca l r ol es , f or w hi ch s ec ur ity c le ar an ce c he ck s ar e re qu ir ed . T hi s sh ou ld a pp ly to e m pl oy ee s, c on tr ac to rs a nd v en do rs . • E nq ui re w he th er a nd c on fi rm th at h ir in g pr oc es se s in cl ud e cl ea ra nc e ba ck gr ou nd c he ck s. I ns pe ct h ir in g do cu m en ta tio n fo r a re pr es en ta tiv e sa m pl e of I T s ta ff m em be rs to ev al ua te w he th er b ac kg ro un d ch ec ks h av e be en c om pl et ed a nd e va lu at ed . P O 7. 5 D ep en de nc e U po n In di vi du al s M in im is e th e ex po su re to c ri tic al d ep en de nc y on k ey in di vi du al s th ro ug h kn ow le dg e ca pt ur e (d oc um en ta tio n) , k no w le dg e sh ar in g, s uc ce ss io n pl an ni ng an d st af f ba ck up . Va lu e D riv er s C on tr ol O bj ec ti ve • A de qu at el y su pp or te d cr iti ca l I T ac tiv iti es th at c on tin ua lly m ee t ob je ct iv es • C on tin ge nc y in p la ce f or n on - av ai la bi lit y of k ey p er so nn el • R ed uc ed r is k of in ci de nt s by in te rn al IT s ta ff R is k D riv er s • In cr ea se d nu m be r an d im pa ct o f in ci de nt s ca us ed b y un av ai la bi lit y of es se nt ia l s ki lls to p er fo rm a c ri tic al ro le • St af f di ss at is fa ct io n du e to la ck o f su cc es si on p la nn in g an d jo b ad va nc em en t o pp or tu ni tie s • In ab ili ty to p er fo rm c ri tic al I T ac tiv iti es P O 7 M a n a g e I T H u m a n R e s o u rc e s ( c o n t. ) P O 7. 6 P er so nn el C le ar an ce P ro ce du re s In cl ud e ba ck gr ou nd c he ck s in th e IT r ec ru itm en t p ro ce ss . T he e xt en t a nd fr eq ue nc y of p er io di c re vi ew s of th es e ch ec ks s ho ul d de pe nd o n th e se ns iti vi ty an d/ or c ri tic al ity o f th e fu nc tio n an d sh ou ld b e ap pl ie d fo r em pl oy ee s, co nt ra ct or s an d ve nd or s. Va lu e D riv er s C on tr ol O bj ec ti ve • R ec ru itm en t o f ap pr op ri at e pe rs on ne l • Pr oa ct iv e pr ev en tio n of in fo rm at io n di sc lo su re a nd c on fi de nt ia lit y st an da rd s R is k D riv er s • In cr ea se d ri sk o f th re at s oc cu rr in g fr om w ith in th e IT o rg an is at io n • D is cl os ur e of c us to m er o r co rp or at e in fo rm at io n an d in cr ea se d ex po su re o f co rp or at e as se ts IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org90 91© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • In sp ec t a r ep re se nt at iv e sa m pl e of e m pl oy ee jo b pe rf or m an ce e va lu at io ns to d et er m in e w he th er c ri te ri a fo r go al s et tin g in cl ud es S M A R R T o bj ec tiv es . T he se s ho ul d re fl ec t t he c or e co m pe te nc ie s, c om pa ny v al ue s an d sk ill s re qu ir ed f or e ac h ro le . W al k th ro ug h th e jo b pe rf or m an ce e va lu at io n pr oc es s to d et er m in e w he th er p ol ic ie s an d pr oc ed ur es f or th e us e an d st or ag e of p er so na l i nf or m at io n ar e cl ea r an d co m pl y w ith th e ap pl ic ab le le gi sl at io n. • In sp ec t t he r em un er at io n/ re co gn iti on p ro ce ss to d et er m in e if it is in li ne w ith p er fo rm an ce g oa ls a nd o rg an is at io na l p ol ic y. • In sp ec t p er fo rm an ce im pr ov em en t p la ns to d et er m in e al ig nm en t w ith o rg an is at io na l p ol ic ie s an d co ns is te nt a pp lic at io n th ro ug ho ut th e IT o rg an is at io n. P er fo rm an ce im pr ov em en t p la ns s ho ul d in cl ud e sp ec if ic al ly d ef in ed g oa ls , t im el in es f or c om pl et io n an d an a pp ro pr ia te le ve l o f di sc ip lin ar y ac tio n if im pr ov em en ts a re n ot a ch ie ve d. Te st t he C on tr ol D es ig n • E nq ui re a nd in sp ec t w he th er e xi t p ro ce du re s fo r vo lu nt ar y te rm in at io n of e m pl oy m en t a re d oc um en te d an d co nt ai n al l r eq ui re d el em en ts , s uc h as n ec es sa ry k no w le dg e tr an sf er , t im el y se cu ri ng o f lo gi ca l a nd p hy si ca l a cc es s, r et ur n of th e or ga ni sa tio n’ s as se ts , a nd c on du ct in g of e xi t i nt er vi ew s. • E nq ui re w he th er jo b ch an ge p ro ce du re s ar e do cu m en te d an d co nt ai n al l r eq ui re d el em en ts to m in im is e di sr up tio n of b us in es s pr oc es se s. E xa m pl es in cl ud e th e ne ed f or jo b m en to ri ng , j ob h an d- ov er s te ps a nd p re pa ra to ry f or m al tr ai ni ng . I ns pe ct jo b ch an ge p ro ce du re s to d et er m in e if th e pr oc ed ur es a re c on si st en tly f ol lo w ed . • A cq ui re th ro ug h H R a li st o f te rm in at ed /tr an sf er re d us er s (f or th e pa sts ix m on th s to o ne y ea r) . P O 7. 7 E m pl oy ee J ob P er fo rm an ce E va lu at io n R eq ui re a ti m el y ev al ua tio n to b e pe rf or m ed o n a re gu la r ba si s ag ai ns t i nd iv id ua l ob je ct iv es d er iv ed f ro m th e or ga ni sa tio n’ s go al s, e st ab lis he d st an da rd s an d sp ec if ic jo b re sp on si bi lit ie s. E m pl oy ee s sh ou ld r ec ei ve c oa ch in g on p er fo rm an ce an d co nd uc t w he ne ve r ap pr op ri at e. Va lu e D riv er s C on tr ol O bj ec ti ve • Im pr ov ed in di vi du al a nd c ol le ct iv e pe rf or m an ce a nd c on tr ib ut io n to or ga ni sa tio na l g oa ls • Im pr ov ed s ta ff s at is fa ct io n • Im pr ov ed m an ag em en t p er fo rm an ce fr om s ta ff f ee db ac k an d re vi ew pr oc es se s • E ff ec tiv e us e of I T s ta ff R is k D riv er s • In ab ili ty to id en tif y in ef fi ci en t op er at io ns • In ef fe ct iv e tr ai ni ng p ro gr am m e • D is sa tis fi ed a nd d is gr un tle d st af f, le ad in g to r et en tio n pr ob le m s an d po ss ib le in ci de nt s • L os s of c om pe te nt s ta ff m em be rs a nd re la te d co rp or at e kn ow le dg e P O 7 M a n a g e I T H u m a n R e s o u rc e s ( c o n t. ) P O 7. 