Top Banner
April 20, 2006 San Francisco ISACA Chapter Luncheon Seminar Presented By Lance M. Turcato, CISA, CISM, CPA Deputy City Auditor – Information Technology City of Phoenix Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, Practices)
75

Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

Mar 06, 2018

Download

Documents

HaAnh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006San Francisco ISACA Chapter Luncheon Seminar

Presented ByLance M. Turcato, CISA, CISM, CPADeputy City Auditor – Information Technology City of Phoenix

Integrating COBIT® into the IT Audit Process

(Planning, Scope Development, Practices)

Page 2: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 2

Audience Poll

COBIT Knowledge

- First exposure?

- General understanding?

- Strong knowledge of COBIT framework?

Current Users of COBIT

- Incorporated Into Audit Process?

- Adopted by IT Management?

- Users of a framework other than COBIT?

Page 3: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 3

AGENDA

- Integrating Relevant Industry Standards, Guidelines, and Best Practices

- Audit Universe Considerations

Integrating COBIT® into the IT Audit Lifecycle

- Ensuring Consistent Coverage

Integrating COBIT® Domains into IT Audit Planning & Scope Development

Overview of COBIT® Components

Using COBIT® to Establish IT Risk & Control Measurement

Resources & Wrap-up

- Organizational IT Policy, Standard, Guideline, and Procedure Considerations

Topic

Page 4: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

Overview of COBIT® Components

IT Governance Institute

(http://www.itgi.org/ )

Page 5: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 5

COBIT® - Background

C Control

OB OBjectives

I for InformationT and Related Technology

“Generally applicable and accepted international standard of good practice for IT control”

“An authoritative, up-to-date, international set of generally accepted Information Technology Control Objectives for

day-to-day use by business managers and auditors.”

Page 6: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 6

COBIT’s Scope & Objectives

� COBIT® 4.0 was developed and by the IT Governance Institute (www.itgi.org) and was released in December, 2005.

� COBIT® has evolved into an IT governance / control framework:� A toolkit of “best practices” for IT control representing the

consensus of experts

� IT Governance focus

� Linkage with business requirements (bridges the gap between control requirements, technical issues, and business risks).

� Management – process owner – orientation (accountability)

� Measurement and maturity driven

� Generic focus – applicable to multiple environments

� Organizes IT activities into a generally accepted process model (in alignment with ITIL, ISO, and other relevant ‘best practices’)

� Identifies the major IT resources to be leveraged

� Defines control objectives and associated assurance guidelines

Page 7: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 7

COBIT® As A Framework

� Enables the auditor to review specific IT processes against COBIT’s Control Objectives to determine where controls are sufficient or advise management where processes need to be improved.

� Helps process owners answer questions - “Is what I’m doing adequate and in line with best practices? If not, what should I be doing and where should I focus my efforts?”

� COBIT® is a framework and is NOT exhaustive or definitive. The scope and breadth of a COBIT® implementation varies from organization to organization.

� COBIT® prescribes “what” best practices should be in place. An effective implementation requires that COBIT® be supplemented with other sources of best practice that prescribe the “how” for IT governance and controlled process execution.

Page 8: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 8

Hierarchy of COBIT® Components

“The Method Is...”

“How You Measure YourPerformance …”

“Minimum Controls Are...”

“How You Implement...”“How You Audit...”

Page 9: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 9

Relationship of COBIT® Components

Page 10: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 10

COBIT® StructureOverview

�Starts from the premise that IT needs to

deliver the information that the enterprise

needs to achieve its objectives

�Promotes process focus and process

ownership

�Divides IT into 34 processes belonging to

four domains (providing a high level control

objective for each process)

�Looks at fiduciary, quality and security needs

of enterprises, providing seven information

criteria that can be used to generically define

what the business requires from IT

�Is supported by a set of over 200 detailed

control objectives

�Effectiveness

�Efficiency

�Availability

�Integrity

�Confidentiality

�Reliability

�Compliance

�Plan & Organize

�Acquire & Implement

�Deliver & Support

�Monitor & Evaluate

Information Criteria

IT Domains

Business Requirements

Page 11: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 11

COBIT® Structure Aligning Requirements, Processes, Resources & Activities

• Natural grouping of

processes, often matching

an organizational domain

of responsibility.

• A series of joined

activities with natural

(control) breaks.

• Actions needed to achieve

a measurable result.

Activities have a life-cycle

whereas tasks are

discreet.

