SlideShare une entreprise Scribd logo
1  sur  18
iFour ConsultancyInformation Security Audit Checklist
Basic stages and workflow of IS Audit
Software Consultancy Indiahttp://www.ifourtechnolab.com
Table of Contents
ISO for Software Outsourcing Companies in India
Sr. No. Particulars
1 List of documents for understanding the Information System of the auditee.
2 Criticality Assessment Tool
3 Collection of specific information on Information System
4 Risk assessment
5 General controls
6 Input controls
7 Processing controls
8 Output controls
9 IT security
Software Consultancy Indiahttp://www.ifourtechnolab.com
Documents for understanding Information System
ISO for Software Outsourcing Companies in India
Sr. No. List of documents
1 Brief background of the organization
2 Information security objectives
3 Scope document of Information System
4 Organizational chart with details of reporting responsibilities
5 Information security policy
6 Risk assessment process
7 Statement of Applicability
8 Risk treatment plan and process
9 Risk assessment and Risk treatment results
10 Evidence of monitoring and measurement results
11 Evidence of implementation of audit program
12 Evidence of results of management reviews
13 Previous audit and internal audit reports
14 Evidence of results of any corrective action
Software Consultancy Indiahttp://www.ifourtechnolab.com
 Questions Asked:
 Does the system relate to any of the following operations:
 Business Critical Operations
 Support functions
 What is the amount of investment made in the system?
 Number of PCs/Desktops used in the system?
 Is the system on the network?
 How much dependent is the organization on the system?
 Does the system link to third parties?
 Does the system have dedicated IT staff?
 How many end-users of system?
 For how long has the system been operation for?
 Does the system have a documented and approved DRP?
 What is the volume of data used by the system?
Criticality Assessment Tool
ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
Collection of specific information on IS
Information to be collected includes:
Name of the system and broad functional areas covered by the system.
Department head of the organization
Location of the system installation
Category of the system architecture
Affects financial or accounting aspects of the organization
Softwares used by the system
Is the system mission critical?
Is the system in-house or has it been outsourced? (if so, then collect information of that
company)
ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
Collection of specific information on IS (continued)
Total persons involved in the system
Does the system documentation provide audit trail of all transactions?
Are system manuals available?
Details of hardware items employed by the system
What is the projected cost of the system?
When was the system made operational?
Total investment made in the system based on categories of items use
ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
 The risk assessment is classified into 4 categories:
Management & Organization
HR Policy
Security
Physical & Logical access
Risk assessment
ISO for Software Outsourcing Companies in India
Software Consultancy Indiahttp://www.ifourtechnolab.com
 Questions asked:
Is there a strategic IT plan prepared by the organization based on business needs?
Does the IS department have clear cut and well defined goals?
Does management provide appropriate direction on security objectives of the system?
If the system uses 3rd party data, does the organization have procedures in place to
address associated risks?
Are there procedures to update strategic IT plan?
Risk assessment – Management & Organization
ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
Risk Assessment – HR policy
Questions asked:
Is there a criteria for recruiting and selecting personnel?
Is training need analysis done at a particular interval?
Is organization’s security clearance process adequate?
Are responsibilities and duties clearly defined?
Is backup staff available in case of absenteeism?
Software Consultancy Indiahttp://www.ifourtechnolab.com
 Questions asked:
Is there a data classification schema in place?
Is there a user security profile system in place to determine access on a ‘need to know’
basis?
Is there a password policy?
Are preventive and detective control measures been established by management?
Is there a centralized security organization responsible for ensuring only appropriate
access to system resources?
Risk assessment – Security
ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
 Questions asked:
Whether facility access is limited to least number of people?
Is there a periodic and ongoing review of access profiles, including managerial review?
Whether physical security is addressed in the continuity plan?
Whether health, safety and environmental regulations are being complied with?
Is there a system of reviewing fire, weather, electrical warning and alarm procedures
and expected response scenarios for various levels of environmental hazards?
Risk assessment – Physical & Logical Access
ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
 To check whether proper controls have been implemented or not.
 These controls need to be viewed in relation to the impact on the efficiency,
security or effectiveness of the system.
 Questions asked:
Are there procedures for monitoring the implementation of strategic plan?
Are current IT activities consistent with the plan?
Is documentation complete and in current state?
Does security procedures cover designation and duties of security officer?
Are security breaches immediately reported for appropriate action?
Are objectives, scope and requirements of acquisition clearly defined and documented?
General Controls
ISO for Software Outsourcing Companies in India
Software Consultancy Indiahttp://www.ifourtechnolab.com
 Questions asked:
Are the methods of data entry and conversion well documented?
Are all the documents accounted for and if so what is the method used?
Is there a system of documents being signed or marked to prevent reuse of data?
Is there a system of escalation of reports to higher levels if the conditions deteriorate?
Does the system provide for error messages for every type of error not meeting the
validation?
Input Controls
ISO for Software Outsourcing Companies in India
Software Consultancy Indiahttp://www.ifourtechnolab.com
 Questions asked:
Do documented procedures exist explaining the methods for proper processing of each
application program?
Is the history log displayed by the console?
Does the computer program logic have in-built standardized default options?
Are version control procedures in place, ensuring the processing on the proper version
of file?
Are the error messages clear and short, communicating the nature of error for
appropriate guidance to the user?
Processing Controls
ISO for Software Outsourcing Companies in India
Software Consultancy Indiahttp://www.ifourtechnolab.com
 Questions asked:
Is the user department responsible for correctness of all output?
Examine whether document methods are in place for proper handling and distribution
of output?
Examine the system of forward linkage to trace transaction from origin to its final output
stage
Whether output audit trail logs are maintained and periodically reviewed by supervisors
to ensure accuracy of output generated
Output Controls
ISO for Software Outsourcing Companies in India
Software Consultancy Indiahttp://www.ifourtechnolab.com
 Sections considered:
Security Policy
Organizational security
Asset classification and control
Personnel security
Physical & Environmental security
Communications & Operations management
Access Control
System development and maintenance
Business continuity management
Compliance
IT security
ISO for Software Outsourcing Companies in India
Software Consultancy Indiahttp://www.ifourtechnolab.com
 http://www.icisa.cag.gov.in/Background%20Material-IT%20Environment/IT-Audit-
Manual/Vol-3.pdf
References
Software Consultancy Indiahttp://www.ifourtechnolab.com