8 Jo b C ha ng e an d T er m in at io n Ta ke e xp ed ie nt a ct io ns r eg ar di ng jo b ch an ge s, e sp ec ia lly jo b te rm in at io ns . K no w le dg e tr an sf er s ho ul d be a rr an ge d, r es po ns ib ili tie s re as si gn ed a nd a cc es s ri gh ts r em ov ed s uc h th at r is ks a re m in im is ed a nd c on tin ui ty o f th e fu nc tio n is gu ar an te ed . Va lu e D riv er s C on tr ol O bj ec ti ve • E ff ic ie nt a nd e ff ec tiv e co nt in ua tio n of bu si ne ss -c ri tic al o pe ra tio ns • Im pr ov ed s ta ff r et en tio n • A m or e se cu re in fo rm at io n en vi ro nm en t t hr ou gh ti m el y an d ap pr op ri at e re st ri ct io n of a cc es s R is k D riv er s • U na ut ho ri se d ac ce ss w he n em pl oy ee s ar e te rm in at ed • L ac k of s m oo th c on tin ua tio n of bu si ne ss -c ri tic al o pe ra tio ns IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org92 Take the following steps to test the outcome of the control objectives: • Inspect the IT human resource plan to verify that the IT needs of the organisation are defined. The IT human resource plan should be based on organisational objectives and include strategic initiatives, applicable regulatory requirements and the associated IT skills required. • Ensure that current and future needs are assessed against currently available skills and that gaps are translated into action plans. • Inspect the IT HR management plan and determine whether it addresses retention practices within the IT organisation, including the identification of critical and scarce skills, consideration of personal evaluations, compensation and incentives, development plans, and individual training needs. • Verify that job descriptions are periodically reviewed and that job descriptions include skill set competencies and qualifications of current personnel. Compare the skill sets of current employees to job description requirements. Inspect professional development plans from a sample of employees to determine the adequacy of career planning. Development plans should include encouragement of competency development, opportunities for personal advancement and measures to reduce dependence on key individuals. • Review job descriptions to ensure that each is current and relevant. Include the employee handbook/third-party agreements to confirm that the obligations of employees and third-party personnel are clearly stated and appropriate for the given role. Inspect for employee acknowledgement of conditions for employment, including responsibility for information security, internal control, regulatory compliance, protection of intellectual property and non-disclosure of confidential information. Observe whether the amount of supervision applied to high-risk roles is appropriate. Review procedures governing the activities of high-risk roles to determine if supervisory approval is required and has been performed for critical decisions. • Determine whether appropriate benchmarking of human resource management activities has been performed against similar organisations, appropriate international standards or industry best practices on a periodic basis. Confirm that the level of supervision is appropriate for the sensitivity of the position and responsibilities assigned. • Inspect automation controls to track changes to privilege user permissions. • Verify that the personnel training process is being delivered to all new users prior to granting access and is redelivered on an annual basis. Inspect the personnel training programme content for completeness and appropriateness (such as education on the organisation’s requirements for internal control and ethical conduct). • Inspect delivery mechanisms to determine if information is delivered to all users of IT resources, including consultants, contractors and temporary staff members. Where applicable, it should include customers and suppliers as well. • Verify that the personnel training programme includes certification and recertification processes for appropriate roles. • Enquire whether and confirm that training materials and programmes have been reviewed regularly for adequacy and include impact on all necessary skills. • Confirm that a process exists to measure the completion and effectiveness of critical employee training and awareness programmes and requirements. • Review documented strategies for the reduction of dependence on single individuals in critical roles. Verify the inclusion of segregation of duties. Inspect the process to identify roles suitable for rotation, and confirm that rotation is occurring. Enquire of employees to determine whether knowledge sharing is occurring. • Inspect the compiled performance evaluation information to assess whether it was compiled completely and accurately. Validate that the information is used in an appropriate manner. Enquire of employees whether management provides appropriate feedback regarding performance during, and following, the performance evaluation. Determine that performance is evaluated against the individual’s goals and performance criteria established for the position. Determine if the performance evaluation process is applied consistently and is in line with performance goals and organisational policies. • Inspect exit procedures and processes for evidence of consistent application throughout the organisation. • Review the appropriateness of access rights (logical and physical access) related to job