Domains

Processes

Activities

BusinessRequirements

IT Processes IT

Resources

Quality

Fiduciary

Security

Information Criteria

IT P

rocesses

Pe

op

leA

pp

lic

ati

on

s

Da

ta

Infr

as

tru

ctu

reF

ac

ilit

ies

Domains

Processes

Activities

IT R

esou

rces

Page 12: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 12

COBIT® StructureExample

IT Domains• Plan & Organize

• Acquire & Implement

• Deliver & Support

• Monitor & Evaluate

IT Processes• Change Management

• Contingency Planning

• Problem Management

• Policy & Procedures

• Acceptance Testing

• etc...

Activities• Record new problem

• Analyze problem

• Propose solution

• Monitor solution

• Record known problem

• etc...

Page 13: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 13

COBIT® High-Level Processes / Objectives

Plan & Organize

PO 1 Define a Strategic IT Plan

PO 2 Define the Information Architecture

PO 3 Determine Technological Direction

PO 4 Define the IT Processes, Organization, & Relationships

PO 5 Manage the IT Investment

PO 6 Communicate Management Aims and Direction

PO 7 Manage IT Human Resources

PO 8 Manage Quality

PO 9 Assess & Manage IT Risks

PO 10 Manage Projects

Page 14: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 14

Acquire & Implement

AI 1 Identify Automated Solutions

AI 2 Acquire and Maintain Application Software

AI 3 Acquire and Maintain Technology Infrastructure

AI 4 Enable Operation and Use

AI 5 Procure IT Resources

AI 6 Manage Changes

AI7 Install and Accredit Solutions and Changes

COBIT® High-Level Processes / Objectives

Page 15: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 15

Deliver & Support

DS 1 Define and Manage Service Levels

DS 2 Manage Third-Party Services

DS 3 Manage Performance and Capacity

DS 4 Ensure Continuous Service

DS 5 Ensure Systems Security

DS 6 Identify and Allocate Costs

DS 7 Educate and Train Users

DS 8 Manage Service Desk and Incidents

DS 9 Manage the Configuration

DS 10 Manage Problems

DS 11 Manage Data

DS 12 Manage the Physical Environment

DS 13 Manage Operations

COBIT® High-Level Processes / Objectives

Page 16: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 16

Monitor & Evaluate

M 1 Monitor and Evaluate IT Performance

M 2 Monitor and Evaluate Internal Control

M 3 Ensure Regulatory Compliance

M 4 Provide IT Governance

COBIT® High-Level Processes / Objectives

Page 17: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 17

Linking The Processes To Control Objectives(34 High-level and 200+ Detailed Objectives)

effe

ctiv

enes

s

effic

iency

confid

entia

lity

inte

grity

avai

labili

ty

com

pliance

relia

bility

SS PP

people

applic

atio

ns

tech

nology

faci

litie

s

data

� �

Monitor &

Evaluate

COBIT’s Waterfall and Navigation AidsLinking Process, Resource & Criteria

InformationCriteria

ProcessDomains

ITResources

IT Process

The control of

Business Requirements

that satisfies

IT Goals

by focusing on

Key Controls

is achieved by

Key Metrics

is measured by

Deliver &

Support

Plan &

Organize

Acquire &Implement

Page 18: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 18

Example of COBIT® 4.0 - DS5 (page 1)

Process

Description

IT Domains &

Information Indicators

IT Goals

Process Goals

Key Practices

Key Metrics

IT Governance &

IT Resource Indicators

Page 19: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 19

Example of COBIT® 4.0 - DS5 (page 2)

Detailed

Control

Objectives

Page 20: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 20

COBIT® Management Guidelines

COBIT 3rd Edition added a Management and

Governance layer, providing management with a

toolbox containing…

� A maturity model to assist in benchmarking and decision-making for

control over IT

� A list of critical success factors (CSF) that provides succinct non-

technical best practices for each IT process

� Generic and action oriented performance measurement elements (key

performance indicators [KPI] and key goal indicators [KGI] - outcome

measures and performance drivers for all IT processes)

Purpose…

• IT Control profiling – what is important?

• Awareness – where is the risk?

• Benchmarking - what do others do?

Page 21: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 21

Maturity Model: Method of scoring the maturity of IT processes…

GAP Analysis

(Current Vs. Goal)

COBIT® Maturity Model

Management’s

Target Goal

Page 22: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 22

Metrics as CSF, KPI, & KGI

�Critical Success Factors(CSF)

What are the most important thingsto do to increase the probability of success of the process?

�Key Performance Indicators(KPI)

Measure how well a process isperforming.

�Key Goal Indicators(KGI)

Measure whether a processachieved its business requirements.