Contenu connexe

Tendances

Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaFahmi Albaheth
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesCertification Europe
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Complianceseanpizzy
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Sreekanth Narendran
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...iFour Consultancy
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit Sreekanth Narendran
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overviewJulia Urbina-Pineda
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 
SSAE 16 Transitions Overview
SSAE 16 Transitions OverviewSSAE 16 Transitions Overview
SSAE 16 Transitions OverviewJeffrey Paulette
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 

Tendances (20)

Iso27001- Nashwan Mustafa
Iso27001- Nashwan MustafaIso27001- Nashwan Mustafa
Iso27001- Nashwan Mustafa
 
ISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and ChallengesISO 27001 Certification - The Benefits and Challenges
ISO 27001 Certification - The Benefits and Challenges
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Iso 27001 2013
Iso 27001 2013Iso 27001 2013
Iso 27001 2013
 
Information System audit
Information System auditInformation System audit
Information System audit
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
ISO 27001 2013 A12 Operations Security Part 2 - by Software development compa...
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
Security audit
Security auditSecurity audit
Security audit
 
SSAE 16 Transitions Overview
SSAE 16 Transitions OverviewSSAE 16 Transitions Overview
SSAE 16 Transitions Overview
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 

En vedette

Summer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools LtdSummer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools LtdPuneet Parihar
 
Ch12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jonesCh12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jonesAnkit Kesri
 
security-checklist-database
security-checklist-databasesecurity-checklist-database
security-checklist-databaseMohsen B
 
Technical Marketing is the Price of Admission
Technical Marketing is the Price of AdmissionTechnical Marketing is the Price of Admission
Technical Marketing is the Price of AdmissionMichael King
 
101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For Entrepreneurs101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For EntrepreneursFit Small Business
 
Iso 9001 2015 audit checklist
Iso 9001 2015 audit checklistIso 9001 2015 audit checklist
Iso 9001 2015 audit checklistHamid Ali
 
Web site int audit checklist intent
Web site int audit checklist intentWeb site int audit checklist intent
Web site int audit checklist intentmartinbusiness
 
Program management audit checklist
Program management audit checklistProgram management audit checklist
Program management audit checklistBob Prieto
 