changes. Determine the effects on segregation of duties and compensating controls if old access permissions are retained during a period of transition. • Verify that user accounts have been disabled for terminated users and appropriate access has been applied for transferred users. Take the following steps to document the impact of the control weaknesses: • Assess the organisation’s dependency on key individuals to ensure that loss of capability and historical knowledge is not realised. • Assess whether appropriate monitoring and supervision exist to ensure adherence to management policies and procedures, code of ethics, professional practices, terms and conditions of employment, internal controls, information security policy and procedures, and compliance withregulatory requirements. • Assess the level of awareness for security requirements to ensure compliance with regulatory requirements, protection of intellectual property, organisational reputation and strategic position. • Determine the adequacy of personnel training programmes to ensure the organisation’s ability to attract and retain qualified personnel. • Assess dependence on key individuals and the IT organisation’s ability to provide continuous support of business processes in an efficient and effective manner. Determine whether appropriate segregation of duties exist for key roles to ensure that critical controls function as intended. • Assess the appropriateness of security-checking mechanisms for key employees to ensure that control over threats within the organisation, such as theft, disclosure and compromise of sensitive corporate assets, is appropriately addressed. • Determine whether a well-defined, timely and consistently applied performance evaluation process exists and results in the efficient and effective use of IT resources. • Assess the level of appropriateness and consistency applied to job change policies and procedures to ensure that disruptions of business-critical operations and unauthorised access to secure environments and organisational assets do not occur. 93© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II P O 8 M a n a g e Q u a li ty A q ua li ty m an ag em en t sy st em i s de ve lo pe d an d m ai nt ai ne d th at i nc lu de s pr ov en d ev el op m en t an d ac qu is it io n pr oc es se s an d st an da rd s. T hi s is e na bl ed b y pl an ni ng , im pl em en ti ng a nd m ai nt ai ni ng t he Q M S b y pr ov id in g cl ea r qu al it y re qu ir em en ts , p ro ce du re s an d po li ci es . Q ua li ty r eq ui re m en ts a re s ta te d an d co m m un ic at ed i n qu an ti fi ab le a nd a ch ie va bl e in di ca to rs . C on ti nu ou s im pr ov em en t is a ch ie ve d by o ng oi ng m on it or in g, a na ly si s an d ac ti ng u po n de vi at io ns , a nd c om m un ic at in g re su lt s to s ta ke ho ld er s. Q ua li ty m an ag em en t is e ss en ti al t o en su re t ha t IT i s de liv er in g va lu e to t he b us in es s, c on ti nu ou s im pr ov em en t an d tr an sp ar en cy f or s ta ke ho ld er s. Te st t he C on tr ol D es ig n • E nq ui re w he th er th e Q M S w as d ev el op ed w ith in pu t f ro m I T m an ag em en t, ot he r st ak eh ol de rs a nd r el ev an t e nt er pr is ew id e fr am ew or ks . • E nq ui re w he th er f in di ng s fr om e ac h qu al ity r ev ie w a re c om m un ic at ed to I T m an ag em en t a nd o th er s ta ke ho ld er s in a ti m el y m an ne r to e na bl e re m ed ia l a ct io n to b e ta ke n. • D et er m in e w he th er I T q ua lit y pl an s ar e al ig ne d w ith e nt er pr is e qu al ity m an ag em en t c ri te ri a an d po lic ie s. P O 8. 1 Q ua lit y M an ag em en t Sy st em E st ab lis h an d m ai nt ai n a Q M S th at p ro vi de s a st an da rd , f or m al a nd c on tin uo us ap pr oa ch r eg ar di ng q ua lit y m an ag em en t t ha t i s al ig ne d w ith b us in es s re qu ir em en ts . T he Q M S sh ou ld id en tif y qu al ity r eq ui re m en ts a nd c ri te ri a; k ey I T pr oc es se s an d th ei r se qu en ce a nd in te ra ct io n; a nd th e po lic ie s, c ri te ri a an d m et ho ds f or d ef in in g, d et ec tin g, c or re ct in g an d pr ev en tin g no n- co nf or m ity . T he Q M S sh ou ld d ef in e th e or ga ni sa tio na l s tr uc tu re f or q ua lit y m an ag em en t, co ve ri ng th e ro le s, ta sk s an d re sp on si bi lit ie s. A ll ke y ar ea s sh ou ld d ev el op th ei r qu al ity p la ns in li ne w ith c ri te ri a an d po lic ie s an d re co rd q ua lit y da ta . M on ito r an d m ea su re th e ef fe ct iv en es s an d ac ce pt an ce o f th e Q M S, a nd im pr ov e it w he n ne ed ed . Va lu e D riv er s C on tr ol O bj ec ti ve • A lig nm en t w ith a nd a ch ie ve m en t o f bu si ne ss r eq ui re m en ts f or I T • St ak eh ol de r sa tis fa ct io n en su re d • C on si st en t Q A e nv ir on m en t un de rs to od a nd f ol lo w ed b y al l s ta ff m em be rs • E ff ic ie nt , e ff ec tiv e an d st an da rd is ed op er at io n of I T p ro ce ss es R is k D riv er s • In su ff ic ie nt q ua lit y in s er vi ce s an d so lu tio ns , r es ul tin g in f au lts , r ew or k an d in cr ea se d co st s • A d ho c an d, th er ef or e, u nr el ia bl e Q A ac tiv iti es • M is al ig nm en t w ith in du st ry g oo d pr ac tic es a nd b us in es s ob je ct iv es • A m bi gu ou s re sp on si bi lit y fo r qu al ity , le ad in g to q ua lit y re du ct io n IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org94 Te st t he C on tr ol D es ig n • R ev ie w I T s ta nd ar ds a nd f ra m ew or ks to d et er m in e if th ey a re a pp ro pr ia te f or th e sy st em s, d at a an d in fo rm at io n in th e en vi ro nm en t. • In sp ec t t he a ut ho ri sa tio n of d ev ia tio ns to I T s ta nd ar ds to v al id at e ad he re nc e to o r no n- co m pl ia nc e w ith m an da te d or a do pt ed s ta nd ar ds . • In sp ec t m aj or m ile st on es in k ey p ro je ct s to v er if y th at th e Q M S ha s be en a pp lie d. • C on fi rm th e pr oc es s fo r ap pl yi ng c ha ng es in m an da te d or a do pt ed s ta nd ar ds w ith in th e or ga ni sa tio n. P O 8 M a n a g e Q u a li ty ( c o n t. ) P O 8. 