Page 23: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 23

Measuring Success – Example of COBIT® DS5

Page 24: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 24

Process

Relationships

RACI Chart(Major activities and

associated responsibilities)

IT Goals &

Performance Metrics

Example of COBIT® 4.0 - DS5 (page 3)

Page 25: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 25

Process

Specific

Maturity

Model

Example of COBIT® 4.0 - DS5 (page 4)

Page 26: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 26

Summing It All UpBusiness Goals Drive IT Goals

Page 27: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

Integrating COBIT® Domains Into IT

Audit Planning & Scope Development

Page 28: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 28

Integration Overview

Integrating

COBIT

Into IT

Audit

Approach

Integrate COBIT Into the IT Audit Lifecycle

Joint Risk Self-Assessments

Analyze, Document, Validate Results

Ensure Consistent Audit Coverage By Establishing IT

Audit Focal Points

Map COBIT to the Technology Audit Universe

Develop Work Programs (Supplement Existing Work

Programs With COBIT Audit Guidelines)

Map COBIT to Relevant Regulatory, Industry, and

Technology Specific Standards / Guidelines /Best Practice

and the Organization’s IT Policies, Standards, Guidelines,

and Procedures

Map COBIT to the Annual and Rotational Audit Plans

Report To Management

Use COBIT To Establish IT Risk & Control Measurement

Page 29: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

Mapping COBIT® to the

Technology Audit Universe

Page 30: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 30

Drilling Down to the Technology Infrastructure

Division /

Business

Business

Cycles

Financial Statement Accounts

Financial

Accounting

Fixed

AssetsExpenditures Inventory Revenue Payroll

Un

der

sta

nd

/ A

sses

Ris

k

Applications SAPVarious

Others

Operating

System /

PlatformUNIX

Various

Other Systems

Page 31: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 31

Understanding the Technology Infrastructure

Remote Access

Mainframe Systems

Databases & Applications

Internal RisksUnauthorized Access by Internal Users (employees or contractors)

Distributed Systems

UNIX & Windows

DMZ

Databases

& Applications

Other Servers

Firewalls /

Secure

Routing

External RisksVulnerability to Hackers

Databases

& Applications

•Email

•FTP

•DNS

Monitoring, Intrusion Detection & Anti-Virus Systems

Firewalls

Internet

Subsidiaries

Router

Router

LANS

Router

3rd Parties

VPN

Remote LANS

Page 32: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 32

Identifying Relevant Technology “Layers”

DB2Oracle Sybase

IT

Administration

& ManagementAdministration Tools

INFORMATION TECHNOLOGY POLICIES & STANDARDS

Datacom

Distributed Applications Mainframe Applications

UNIXWindows NT / 2000 / XP MVS (OS/390), TopSecret, RACF

DB2SQL/Server

IT Procedures (document how to implement security standards / requirements)

Other Network Components

Network

Controls

Platform

Controls

Database

Controls

Application

Controls

Firewall Components (Routers, Bastion Hosts & Firewall Applications)

Distributed Servers Mainframes

Distributed Databases Mainframe Databases

<--Multiple Layer s of Control -->

Monitoring & Incident Response

Page 33: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 33

Understanding the IT Governance Framework

IT Management

Policies

Standards

Regulatory & Legal

Evolving Technology

Industry Trends

IT GovernanceIT Risk Management Oversight IT & Business Alignment

IT Strategy & Planning

IT Planning Strategic Sourcing IT Organization Budget & Control

IT Human Resources

Disaster Recovery Planning

Enterprise Security Architecture & Management

Technology Management

* Technology Planning

* Architecture Design

* Vendor / Product Selection

Operations

* Data Center Operations

* Storage Management

* Data Management

* Network & Systems Mgt

* Desktop Management

* Release Management

* Performance Management

Applications

* Development

- Testing

- Conversion

- Implementation

* IT Change Management

* Maintenance

Support

* Vendors / 3rd Party

* Help Desk

* End User Support

* Training

Program ManagementChange Management Project Management Quality Assurance Portfolio Management

Page 34: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 34

AuditUniverse

Change Management

Data Center Operations

Information Security

Network Management

Architecture

Database Management

Hardware Management

Performance & Capacity

Problem Management

Recoverability

Software Management

Telecommunications

User Support

•Distributed Servers

•Mainframe

•Distributed & Mainframe Databases

•Information Privacy

•Monitoring & Intrusion Detection

•Physical Security

•Network & Perimeter

•Remote Access

•Security Engineering

•Security Management

•Virus Prevention

•Applications

System Development

Defining the Technology Audit Universe

Page 35: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 35

Security Audit Universe

Distributed Server Security•UNIX (Solaris, AIX, HP-UX)•Windows NT / 2000 / XP

•Netware

Distributed Database Security•DB2 6000•Oracle

•SQL/Server•Sybase

Physical Security

Application Security•ETS Audit Coverage•System Development Projects

Network & Perimeter Security•Firewalls•Subsidiary Connectivity

•3rd Party Connectivity

Remote Access Security•VPNs•Modem Usage

•Other Remote Access Facilities•Vendor Access

Monitoring & Incident Response•System Logging & Reporting•Automated Intrusion Detection Systems (IDS)