13 information system audit of banks
13 information system audit of banks13 information system audit of banks
13 information system audit of banksspandane
 
Predictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesPredictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesKimberley Mitchell
 
Computer networking
Computer networkingComputer networking
Computer networkingChinmoy Jena
 
Website Audit Checklist
Website Audit ChecklistWebsite Audit Checklist
Website Audit ChecklistTim Bourgeois
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanResilient Systems
 
Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2Yaryalitsa
 
Iso Process Audit Training
Iso Process Audit TrainingIso Process Audit Training
Iso Process Audit Trainingsrmortensen
 
Integrated treasury management in banks
Integrated treasury management in banksIntegrated treasury management in banks
Integrated treasury management in banksSahas Patil
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information SystemsAhmad Tariq Bhatti
 
Entrepreneurship And Business Management
Entrepreneurship And Business ManagementEntrepreneurship And Business Management
Entrepreneurship And Business ManagementProf Parameshwar P Iyer
 
Project audit & review checklist
Project audit & review checklistProject audit & review checklist
Project audit & review checklistRam Srivastava
 

En vedette (20)

Summer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools LtdSummer Training Presentation On HMT Machine Tools Ltd
Summer Training Presentation On HMT Machine Tools Ltd
 
Ch12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jonesCh12 - Organisation theory design and change gareth jones
Ch12 - Organisation theory design and change gareth jones
 
security-checklist-database
security-checklist-databasesecurity-checklist-database
security-checklist-database
 
Technical Marketing is the Price of Admission
Technical Marketing is the Price of AdmissionTechnical Marketing is the Price of Admission
Technical Marketing is the Price of Admission
 
101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For Entrepreneurs101 Free Online Marketing Resources For Entrepreneurs
101 Free Online Marketing Resources For Entrepreneurs
 
Iso 9001 2015 audit checklist
Iso 9001 2015 audit checklistIso 9001 2015 audit checklist
Iso 9001 2015 audit checklist
 
Web site int audit checklist intent
Web site int audit checklist intentWeb site int audit checklist intent
Web site int audit checklist intent
 
Program management audit checklist
Program management audit checklistProgram management audit checklist
Program management audit checklist
 
13 information system audit of banks
13 information system audit of banks13 information system audit of banks
13 information system audit of banks
 
Capex audit checklist
Capex audit checklistCapex audit checklist
Capex audit checklist
 
Predictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use CasesPredictive Analytics: Context and Use Cases
Predictive Analytics: Context and Use Cases
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Website Audit Checklist
Website Audit ChecklistWebsite Audit Checklist
Website Audit Checklist
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
 
Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2Landforms 60 - PowerPoint - Version 2
Landforms 60 - PowerPoint - Version 2
 
Iso Process Audit Training
Iso Process Audit TrainingIso Process Audit Training
Iso Process Audit Training
 
Integrated treasury management in banks
Integrated treasury management in banksIntegrated treasury management in banks
Integrated treasury management in banks
 
Audit Checklist for Information Systems
Audit Checklist for Information SystemsAudit Checklist for Information Systems
Audit Checklist for Information Systems
 
Entrepreneurship And Business Management
Entrepreneurship And Business ManagementEntrepreneurship And Business Management
Entrepreneurship And Business Management
 
Project audit & review checklist
Project audit & review checklistProject audit & review checklist
Project audit & review checklist
 

Similaire à IS Audit Checklist- by Software development company in india

Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iiiAshish Desai
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)Partha_bappa
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information securityVijay Sekar
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Unit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxUnit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxSharumathiR1
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxhealdkathaleen
 
Misauditchecklist 121023080803-phpapp01
Misauditchecklist 121023080803-phpapp01Misauditchecklist 121023080803-phpapp01
Misauditchecklist 121023080803-phpapp01Ravikrishnan Nc
 
we45 Information Security HealthCheck (iSHC)
we45 Information Security HealthCheck (iSHC)we45 Information Security HealthCheck (iSHC)
we45 Information Security HealthCheck (iSHC)we45
 
eb-The-State-of-API-Security.pdf
eb-The-State-of-API-Security.pdfeb-The-State-of-API-Security.pdf
eb-The-State-of-API-Security.pdfSajid Ali
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
 
Compliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM iCompliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM itaford
 
Information Systems Development.pptx
Information Systems Development.pptxInformation Systems Development.pptx
Information Systems Development.pptxOsamaRehman10
 
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...Under Controls
 
20 IT Auditor questions.pdf
20 IT Auditor questions.pdf20 IT Auditor questions.pdf
20 IT Auditor questions.pdfinfosec train
 

Similaire à IS Audit Checklist- by Software development company in india (20)

IT System & Security Audit
IT System & Security AuditIT System & Security Audit
IT System & Security Audit
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Information systems and its components iii
Information systems and its components   iiiInformation systems and its components   iii
Information systems and its components iii
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
Hipaa checklist - information security
Hipaa checklist - information securityHipaa checklist - information security
Hipaa checklist - information security
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Unit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptxUnit - 4 Security in information system .pptx
Unit - 4 Security in information system .pptx
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docxRunning Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
Running Head CYBERSECURITY FRAMEWORK1CYBERSECURITY FRAMEWORK.docx
 
Misauditchecklist 121023080803-phpapp01
Misauditchecklist 121023080803-phpapp01Misauditchecklist 121023080803-phpapp01
Misauditchecklist 121023080803-phpapp01
 
we45 Information Security HealthCheck (iSHC)
we45 Information Security HealthCheck (iSHC)we45 Information Security HealthCheck (iSHC)
we45 Information Security HealthCheck (iSHC)
 
eb-The-State-of-API-Security.pdf
eb-The-State-of-API-Security.pdfeb-The-State-of-API-Security.pdf
eb-The-State-of-API-Security.pdf
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
Compliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM iCompliance and Event Monitoring with PowerSC Tools for IBM i
Compliance and Event Monitoring with PowerSC Tools for IBM i
 
Information Systems Development.pptx
Information Systems Development.pptxInformation Systems Development.pptx
Information Systems Development.pptx
 
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
Stay Ahead of Data Security Risks_ How ISO 27001 Compliance Software Can Help...
 
20 IT Auditor questions.pdf
20 IT Auditor questions.pdf20 IT Auditor questions.pdf
20 IT Auditor questions.pdf
 

Dernier

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Dernier (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