2 IT S ta nd ar ds a nd Q ua lit y P ra ct ic es Id en tif y an d m ai nt ai n st an da rd s, p ro ce du re s an d pr ac tic es f or k ey I T p ro ce ss es to gu id e th e or ga ni sa tio n in m ee tin g th e in te nt o f th e Q M S. U se in du st ry g oo d pr ac tic es f or r ef er en ce w he n im pr ov in g an d ta ilo ri ng th e or ga ni sa tio n’ s qu al ity pr ac tic es . Va lu e D riv er s • A lig nm en t o f th e Q M S to b us in es s re qu ir em en ts a nd p ol ic ie s • C on si st en cy a nd r el ia bi lit y of th e ge ne ra l q ua lit y pl an • E ff ec tiv e an d ef fi ci en t o pe ra tio n of th e Q M S • In cr ea se d as su ra nc e fo r en te rp ri se w id e m an ag em en t t ha t I T s ta nd ar ds , po lic ie s, p ro ce ss es , p ra ct ic es a nd r is k m an ag em en t a re e ff ec tiv e an d ef fi ci en t R is k D riv er s • U nd ef in ed r es po ns ib ili tie s w ith in pr oj ec ts a nd s er vi ce s • Q ua lit y fa ilu re s in k ey I T p ro ce ss es • N on -c om pl ia nc e w ith d ef in ed st an da rd s an d pr oc ed ur es • IT p ol ic ie s, s ta nd ar ds , p ro ce ss es a nd pr ac tic es in co ns is te nt w ith c ur re nt go od p ra ct ic es • Fa ilu re o f IT p ol ic ie s, s ta ndar ds , pr oc es se s an d pr ac tic es to m ee t en te rp ri se o bj ec tiv es C on tr ol O bj ec ti ve Te st t he C on tr ol D es ig n • E nq ui re w he th er d ev el op m en t a nd a cq ui si tio n st an da rd s fo r ch an ge s to e xi st in g IT r es ou rc es a re a pp lie d (e .g ., se cu re c od in g pr ac tic es ; s of tw ar e co di ng s ta nd ar ds ; n am in g co nv en tio ns ; f ile f or m at s; s ch em a an d da ta d ic tio na ry d es ig n st an da rd s; u se r in te rf ac e st an da rd s; in te ro pe ra bi lit y; s ys te m p er fo rm an ce e ff ic ie nc y; s ca la bi lit y; s ta nd ar ds fo r de ve lo pm en t a nd te st in g; v al id at io n ag ai ns t r eq ui re m en ts ; t es t p la ns ; u ni t, re gr es si on a nd in te gr at io n te st in g) . • E nq ui re o r in sp ec t w he th er d ev el op m en t a nd a cq ui si tio n st an da rd s en ab le a n ap pr op ri at e le ve l o f co nt ro l f or c ha ng es to e xi st in g IT r es ou rc es . • E nq ui re w he th er d ev el op m en t a nd a cq ui si tio n gu id an ce is in co rp or at ed in to I T s ta nd ar ds a nd f ra m ew or ks . P O 8. 3 D ev el op m en t an d A cq ui si ti on S ta nd ar ds A do pt a nd m ai nt ai n st an da rd s fo r al l d ev el op m en t a nd a cq ui si tio n th at f ol lo w th e lif e cy cl e of th e ul tim at e de liv er ab le , a nd in cl ud e si gn -o ff a t k ey m ile st on es ba se d on a gr ee d- up on s ig n- of f cr ite ri a. C on si de r so ft w ar e co di ng s ta nd ar ds ; na m in g co nv en tio ns ; f ile f or m at s; s ch em a an d da ta d ic tio na ry d es ig n st an da rd s; us er in te rf ac e st an da rd s; in te ro pe ra bi lit y; s ys te m p er fo rm an ce e ff ic ie nc y; sc al ab ili ty ; s ta nd ar ds f or d ev el op m en t a nd te st in g; v al id at io n ag ai ns t re qu ir em en ts ; t es t p la ns ; a nd u ni t, re gr es si on a nd in te gr at io n te st in g. Va lu e D riv er s C on tr ol O bj ec ti ve • E ff ic ie nt a nd e ff ec tiv e us e of te ch no lo gy to e na bl e tim el y ac hi ev em en t o f bu si ne ss o bj ec tiv es • Pr op er id en tif ic at io n, d oc um en ta tio n an d ex ec ut io n of k ey a cq ui si tio n an d de ve lo pm en t a ct iv iti es • Fo rm al ly d ef in ed , s ta nd ar di se d an d re pe at ab le a pp ro ac h fo r m an ag in g ac qu is iti on s an d de ve lo pm en ts R is k D riv er s • In ac cu ra te e st im at io ns o f pr oj ec t tim es ca le s an d bu dg et s • U nc le ar r es po ns ib ili tie s w ith in pr oj ec ts • D ev el op m en t a nd im pl em en ta tio n er ro rs , c au si ng d el ay s, r ew or k an d in cr ea se d co st s • In te ro pe ra bi lit y an d in te gr at io n pr ob le m s • Su pp or t a nd m ai nt en an ce p ro bl em s • U ni de nt if ie d er ro rs o cc ur ri ng in pr od uc tio n 95© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • E nq ui re w he th er f in di ng s fr om e ac h qu al ity r ev ie w a re c om m un ic at ed to I T m an ag em en t a nd o th er s ta ke ho ld er s in a ti m el y m an ne r to e na bl e re m ed ia l a ct io n to b e ta ke n. • E ns ur e th e st af f tr ai ni ng p ro gr am m e in cl ud es e ff ec tiv e co nt in uo us im pr ov em en t m et ho do lo gi es . • E va lu at e w he th er c on tin uo us im pr ov em en t a ct iv iti es a re a ct iv el y pr om ot ed , e ff ec tiv el y m an ag ed a nd im pl em en te d w ith in th e qu al ity s ta nd ar ds , p ol ic ie s, p ra ct ic es a nd pr oc ed ur es . • E nq ui re w he th er a nd c on fi rm th at a q ua lit y m an ag em en t p la n is d ef in ed . I ns pe ct th e pl an a nd d oc um en ta tio n to v al id at e th e ap pr op ri at en es s of th e le ar ni ng a nd kn ow le dg e- sh ar in g pr oc es s. Te st t he C on tr ol D es ig n • E nq ui re w he th er c us to m er v ie w s on th e qu al ity m an ag em en t p ro ce ss a re o bt ai ne d. R ev ie w th e pr oc es s to v er if y th at v ie w s ar e ob ta in ed p er io di ca lly . • In sp