•Vulnerability Assessment Process•Incident Response Program

Security Management•Policy, Standards, & Procedures Maintenance Process•Security Awareness Program

•Security Metrics & Performance Reporting

Virus Prevention•Anti-Virus Program

Information Privacy•Privacy Office Compliance Program

Security Engineering•Research & Development•Security Self-Assessments

AuditUniverse

Mainframe Security•O/S (OS/390)•Security Systems (Top Secret / RACF)

•Sub-systems (CICS, TSO, IMS DC, MQ) •Mainframe Databases (DB2, Datacom)

Information Security•Distributed Servers

•Mainframe

•Distributed & Mainframe Databases

•Information Privacy

•Monitoring & Intrusion Detection

•Physical Security

•Network & Perimeter

•Remote Access

•Security Engineering

•Security Management

•Virus Prevention

•Applications

Page 36: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 36

High

Level

Objective

(e.g. PO2)

Applicable

Objectives

Noted

With ‘X’

Map Audit Universe To COBIT®

Illustration Only

Page 37: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

Ensuring Consistent Coverage

IT Audit Focal Points

Page 38: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 38

Audit Focal Points

• Access Control

• System Security Configuration

• Monitoring, Vulnerability

Assessment, & Response

• Security Management &

Administration

Information Security

Audit Focal Points

ensure consistent coverage across audits

and allow for trending

the “state of controls” over time.

•Strategy & Structure

•Methodologies & Procedures

•Measurement & Reporting

•Tools & Technology

Infrastructure

Example

Page 39: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 39

StandardsStandards for secure platform configuration are documented, approved, and communicated.

Configuration ManagementProcedures are in place to facilitate an effective configuration management process for standard images, patches and other updates. Procedures are in place for handling exceptions for non-standard configurations.

ProceduresDefined procedures exist to ensure that systems are configured in compliance with Schwab security standards. The procedures are tested, documented and approved by management.

System Security ParametersSystems are configured with security parameters consistent with corporate standards.

System UtilitiesSystem utilities are managed effectively.

Security Audit Focal Points / Areas of Emphasis(Example)

System Security

ConfigurationSystem Security

Configuration

Monitoring, Vulnerability

Assessment & ResponseMonitoring, Vulnerability

Assessment & Response

Security Management

& AdministrationSecurity Management

& Administration

Standards & ProceduresStandards and procedures for access control are documented, approved, and communicated.

Account ManagementAccount management procedures exists and are effective.

Password ManagementPassword management mechanisms are in place to ensure that user passwords comply with Schwab password syntax and management criteria.

User Profile ConfigurationsUser profile configurations are defined based on job responsibilities.

Group Profile ConfigurationsGroup profile configurations are defined to ensure consistent access by users performing similar job responsibilities.

Privileged & Special User AccountsPrivileged and Special User accounts are authorized and restricted.

Generic & Shared AccountsGeneric & Shared accounts are not used as per Schwab standards.

Logon / Logoff ProcessesSystems should be configured to lock after consecutive invalid attempts.

System Boot ProcessSystem boot process is configured to ensure that only authorized security settings and system services are initiated during the system boot / IPL process.

Remote AccessAppropriate mechanisms are in place to control and monitor remote user access to Schwab's internal network.

Resource Safeguards (File/Dataset & Directory/Volume Protection)System level security has been configured to appropriately protect critical system resources (files/datasets, directories/volumes, applications, etc.).

Security Program StrategyOverall security strategy and direction has been established and communicated.

Security Policy & StandardsOverall security policy and standards are documented, approved and communicated.

ProceduresDaily operational procedures have been defined, documented and communicated to ensure that individuals with administrative responsibilities are able to effectively execute standard administration procedures.

Roles, Responsibilities, & StaffingRoles and responsibilities have been defined, documented and communicated to ensure that individuals are informed of their responsibilities.

User Education & AwarenessAwareness and education programs have been established to ensure that users are aware of appropriate corporate security policy and standards.

Security Advisories & AlertsIndustry security advisories and alerts should be closely monitored to ensure that appropriate mitigating controls are in place for identified vulnerabilities / exposures.

Security AdministrationResponsibility for security administration is appropriately assigned and accountability has been established.