IS Audit Checklist- by Software development company in india

  • 2. Basic stages and workflow of IS Audit Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 3. Table of Contents ISO for Software Outsourcing Companies in India Sr. No. Particulars 1 List of documents for understanding the Information System of the auditee. 2 Criticality Assessment Tool 3 Collection of specific information on Information System 4 Risk assessment 5 General controls 6 Input controls 7 Processing controls 8 Output controls 9 IT security Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 4. Documents for understanding Information System ISO for Software Outsourcing Companies in India Sr. No. List of documents 1 Brief background of the organization 2 Information security objectives 3 Scope document of Information System 4 Organizational chart with details of reporting responsibilities 5 Information security policy 6 Risk assessment process 7 Statement of Applicability 8 Risk treatment plan and process 9 Risk assessment and Risk treatment results 10 Evidence of monitoring and measurement results 11 Evidence of implementation of audit program 12 Evidence of results of management reviews 13 Previous audit and internal audit reports 14 Evidence of results of any corrective action Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 5.  Questions Asked:  Does the system relate to any of the following operations:  Business Critical Operations  Support functions  What is the amount of investment made in the system?  Number of PCs/Desktops used in the system?  Is the system on the network?  How much dependent is the organization on the system?  Does the system link to third parties?  Does the system have dedicated IT staff?  How many end-users of system?  For how long has the system been operation for?  Does the system have a documented and approved DRP?  What is the volume of data used by the system? Criticality Assessment Tool ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 6. Collection of specific information on IS Information to be collected includes: Name of the system and broad functional areas covered by the system. Department head of the organization Location of the system installation Category of the system architecture Affects financial or accounting aspects of the organization Softwares used by the system Is the system mission critical? Is the system in-house or has it been outsourced? (if so, then collect information of that company) ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 7. Collection of specific information on IS (continued) Total persons involved in the system Does the system documentation provide audit trail of all transactions? Are system manuals available? Details of hardware items employed by the system What is the projected cost of the system? When was the system made operational? Total investment made in the system based on categories of items use ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 8.  The risk assessment is classified into 4 categories: Management & Organization HR Policy Security Physical & Logical access Risk assessment ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 9.  Questions asked: Is there a strategic IT plan prepared by the organization based on business needs? Does the IS department have clear cut and well defined goals? Does management provide appropriate direction on security objectives of the system? If the system uses 3rd party data, does the organization have procedures in place to address associated risks? Are there procedures to update strategic IT plan? Risk assessment – Management & Organization ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 10. Risk Assessment – HR policy Questions asked: Is there a criteria for recruiting and selecting personnel? Is training need analysis done at a particular interval? Is organization’s security clearance process adequate? Are responsibilities and duties clearly defined? Is backup staff available in case of absenteeism? Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 11.  Questions asked: Is there a data classification schema in place? Is there a user security profile system in place to determine access on a ‘need to know’ basis? Is there a password policy? Are preventive and detective control measures been established by management? Is there a centralized security organization responsible for ensuring only appropriate access to system resources? Risk assessment – Security ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 12.  Questions asked: Whether facility access is limited to least number of people? Is there a periodic and ongoing review of access profiles, including managerial review? Whether physical security is addressed in the continuity plan? Whether health, safety and environmental regulations are being complied with? Is there a system of reviewing fire, weather, electrical warning and alarm procedures and expected response scenarios for various levels of environmental hazards? Risk assessment – Physical & Logical Access ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 13.  To check whether proper controls have been implemented or not.  These controls need to be viewed in relation to the impact on the efficiency, security or effectiveness of the system.  Questions asked: Are there procedures for monitoring the implementation of strategic plan? Are current IT activities consistent with the plan? Is documentation complete and in current state? Does security procedures cover designation and duties of security officer? Are security breaches immediately reported for appropriate action? Are objectives, scope and requirements of acquisition clearly defined and documented? General Controls ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 14.  Questions asked: Are the methods of data entry and conversion well documented? Are all the documents accounted for and if so what is the method used? Is there a system of documents being signed or marked to prevent reuse of data? Is there a system of escalation of reports to higher levels if the conditions deteriorate? Does the system provide for error messages for every type of error not meeting the validation? Input Controls ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 15.  Questions asked: Do documented procedures exist explaining the methods for proper processing of each application program? Is the history log displayed by the console? Does the computer program logic have in-built standardized default options? Are version control procedures in place, ensuring the processing on the proper version of file? Are the error messages clear and short, communicating the nature of error for appropriate guidance to the user? Processing Controls ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 16.  Questions asked: Is the user department responsible for correctness of all output? Examine whether document methods are in place for proper handling and distribution of output? Examine the system of forward linkage to trace transaction from origin to its final output stage Whether output audit trail logs are maintained and periodically reviewed by supervisors to ensure accuracy of output generated Output Controls ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com
  • 17.  Sections considered: Security Policy Organizational security Asset classification and control Personnel security Physical & Environmental security Communications & Operations management Access Control System development and maintenance Business continuity management Compliance IT security ISO for Software Outsourcing Companies in India Software Consultancy Indiahttp://www.ifourtechnolab.com

Notes de l'éditeur

  1. Software Consultancy India– http://www.ifourtechnolab.com
  2. Software Consultancy India – http://www.ifourtechnolab.com
  3. Software Consultancy India– http://www.ifourtechnolab.com
  4. Software Consultancy India– http://www.ifourtechnolab.com
  5. Software Consultancy India– http://www.ifourtechnolab.com
  6. Software Consultancy India– http://www.ifourtechnolab.com
  7. Software Consultancy India– http://www.ifourtechnolab.com
  8. Software Consultancy India– http://www.ifourtechnolab.com
  9. Software Consultancy India– http://www.ifourtechnolab.com
  10. Software Consultancy India– http://www.ifourtechnolab.com
  11. Software Consultancy India– http://www.ifourtechnolab.com
  12. Software Consultancy India– http://www.ifourtechnolab.com
  13. Software Consultancy India– http://www.ifourtechnolab.com
  14. Software Consultancy India– http://www.ifourtechnolab.com
  15. Software Consultancy India– http://www.ifourtechnolab.com
  16. Software Consultancy India– http://www.ifourtechnolab.com
  17. Software Consultancy India– http://www.ifourtechnolab.com
  18. Software Consultancy India– http://www.ifourtechnolab.com