ec t f or e ff ec tiv en es s th e qu es tio nn ai re s, s ur ve ys , f ee db ac k fo rm s, in te rv ie w s, e tc ., fr om c us to m er s. • E nq ui re w he th er c us to m er v ie w s on th e qu al ity m an ag em en t p ro ce ss a re o bt ai ne d. R ev ie w th e pr oc es s to v er if y th at v ie w s ar e ob ta in ed p er io di ca lly . • In sp ec t t he o ut pu ts f ro m th e fo llo w -u p pr oc es s to d et er m in e if th e fe ed ba ck is o rg an is ed a nd u se fu l f or im pr ov in g th e co m pl ai nt -h an dl in g pr oc es s. • In sp ec t t he d oc um en ta tio n of r ol es a nd r es po ns ib ili tie s to d et er m in e if th ey a llo w f or e ff ec tiv e co nf lic t r es ol ut io n of c us to m er c om pl ai nt s. • E nq ui re w he th er a nd c on fi rm th at c us to m er in te ra ct io n as pe ct s ar e in cl ud ed in tr ai ni ng p ro gr am m es . P O 8. 4 C us to m er F oc us Fo cu s qu al ity m an ag em en t o n cu st om er s by d et er m in in g th ei r re qu ir em en ts a nd al ig ni ng th em to th e IT s ta nd ar ds a nd p ra ct ic es . D ef in e ro le s an d re sp on si bi lit ie s co nc er ni ng c on fl ic t r es ol ut io n be tw ee n th e us er /c us to m er a nd th e IT or ga ni sa tio n. Va lu e D riv er s C on tr ol O bj ec ti ve • Im pr ov ed c us to m er s at is fa ct io n • Q ua lit y m an ag em en t a lig ne d w ith cu st om er e xp ec ta tio ns • C la ri ty o f ro le s an d re sp on si bi lit ie s R is k D riv er s • G ap s be tw ee n ex pe ct at io ns a nd de liv er y • Fa ilu re to a de qu at el y un de rs ta nd cu st om er e xp ec ta tio ns • Fa ilu re to a de qu at el y re sp on d to cu st om er d is pu te s an d fe ed ba ck • In ap pr op ri at e or in ef fe ct iv e cu st om er di sp ut e re so lu tio n pr oc es se s • In ap pr op ri at e pr io ri ty g iv en to di ff er en t s er vi ce s pr ov id ed • D is pu te s w ith d el iv er ab le s an d qu al ity d ef ec ts P O 8 M a n a g e Q u a li ty ( c o n t. ) P O 8. 5 C on ti nu ou s Im pr ov em en t M ai nt ai n an d re gu la rl y co m m un ic at e an o ve ra ll qu al ity p la n th at p ro m ot es co nt in uo us im pr ov em en t. Va lu e D riv er s C on tr ol O bj ec ti ve • Im pr ov ed q ua lit y of s er vi ce s an d so lu tio ns • Im pr ov ed e ff ic ie nc y an d ef fe ct iv en es s in d el iv er y • Im pr ov ed s ta ff m or al e an d jo b sa tis fa ct io n R is k D riv er s • U nc on tr ol le d and in ef fe ct iv e se rv ic e de liv er y • Se rv ic e fa ilu re s • D ev el op m en t f au lts IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org96 Te st t he C on tr ol D es ig n • R ev ie w e xe cu tiv e- le ve l r ep or tin g on q ua lit y pe rf or m an ce ( e. g. , d as hb oa rd r ep or tin g an d/ or b al an ce d sc or ec ar d) to id en tif y tr en ds o f st re ng th s an d w ea kn es se s. • In sp ec t w he th er th e qu al ity m et ri cs in co rp or at e th e ac hi ev em en t o f bu si ne ss a nd I T s tr at eg y, f in an ci al c os t, ri sk r at in gs a nd a va ila bl e in du st ry d at a. R ev ie w w he th er th e m on ito ri ng p ro ce ss e na bl es c or re ct iv e an d pr ev en tiv e ac tio ns to ta ke p la ce . • Pe rf or m a w al k- th ro ug h of th e qu al ity m an ag em en t p ro ce ss to v er if y th at it c on si de rs r el ev an ce , a pp lic ab ili ty , l at es t i nd us tr y da ta a nd th e va lu e of c on tr ib ut io n to co nt in uo us im pr ov em en t p ro gr am m es w ith in th e or ga ni sa tio n. P O 8. 6 Q ua lit y M ea su re m en t, M on it or in g an d R ev ie w D ef in e, p la n an d im pl em en t m ea su re m en ts to m on ito r co nt in ui ng c om pl ia nc e to th e Q M S, a s w el l a s th e va lu e th e Q M S pr ov id es . M ea su re m en t, m on ito ri ng a nd re co rd in g of in fo rm at io n sh ou ld b e us ed b y th e pr oc es s ow ne r to ta ke ap pr op ri at e co rr ec tiv e an d pr ev en tiv e ac tio ns . Va lu e D riv er s C on tr ol O bj ec ti ve • St af f m em be rs a w ar e of q ua lit y pe rf or m an ce • C on si st en t r ep or tin g • Q ua lit y re po rt in g in te gr at ed in to a nd fa ci lit at in g th e or ga ni sa tio n’ s Q M S • M ea su ra bl e an d ta ng ib le v al ue o f th e Q M S • Fe ed ba ck c on ce rn in g co m pl ia nc e w ith an d us ef ul ne ss o f th e Q M S R is k D riv er s • L ac k of c le ar a nd c on si st en t q ua lit y ob je ct iv es • Pr ev en tiv e an d co rr ec tiv e ac tio ns un id en tif ie d • In co ns is te nt q ua lit y re po rt in g • R ep or ts f ai lin g to c on tr ib ut e to th e en te rp ri se ’s Q M S • L ac k of c la ri fi ed o bj ec tiv es • In co ns is te nt q ua lit y re po rt in g • Fa ilu re o f th e Q M S to e nh an ce th e or ga ni sa tio n’ s ob je ct iv es • Q M S no t t ak en s er io us ly o r co m pl ie d w ith b y th e or ga ni sa tio n • W ea kn es se s an d st re ng th s w ith in th e Q M S no t r ec og ni se d • N on -c om pl ia nc e no t i de nt if ie d • Pr oj ec ts a t r is k to b e ov er ti m e an d bu dg et a nd d el iv er ed w ith p oo r qu al ity P O 8 M a n a g e Q u a li ty ( c o n t. ) 97© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Take the following steps to test the outcome of the control objectives: • Inspect the QMS to verify that it provides a standard and continuous approach for quality management. • Verify IT management’s approval of the QMS. • Review the periodic performance reviews to determine whether the review programme includes all necessary elements. • Inspect the results of the periodic independent performance reviews of the QMS. • Inspect whether follow-up reviews in quality assurance plans exist where significant findings