Environment UnderstandingGain a comprehensive understanding of the computer-processing environment and the relevant controls in place.

Standards & ProceduresFormal standards and procedures for monitoring and incident response are documented, approved and communicated.

LoggingCritical system and security events are logged according to logging standards.

Reporting & ReviewReports are produced and reviewed by management periodically.

Incident ResponseSecurity incident response procedures exist and are applied consistently in an event of a security breach. Escalation protocols have been defined.

Security Audit Focal Points

ensure consistent coverage across audits

and allow for trending

the “state of security” over time.

Access ControlAccess Control

Page 40: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 40

Map Focal Points / Areas of Emphasis to COBIT®

(Example)

Standards & ProceduresStandards and procedures for access control are documented, approved, and communicated.

Account ManagementAccount management procedures exists and are effective.

Password ManagementPassword management mechanisms are in place to ensure that user passwords comply with Schwab password syntax and management criteria.

User Profile ConfigurationsUser profile configurations are defined based on job responsibilities.

Group Profile ConfigurationsGroup profile configurations are defined to ensure consistent access by users performing similar job responsibilities.

Privileged & Special User AccountsPrivileged and Special User accounts are authorized and restricted.

Generic & Shared AccountsGeneric & Shared accounts are not used as per Schwab standards.

Logon / Logoff ProcessesSystems should be configured to lock after consecutive invalid attempts.

System Boot ProcessSystem boot process is configured to ensure that only authorized security settings and system services are initiated during the system boot / IPL process.

Remote AccessAppropriate mechanisms are in place to control and monitor remote user access to Schwab's internal network.

Resource Safeguards (File/Dataset & Directory/Volume Protection)System level security has been configured to appropriately protect critical system resources (files/datasets, directories/volumes, applications, etc.).

Access ControlAccess Control

Record Applicable

Focal Points &

Areas of Emphasis

Detailed

Objectives

Page 41: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

Mapping COBIT® to Relevant

Industry Standards, Guidelines &

Best Practices

Vendor-Specific

Guidance

Page 42: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 42

Classifying Sources

�Governance (strategic) focus versus Management

(tactical) focus.

�Process Control focus versus process Execution

focus.

�What To Do versus How To Do IT

Identify relevant industry standards, guidelines,

and best practices (classify by purpose)…

Page 43: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 43

Classification (Example)

GOVERN

MANAGE

Strategic

Control

Tactical

Execute

H

O

W

W

H

A

T

ISO17799

Vendor-Specific

Guidance

Page 44: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 44

ITIL Overview

�Information Technology Infrastructure Library (ITIL)

�Set of books detailing best practices for IT Service

Management (the “how”)

�Originally developed by the UK government to improve

IT Service Management

�Now more globally accepted

�Currently under revision

�www.itil.co.uk

Page 45: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 45

ITIL – The Most Popular Books

Source: 2005 COBIT User Convention

Page 46: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 46

ITIL Mapping To COBIT®

Source: 2005 COBIT User Convention

Page 47: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 47

ITIL Mapping To COBIT®

(continued)

Source: 2005 COBIT User Convention

Service Delivery Service Support

Service Management

Page 48: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 48

ISO 17799 Overview

�ISO/IEC 17799:2005

Code of Practice for Information Security Management

�Established guidelines and general principles for

initiating, implementing, maintaining, and improving

information security management.

�Objectives outlined provide general guidance on the

commonly accepted goals of information security

management.

�Updated in 2005

�www.iso.org

Page 49: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 49

ISO 17799 Components

�Security Policy

�Organization of Information Security

�Asset Management

�Human Resource Security

�Physical & Environmental Security

�Communications & Operations Management

�Access Control

� Information Systems Acquisition, Development, and Maintenance

� Information Security Incident Management

�Business Continuity Management

�Compliance

ISO 17799 contains best practices for control

objectives and controls in the following areas…

Page 50: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 50

Aligning COBIT® , ITIL, and ISO 17799

�IT Governance Institute

�Office of Government Commerce.

�Useful guidance for implementing COBIT, ITIL

and ISO17799

�Useful mapping of ITIL and ISO17799 to COBIT

(3rd edition)

�Available at ISACA.ORG

�Go to Downloads

�Then COBIT

A Management Briefing from ITGI and OGC…

Page 51: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

Mapping COBIT® to Organizational

IT Policies, Standards, Guidelines &

Procedures

Page 52: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 52

IT Policies

IT Standards

IT Procedures

Policies:High-level statements. When there is no specific standard to follow, policies provide general guidance.

Standards:Standards establish a point of reference, providing criteria that may be used to measure the accuracy and effectiveness of procedures / mechanisms that are in place.

Guidelines:Guidelines provide specific and detailed requirements relative to implementing specific IT standards (i.e., platform specific; function specific; component specific, etc.).

Procedures:Procedures provide step-by-step instructions for end-users and technical staff for the execution of specific IT processes.

Policies, Standards, Guidelines & Procedures

IT Guidelines

W

H

A

T

H

O

W

Page 53: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 53

Map COBIT® To IT Policies, Standards, Guidelines & Procedures

Illustration Only

Detailed

Level

Objective

(e.g. 2.1)

High

Level

Objective

(e.g. PO1)

IT Policies IT Standards

ETC…

Applicable

Objectives

Noted

Page 54: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

Integrating COBIT® Into the

IT Audit Lifecycle

Page 55: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 55

IT Audit Approach Overview

Reporting

Audit Planning Session

Audit Team

Work Program

COBIT

Manuals &

Other Best

Practice Material

Client Work Sessions

Audit Testing

1

3

2

Engagement

Scope

Kick-Off

Meeting

Exit Meeting7

8

COBIT Risk & Control

Assessment Questionnaire

6

4

5

COBIT To Audit

Mapping Template

QAR9

4

Page 56: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 56

Map Audit Scope To COBIT®

Detailed

Level

Objective

(e.g. 2.1)

Applicable

Objectives

Noted In

This

Column

High

Level

Objective

(e.g. PO1)

Supplemented

by other mapping

results…

Page 57: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 57

Using COBIT® Framework To Tie It All Together…

Audit Scope Memo Defined COBIT Risk & Control

Assessment Questionnaire

Audit Report

Use of a Framework

ensures consistent coverage

across audits and allows for

trending the “state of controls”

over time.

Work

Program

Page 58: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 58

COBIT® Control Assessment Questionnaire

Questionnaire is used during joint work sessions held with clients to complete a joint risk assessment of the area under review.

Preplanned

Assessment

Questions

Client’s Response

&

Assessment Results

COBIT Maturity

Rating (0-5)

assigned based on

Joint Assessment

Overall Maturity Rating for each

High-Level Control Objective

assigned based on results of

joint assessments of each

Detailed Control Objective.

XYZ Company

Specific Control

Objectives

One COBIT

Control Objective

Per Row

One Table For Each

High-Level COBIT

Objective Included In Scope

Page 59: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 59

COBIT® Based Executive Audit Report

Overall

Conclusion

Statements

Supporting

Overall Rating

Concise

Background

&

Scope

Audit

Metrics

Overall Rating

Clients Target Goal

Responsible Manager

Provided Response

Control Weakness

highlighting

business impact

Issue Priority

(A, B, C)

Client

Provided

Responses

Due Date

MGT

Reports

Page 60: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 60

COBIT® Based Audit Report(continued)

Overall Rating

For High-Level

Control Objective

Highlighting Key

Performance Indicators

(i.e., Metrics)

Summary Conclusions

and

Points Supporting Rating

Detailed Control

Objectives Included

In Scope Listed

Strategic Focal Point Table

(one row for each high-level

objective included in scope)

Control Focal Point Table

(highlighting key controls)

Applicable Detailed

Control Objective

(one per row;

corresponds to a row

in the Assessment

Questionnaire)

Highlighting Key

Performance Indicators

(i.e., Metrics)

Summary Conclusions

and

Points Supporting RatingAssigned

Maturity Rating

Page 61: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 61

COBIT® Based Audit Report(continued)

Process

Workflow

Diagram

For

Area

Assessed

Table

Defining

Key

Control

Points

In

Process

Flow

Highlighting Key

Performance Indicators

(i.e., Metrics)

Automated

or

Manual

Control

Page 62: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

Using COBIT® to Establish

IT Risk & Control Measurement

Page 63: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 63

Goal is to proactively monitor audit results and IT metrics on an ongoing basis to focus the scope of audits on high-risk processes and tasks where performance indicators indicate potential problems.

Results of metric analysis is presented to client management on a periodic basis via management reports. The analysis indicates any changes to the audit scope planned for upcoming audits.