have arisen, and inspect the follow- up reviews to verify that corrective action has been effective. • Inspect QMS benchmark results to determine if appropriate industry guidelines, standards and enterprises were included in the comparison. • Inspect the authorisation of deviations to IT standards to validate adherence to or non-compliance with stakeholder requirements. • Inspect major milestones to verify that the QMS is in operation. • Inspect the customer quality standards and metric requirements for completeness (i.e., questionnaires, surveys, feedback forms, interviews). • Inspect the outputs from the QMS follow-up process to determine if the feedback is organised and useful for improving the complaint-handling process. • Inspect the documentation of roles and responsibilities to determine if it allows for effective conflict resolution of customer complaints. • Inspect the training programme to verify the existence of customer care content. • Walk through the periodic performance reviews to determine whether the review programme includes necessary QMS elements. • Inspect the results of the periodic independent performance reviews of the QMS. • Inspect whether the quality metrics incorporate the achievement of business and IT strategy, financial cost, risk ratings, and available industry data. • Review whether the monitoring process enables corrective and preventive actions to take place. • Perform a walk-through of the QMS process to verify that it considers relevance, applicability, latest industry data and the value of contribution to the continuous improvement programme within the organisation. • Determine the reliability of quality assurance activities by assessing alignment with industry best practices and gaps between current procedures and business expectations. Take the following steps to document the impact of the control weaknesses: • Determine the level of compliance with organisational IT standards and quality practices to assess deviations that may result in incompatible system architecture, leading to increased costs and the project not meeting goals and objectives. • Determine if development and acquisition standards include processes for accurate estimation of project timescales and budgets to ensure efficient and effective use of IT and business resources and the attainment of strategic goals and objectives. • Confirm that quality management processes include mechanisms for conflict resolution and the determination of consistency of understanding regarding customer expectations and product/process capability. • Assess whether customer requirements align with IT standards. • Determine whether the continuous improvement policy and procedures enable the organisation’s ability to maintain a competitive advantage. • Assess whether quality measurement processes and reporting mechanisms enable corrective actions to be performed in a timely manner. IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org98 P O 9 A s s e s s a n d M a n a g e I T R is k s A r is k m an ag em en t f ra m ew or k is c re at ed a nd m ai nt ai ne d. T he f ra m ew or k do cu m en ts a c om m on a nd a gr ee d- up on le ve l o f IT r is ks , m iti ga tio n st ra te gi es a nd r es id ua l r is ks . A ny p ot en tia l i m pa ct o n th e go al s of th e or ga ni sa tio n ca us ed b y an u np la nn ed e ve nt is id en tif ie d, a na ly se d an d as se ss ed . R is k m iti ga tio n st ra te gi es a re a do pt ed to m in im is e re si du al r is k to a n ac ce pt ed le ve l. T he r es ul t o f th e as se ss m en t i s un de rs ta nd ab le to th e st ak eh ol de rs a nd e xp re ss ed in f in an ci al te rm s, to e na bl e st ak eh ol de rs to a lig n ri sk to an a cc ep ta bl e le ve l o f to le ra nc e. Te st t he Con tr ol D es ig n • In sp ec t w he th er th e IT r is k m an ag em en t f ra m ew or k al ig ns w ith th e ri sk m an ag em en t f ra m ew or k fo r th e or ga ni sa tio n (e nt er pr is e) a nd in cl ud es b us in es s- dr iv en co m po ne nt s fo r st ra te gy , p ro gr am m es , p ro je ct s an d op er at io ns . R ev ie w th e IT r is k cl as si fi ca tio ns to v er if y th at th ey a re b as ed o n a co m m on s et o f ch ar ac te ri st ic s fr om th e en te rp ri se r is k m an ag em en t f ra m ew or k. I ns pe ct w he th er I T r is k m ea su re m en ts a re s ta nd ar di se d an d pr io ri tis ed a nd w he th er th ey in cl ud e im pa ct , a cc ep ta nc e of r es id ua l ri sk a nd p ro ba bi lit ie s al ig ne d w ith th e en te rp ri se r is k m an ag em en t f ra m ew or k. • V er if y w he th er I T r is ks a re c on si de re d in th e de ve lo pm en t a nd r ev ie w o f IT s tr at eg ic p la ns . Te st t he C on tr ol D es ig n • E nq ui re w he th er a nd c on fi rm th at a n ap pr op ri at e ri sk c on te xt h as b ee n de fi ne d in li ne w ith e nt er pr is e ri sk m an ag em en t p ol ic ie s an d pr in ci pl es a nd in cl ud es p ro ce ss es , su ch a s sy st em s, p ro je ct m an ag em en t, ap pl ic at io n so ft w ar e lif e cy cl es , m an ag em en t o f IT o pe ra tio ns a nd s er vi ce s. I nt er na l a nd e xt er na l r is k fa ct or s sh ou ld b e in cl ud ed . • D et er m in e w he th er th e IT r is k co nt ex t i s co m m un ic at ed a nd u nd er st oo d. P O 9. 