Analysis of Audit & Key Technology Metrics

Page 64: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 64

COBIT® Measurement Repository

MGT REPORTS

Trending Audit Results

Over Time…

Audit Reports

Questionnaire

Continuous

Monitoring

Page 65: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 65

Periodic Management Reports

Date Printed: 03/24/2003 Charles Schwab & Co, Inc. 6

IAD Focal Point Methodology ScorecardOverall Audit Results

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

0 – Non-Existent

1 - Initial

5 - Optimized

4 - Managed

Legend:

Security Audits(refer to slide 7)

Security Audits(refer to slide 7)

OVERALLOVERALLInfrastructure Audits

(refer to slide 6)Infrastructure Audits

(refer to slide 6)

2 -Repeatable

3 - Defined

60

%

Q1 Prior

Year

Q2

2002

Dat

a N

ot

Avail

able

For

20

01

40%

60

%4

0%

No R

eport

s Is

sued

TB

D

YTDQ3 Q4

60

%4

0%

75%

Q1 Prior

Year

Q2

2002

Dat

a N

ot

Avail

able

For

20

01

TB

D

YTDQ3 Q4

25

%

Q1 Prior

Year

Q2

2002

Data

Not

Avai

lable

Fo

r 2

00

1

20%

TB

D

YTDQ3 Q4

68

%

13

%70

%

25

%

75%

25

%

75%

25

%

75%

75%

25

%12

%

20%

68

%12

%

17%

May 20, 2003 2003 North America CACS Conference Slide 77

Example of Metric Analysis To Include In QAR(Illustration Only)

0.00%

10.00%

20.00%

30.00%

40.00%

50.00%

60.00%

70.00%

80.00%

90.00%

100.00%

Q1, 2002 Q2, 2002 Q3, 2002 YTD

Successful

Failed & Backed Out

Caused Problem

Caused Outage

Cancelled

Unstatused

Although target rates have not been achieved, change management processes are successful on average 75% of the time. Less then 1% of appropriately recorded changes resulted in problems or outages…

Internal Audit Observations:

� Change management processes appear to be consistently applied with only minor variances in volume.

� Large percentage (~20%) of “unstatused” tickets indicates process adherence issues. True results cannot accurately be determined; therefore, additional management scrutiny is appropriate for the “unstatused” items.

� Trend for tickets with implementation problems is increasing - additional analysis to ascertain root cause of the increase in this activity would be appropriate. Root cause may rest with testing and validation processes.

Target Rate97%(Source: TechnologyManagementBalancedScorecard)

0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

Q1,

2002

Q2,

2002

Q3,

2002

YTD

Failed & Backed Out

Caused Problem

Caused Outage

Cancelled

Unstatused

Audit Results Metrics

Analysis of

Key Technology Metrics

Report to IT Management

Audit Results

&

Analysis of Key Technology Metrics

For the Quarter Ended

March 31, 2006

Page 66: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 66

Example of Audit Result Metrics(Illustration Only)

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

0 – Non-Existent

1 - Initial

5 - Optimized

4 - Managed

Legend:

Security AuditsSecurity Audits OVERALLOVERALLInfrastructure AuditsInfrastructure Audits

2 -Repeatable

3 - Defined

60

%

Q1 Prior

Year

Q2

2002

40

%

60

%4

0%

YTDQ3 Q4

60

%4

0%

75

%

Q1 Prior

Year

Q2

2002

YTDQ3 Q4

25

%

Q1 Prior

Year

Q2

2002

30

%

YTDQ3 Q4

68

%

25

%5

5%

25

%

60

%4

0%

75

%2

5%

75

%

75

%2

5%

25

%

20

%6

8%

12

%

20

%

15

%5

0%

35

%

60

%4

0%

20

%6

8%

12

%

30

%2

5%

45

%

30

%4

5%

25

%

30

%2

5%

45

%

30

%6

0%

10

%

Page 67: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 67

Reality

Continuous Monitoring / AuditingOngoing Measurement / Ongoing Dialogue

Expectation

Timet1

Co

ntr

ol

En

vir

on

men

t

Ongoing Measurement

t1

Co

ntr

ol

En

vir

on

men

t

Asses 1

Assess 2

Expectation

Timet2

Traditional Audit Approach Ongoing Monitoring Of Indicators

Assess 1

Assess 2

t2

Auditors monitor key indicators for mission critical technology functions on an ongoing basis…

Reality

Report

ReportReport

Page 68: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 68

Reality

t1

Co

ntr

ol

En

vir

on

men

t

Asses 1

Assess 2

Expectation

Timet2

Traditional Audit Approach(Audit rotation schedule based on annual risk assessment of function)

“Point-In-Time” Audit – Challenges• Evaluation of risk and control is as of a point in time.

• Audit reporting is reflective of results as of a point in time.

• Audit scope may be influenced by prior results.

• If an audit of the function has not been completed for a long time, there may be a

learning curve.