1 IT R is k M an ag em en t F ra m ew or k E st ab lis h an I T r is k m an ag em en t f ra m ew or k th at is a lig ne d to th e or ga ni sa tio n’ s (e nt er pr is e’ s) r is k m an ag em en t f ra m ew or k. Va lu e D riv er s C on tr ol O bj ec ti ve • C on si st en t a pp ro ac h fo r IT r is k m an ag em en t • E ff ec tiv e m an ag em en t o f IT r is ks • C on tin uo us e va lu at io n of c ur re nt I T ri sk s an d th re at s to th e or ga ni sa tio n • B ro ad en ed I T r is k m an ag em en t ap pr oa ch R is k D riv er s • IT r is ks a nd b us in es s ri sk s m an ag ed in de pe nd en tly • T he im pa ct o f an I T r is k on th e bu si ne ss u nd et ec te d • L ac k of c os t c on tr ol f or r is k m an ag em en t • E ac h ri sk s ee n as a s in gl e th re at r at he r th an in a n ov er al l c on te xt • In ef fe ct iv e su pp or t f or r is k as se ss m en t by s en io r m an ag em en t P O 9. 2 E st ab lis hm en t of R is k C on te xt E st ab lis h th e co nt ex t i n w hi ch th e ri sk a ss es sm en t f ra m ew or k is a pp lie d to en su re a pp ro pr ia te o ut co m es . T hi s sh ou ld in cl ud e de te rm in in g th e in te rn al a nd ex te rn al c on te xt o f ea ch r is k as se ss m en t, th e go al o f th e as se ss m en t, an d th e cr ite ri a ag ai ns t w hi ch r is ks a re e va lu at ed . Va lu e D riv er s C on tr ol O bj ec ti ve • E ff ec tiv e an d ef fi ci en t u se o f re so ur ce s fo r m an ag em en t o f ri sk s • A lig nm en t o f ri sk m an ag em en t pr io ri tie s to b us in es s ne ed s • A f oc us o n re le va nt a nd s ig ni fi ca nt r is ks • Pr io ri tis at io n of r is ks R is k D riv er s • Ir re le va nt r is ks c on si de re d im po rt an t • Si gn if ic an t r is ks n ot g iv en a pp ro pr ia te at te nt io n • In ap pr op ri at e ap pr oa ch to r is k as se ss m en t 99© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Te st t he C on tr ol D es ig n • In sp ec t t he p ro ce ss u se d to id en tif y po te nt ia l e ve nt s an d de te rm in e if a ll IT p ro ce ss es a re in cl ud ed in th e an al ys is . T he d es ig n of th e pr oc es s sh ou ld c ov er in te rn al a nd ex te rn al e ve nt s. I de nt if ic at io n of p ot en tia l e ve nt s m ay in cl ud e re su lts o f fo rm er a ud its , i ns pe ct io ns a nd id en tif ie d in ci de nt s, u si ng c he ck lis ts , w or ks ho ps a nd p ro ce ss f lo w an al ys is . T ra ce id en tif ie d im pa ct s to th e ri sk r eg is tr y to d et er m in e if th e re gi st ry is c om pl et e, c ur re nt a nd a lig ne d w ith th e en te rp ri se r is k m an ag em en t f ra m ew or k te rm in ol og y. • E nq ui re w he th er a pp ro pr ia te c ro ss -f un ct io na l t ea m s ar e in vo lv ed in th e di ff er en t e ve nt a nd im pa ct id en tif ic at io n ac tiv iti es . R ev ie w a s am pl e of th e ri sk r eg is tr y fo r re le va nc e of th re at s, s ig ni fi ca nc e of v ul ne ra bi lit ie s an d im po rt an ce o f im pa ct , a nd a na ly se th e ef fe ct iv en es s of th e pr oc es s to id en tif y, r ec or d an d ju dg e ri sk s. Te st t he C on tr ol D es ig n • W al k th ro ug h th e ri sk m an ag em en t p ro ce ss to d et er m in e if in he re nt a nd r es id ua l r is ks a re d ef in ed a nd d oc um en te d. • E nq ui re w he th er a nd c on fi rm th at th e ri sk m an ag em en t p ro ce ss a ss es se s id en tif ie d ri sk s qu al ita tiv el y an d/ or q ua nt ita tiv el y. • In sp ec t p ro je ct a nd o th er d oc um en ta tio n to a ss es s th e ap pr op ri at en es s of q ua lit at iv e or q ua nt ita tiv e ri sk a ss es sm en t. • W al k th ro ug h th e pr oc es s to d et er m in e if th e so ur ce s of in fo rm at io n us ed in th e an al ys is a re r ea so na bl e. • In sp ec t t he u se o f st at is tic al a na ly si s an d pr ob ab ili ty d et er m in at io ns to m ea su re th e lik el ih oo d qu al ita tiv el y or q ua nt ita tiv el y. • E nq ui re o r in sp ec t w he th er a ny c or re la tio n be tw ee n ri sk s is id en tif ie d. R ev ie w a ny c or re la tio n to v er if y th at it e xp os es s ig ni fi ca nt ly d if fe re nt li ke lih oo d an d im pa ct r es ul ts ar is in g fr om s uc h re la tio ns hi p( s) . P O 9. 3 E ve nt I de nt if ic at io n Id en tif y ev en ts ( an im po rt an t r ea lis tic th re at th at e xp lo its a s ig ni fi ca nt a pp lic ab le vu ln er ab ili ty ) w ith a p ot en tia l n eg at iv e im pa ct o n th e go al s or o pe ra tio ns o f th e en te rp ri se , i nc lu di ng b us in es s, r eg ul at or y, le ga l, te ch no lo gy , t ra di ng p ar tn er , hu m an r es ou rc es a nd o pe ra tio na l a sp ec ts . D et er m in e th e na tu re o f th e im pa ct an d m ai nt ai n th is in fo rm at io n. R ec or d an d m ai nt ai n re le va nt r is ks in a r is k re gi st ry . Va lu e Driv er s C on tr ol O bj ec ti ve • C on si st en t a pp ro ac h to r is k ev en t id en tif ic at io n • Fo cu s on s ig ni fi ca nt r is k ev en ts R is k D riv er s • Ir re le va nt r is k ev en ts id en tif ie d an d fo cu se d on w hi ls t m or e im po rt an t ev en ts a re m is se d P O 9 A s s e s s a n d M a n a g e I T R is k s ( c o n t. ) P O 9. 