Continuous Monitoring / Auditing Ongoing Measurement / Ongoing Dialogue

Page 69: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 69

Expectation

Timet1

Co

ntr

ol

En

vir

on

men

t

Ongoing Measurement

Ongoing Monitoring Of Risk Indicators(Gaining Efficiencies Through Focus On High Risk Indicators)

Assess 1

Assess 2

t2

Benefits of Ongoing Monitoring• Periodic (e.g., quarterly) readout of assessment results for technology management.

• Ongoing dialogue regarding areas of significant or increasing risk.

• IAD focuses the scope of individual audits on known risk factors ultimately leading

to audit efficiencies which may result in less time impact on client personnel.

Reality

Report

ReportReport

Continuous Monitoring / Auditing Ongoing Measurement / Ongoing Dialogue

Page 70: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 70

0

100

200

300

400

500

600

700

800

900

1000

Q1, 2002 Q2, 2002 YTD

Low RiskVulnerabilities

Medium RiskVulnerabilities

High RiskVulnerabilities

Observations:

� An increase in internal vulnerabilities occurred from Q1 to Q2. The increase is explained due to new system

patches checked for by the vulnerability scanner that have not been applied to the XYZ company servers.

Technology management appropriately applies patches only after the patches have been tested and certified.

� A decrease in external vulnerabilities was noted from Q1 to Q2. These results demonstrate that a significant

number of Q1 vulnerabilities have been resolved.

0

500

1000

1500

2000

2500

3000

Q1, 2002 Q2, 2002 YTD

Low RiskVulnerabilities

Medium RiskVulnerabilities

High RiskVulnerabilities

Internal Vulnerability Scans External Vulnerability Scans

The Security Officer consistently performs both internal and external vulnerability scans on a monthly basis. The majority of vulnerabilities identified are low risk…

A B

A

B

Slight increase in high risk vulnerabilities

Information Security:Measuring Performance (illustration only)

Page 71: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 71

Change Management:Measuring Performance (illustration only)

0.00%

10.00%

20.00%

30.00%

40.00%

50.00%

60.00%

70.00%

80.00%

90.00%

100.00%

Q1, 2002 Q2, 2002 Q3, 2002 YTD

Successful

Failed & Backed Out

Caused Problem

Caused Outage

Cancelled

Unstatused

Although target rates have not been achieved, change management processes are successful on average 75% of the time. Less then 1% of appropriately recorded changes resulted in problems or outages…

Internal Audit Observations:

� Change management processes appear to be consistently applied with only minor variances in volume.

� Large percentage (~20%) of “unstatused” tickets indicates process adherence issues. True results cannot accurately be determined; therefore, additional management scrutiny is appropriate for the “unstatused” items.

� Trend for tickets with implementation problems is increasing - additional analysis to ascertain root cause of the increase in this activity would be appropriate. Root cause may rest with testing and validation processes.

Target Rate97%(Source: TechnologyManagementBalancedScorecard)

0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

Q1,

2 0 0 2

Q2 ,

2 0 0 2

Q3 ,

2 0 0 2

Y TD

Failed & Backed Out

Caused Problem

Caused Outage

Cancelled

Unstatused

Page 72: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

Summary & Wrap-Up

Page 73: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 73

Benefits Realized…

� IT management partners with Internal Audit throughout the audit life cycle,

including input into the audit schedule and scope.

� IT management becomes conversant in risk, control, and audit concepts.

�Relationships transformed into partnerships by jointly assessing control

procedures.

�Audit Report streamlined…concise report supported by detailed

questionnaire.

�Audit approach is methodical and is consistent with industry standards / best

practices as well as IT Governance practices implemented throughout the

company’s technology organization.

�Meaningful reporting for senior IT management.

Page 74: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 74

Templates & Additional Resources

• Templates (www.sfisaca.org/resources/downloads.htm)

• IT Governance Implementation Guide (www.isaca.org)

• IT Control Practice Statements (www.isaca.org)

• Questionnaire for IT Control Practice Statements (www.isaca.org)

• IT Control Objectives for Sarbanes-Oxley (www.isaca.org)

• COBIT Security Baseline (www.isaca.org)

• ITIL (www.itil.co.uk)

• ISO (www.iso.org)

• ISO 17799 Related Information (www.iso-17799.com/)

• COBIT Case Studies (available at www.itgi.org/ and www.isaca.org)

Page 75: Integrating CobiT Domains into the IT Audit Process CobiT Domains into the IT... · Integrating COBIT ® into the IT Audit Process (Planning, Scope Development, ... [KPI] and key

April 20, 2006 SF ISACA - April Chapter Luncheon Page 75

Questions / Thank You!

Lance M. Turcato, CISA, CISM, CPADeputy City Auditor – Information Technology

City of Phoenix

Email: [email protected]

Phone: 602-262-4714