4 R is k A ss es sm en t A ss es s on a r ec ur re nt b as is th e lik el ih oo d an d im pa ct o f al l i de nt if ie d ri sk s, us in g qu al ita tiv e an d qu an tit at iv e m et ho ds . T he li ke lih oo d an d im pa ct a ss oc ia te d w ith in he re nt a nd r es id ua l r is k sh ou ld b e de te rm in ed in di vi du al ly , b y ca te go ry an d on a p or tf ol io b as is . Va lu e D riv er s C on tr ol O bj ec ti ve • Im pr ov ed p la nn in g an d us e of I T r is k m an ag em en t s ki lls a nd r es ou rc es • O rg an is at io na l c re di bi lit y of I T r is k as se ss m en t f un ct io n te am s • K no w le dg e tr an sf er b et w ee n ri sk m an ag er s • C re at io n of I T a ss et v al ue a w ar en es s R is k D riv er s • Ir re le va nt r is ks c on si de re d im po rt an t • E ac h ri sk s ee n as a s in gl e ev en t r at he r th an in a n ov er al l c on te xt • In ab ili ty to e xp la in s ig ni fi ca nt r is ks to m an ag em en t • Si gn if ic an t r is ks p os si bl y m is se d • L os s of I T a ss et s • C on fi de nt ia lit y or in te gr ity b re ac h of IT a ss et s IT ASSURANCE GUIDE: USING COBIT © 2007 IT Governance Institute. All rights reserved. www.itgi.org100 Te st t he C on tr ol D es ig n In sp ec t w he th er r is k as se ss m en t r es ul ts w er e al lo ca te d to a m iti ga tin g re sp on se to a vo id , t ra ns fe r, re du ce , s ha re o r ac ce pt e ac h ri sk a nd a lig n w ith th e m ec ha ni sm s us ed to m an ag e ri sk in th e or ga ni sa tio n. Te st t he C on tr ol D es ig n • E nq ui re w he th er a cc ep te d ri sk s ar e fo rm al ly r ec og ni se d an d re co rd ed in a r is k ac tio n pl an . • A ss es s th e ap pr op ri at en es s of th e el em en ts o f th e ri sk m an ag em en t p la n. • E nq ui re o r in sp ec t w he th er e xe cu tio n, r ep or t p ro gr es s an d de vi at io ns a re m on ito re d. • In sp ec t r is k re sp on se s fo r ap pr op ri at e ap pr ov al s. • R ev ie w a ct io ns to v er if y w he th er o w ne rs hi p is a ss ig ne d an d do cu m en te d. • In sp ec t w he th er th e ri sk a ct io n pl an is e ff ec tiv el y m ai nt ai ne d an d ad ju st ed . P O 9. 5 R is k R es po ns e D ev el op a nd m ai nt ai n a ri sk r es po ns e pr oc es s de si gn ed to e ns ur e th at c os t- ef fe ct iv e co nt ro ls m iti ga te e xp os ur e to r is ks o n a co nt in ui ng b as is . T he r is k re sp on se p ro ce ss s ho ul d id en tif y ri sk s tr at eg ie s su ch a s av oi da nc e, r ed uc tio n, sh ar in g or a cc ep ta nc e; d et er m in e as so ci at ed r es po ns ib ili tie s; a nd c on si de r ri sk to le ra nc e le ve ls . Va lu e D riv er s C on tr ol O bj ec ti ve • E ff ec tiv e m an ag em en t o f ri sk s • C on si st en t a pp ro ac h fo r ri sk m iti ga tio n • C os t- ef fe ct iv e ri sk r es po ns e R is k D riv er s • R is k re sp on se s no t e ff ec tiv e • U ni de nt if ie d re si du al b us in es s ri sk s • In ef fe ct iv e us e of r es ou rc es to r es po nd to r is ks • O ve rr el ia nc e on e xi st in g po or c on tr ol s P O 9 A s s e s s a n d M a n a g e I T R is k s ( c o n t. ) P O 9. 6 M ai nt en an ce a nd M on it or in g of a R is k A ct io n P la n Pr io ri tis e an d pl an th e co nt ro l a ct iv iti es a t a ll le ve ls to im pl em en t t he r is k re sp on se s id en tif ie d as n ec es sa ry , i nc lu di ng id en tif ic at io n of c os ts , b en ef its a nd re sp on si bi lit y fo r ex ec ut io n. O bt ai n ap pr ov al f or r ec om m en de d ac tio ns a nd ac ce pt an ce o f an y re si du al r is ks , a nd e ns ur e th at c om m itt ed a ct io ns a re o w ne d by th e af fe ct ed p ro ce ss o w ne r( s) . M on ito r ex ec ut io n of th e pl an s, a nd r ep or t o n an y de vi at io ns to s en io r m an ag em en t. Va lu e D riv er s C on tr ol O bj ec ti ve • E ff ec tiv e m an ag em en t o f ri sk s • C on tin uo us e va lu at io n of c ur re nt r is ks an d th re at s fo r th e or ga ni sa tio n R is k D riv er s • R is k m iti ga tio n co nt ro ls th at d o no t op er at e as in te nd ed • C om pe ns at in g co nt ro ls th at d ev ia te fr om th e id en tif ie d ri sk s 101© 2007 IT Governance Institute. All rights reserved. www.itgi.org APPENDIX II Take the following steps to test the outcome of the control objectives: • Enquire whether the IT risk management tolerance levels are aligned with enterprise risk tolerance levels. Determine whether organisational risk tolerance is used as input for both business and the IT strategy development. • Enquire whether a process exists to apply enterprise risk tolerance levels to IT risk management decisions. Consider whether benchmarking of the risk assessment framework against similar organisations, appropriate international standards and industry best practices has been performed. • Test whether risk-related accountability and responsibilities are understood and accepted. Verify that the right skills and necessary resources are available for risk management. • Enquire through interviews with key staff members involved whether the control mechanism and its purpose, accountability and responsibilities are understood and applied. • Inspect whether the activities are effectively integrated into IT management processes. • Inspect whether the identified impacts are relevant and significant for the enterprise and whether they are either over- or under- estimated. Determine whether cross-functional teams contribute to the event analysis process. Verify through interviews and impact reports whether the members of the event identification work group are properly trained on the enterprise risk management framework. Verify whether interdependencies and probabilities are accurately identified during impact assessment. Review any correlation to verify that it exposes significantly different likelihood and impact results arising from such relationships. • Inspect the risk management process to determine if the sources of information used in the analysis are reasonable. • Inspect the use of statistical analysis and probability determinations to measure the risk likelihood qualitatively or quantitatively. • Walk through the process to determine if inherent and residual risks are defined and documented. • Inspect the risk action plan to determine if it identifies the priorities, responsibilities, schedules, expected outcome, risk mitigation, costs, benefits, performance measures and review process to be established. • Inspect risk responses for