Demystifying Risk-Based Audit Methodology

Demystifying Risk‐Based Audit Methodology
Instructor Jay Ranade
CISA, CISM, CISSP, ISSAP, CBCP, CGEIT
Ph. 1‐917‐971‐9786
[email protected]
[email protected]
Instructor Introduction
Jay, a certified CISA, CISM, CISSP, ISSAP, and CBCP, is an internationally renowned expert on computers, communications, disaster recovery, IT Security, and IT controls. He has written and published more than 35 IT‐related books on various subjects ranging from networks, security, operating systems, languages, and systems. He also has an imprint with McGraw‐Hill with more than 300 books called “Jay Ranade Series”. He has written and published articles for various computer magazines such as Byte, LAN Magazine, and Enterprise Systems Journal. The New York Times critically acclaimed his book called the “Best of Byte”. He is currently working on a number of books on various subjects such as IT Audit, IT Security, Business Continuity, and IT Risk Management. Jay has consulted and worked for Global and Fortune 500 companies in the US and abroad including American International Group, Time Life, Merrill Lynch, Dreyfus/Mellon Bank, Johnson and Johnson, Unisys, McGraw‐Hill, Mobiltel Bulgaria, and Credit Suisse. He was a member of the ISACA International's Publications Committee (2005‐2007). He teaches graduate‐level class on Information Security Management and Enterprise Risk Management at New York University. He also teaches accounting information systems, IT auditing, and internal auditing at St. John’s University.
Currently, he is the Director of Education for TechnoDyne University, a NJ, USA‐based professional educational services organization specializing in CARGOS (Controls, Auditing, Risk, Governance, Operations, and Security)
He is four times world champion in Arm Wrestling and two times world champion (2002 and 2003) in martial arts breaking. He has appeared on ESPN and ESPN2 numerous times. www.technodyneuniversity.com
2
Instructor Information
• Contact information
– [email protected][email protected]
– USA +1‐917‐971‐9786
• TechnoDyne University
502 Valley Road, Suite 103
Wayne, NJ 07470
USA
Why Risk Based?
Two aspects • Risk‐based IT auditing has 2 aspects
• Risk‐based audit planning
– Annual basis
– CAE accountable for that
– That results in individual audit engagements
• Risk‐based individual engagement planning
– This is for each engagement
– Engagement auditor does that
www.technodyneuniversity.com
5
What is flow of Risk Management?
• Threat exploits a vulnerability
• That’s damages an asset
• That damages a business process – From AIC perspective
• That’s the risk
• You put controls in place to mitigate the risk
• Till (executive) management says it is an acceptable risk
• Note: auditors give assurance on that to the board
www.technodyneuniversity.com
6
Limited Audit Resources
• Limited audit resources in any organization
• Audit’s value proportional to cost element
• Cost of controls must be less than protection to the asset
– CAPEX and OPEX perspective
• Controls cost money and controls impede business
• Controls and value must be balanced
www.technodyneuniversity.com
7
Who Develops Audit Plan?
• Accountability lies with CAE
• Lack of IT knowledge with CAE
• Those who have knowledge of IT lack knowledge of business processes
• Knowledge of business processes and IT is required for an audit plan
• It is revised on an annual basis
• Remember that according to QARs, developing risk‐
based plan is the weakest link in IAA
www.technodyneuniversity.com
8
Organizational Factors • Organizational factors affect audit plans
• What is industry sector
– Financial, pharmaceutical, energy, health care
• Size of the organization
• Business processes
– Unique for each organization
• Geographical locations
www.technodyneuniversity.com
9
Four Steps in Risk‐based Audit Planning
1. Know the business
•
•
•
•
•
What are organizational strategies
What are business objectives
What is the risk profile
How is operations structured
How does IT support business
– Support role
– Is IT business enabler?
www.technodyneuniversity.com
11
2. Know the Audit Universe
•
•
•
•
•
•
•
•
Organization is collection of business processes
Applications support business processes
Infrastructure supports applications
IT Service Management supports infrastructure
Technologies constitute infrastructures
New projects are created continuously
All of them constitute the universe of audit
But you can not audit all……….
www.technodyneuniversity.com
12
3. Perform risk assessment
• Why? Because you audit subset of audit universe
• Risk assessment should be a process
• Risk factors help prioritize audit subjects
• Remember‐ Risk is to business processes, not IT
www.technodyneuniversity.com
13
4. Now, create Audit Plan
• Time to create audit engagements • Audit frequency determined by significance of business process
• Management can also add to engagement subjects
– Assurance and consulting
• Business will validate the plan but audit committee has final say
www.technodyneuniversity.com
14
1. Know the business
Each Organization is Different
•
•
•
•
•
•
•
•
Different mission
Different goals
Different objectives
Different business models
Different market base
Different supply channels
Different product generation or service generation processes
Different delivery mechanisms
• So there is no cookie cutter approach to audit planning
www.technodyneuniversity.com
16
What is the operating Environment?
• How business processes are structured to meet business objectives?
• Documents needed to understand
– Mission statement
– Vision statement
– Strategic plans (4‐5 years horizon)
– Annual business plans (one year)
– Annual reports and supplements
– Regulatory filings
www.technodyneuniversity.com
17
Operating Environment cntd.
• Key processes contributing to success of the entity
• Remember that business processes differ
– For each operating unit (BU)
– For each support functions (IT)
– For each entity‐level project (corporate)
www.technodyneuniversity.com
18
Operating Environment cntd.
• Operating units include core processes to meet objectives
– Manufacturing, sales, distribution, services
• Support functions support core operational functions
– Governance, compliance activities, HR, finance, cash management, treasury, procurement
– Oh yes, IT as well ;)
www.technodyneuniversity.com
19
Operating Environment cntd.
• Now you know the business processes
• A business process has three components
– Manual
– IT
– Third party dependency
www.technodyneuniversity.com
20
Operating Environment cntd.
• Our focus here is IT – Business processes need IT application systems
– Business application systems need infrastructure
•
DB, OS, networks, facilities
– Infrastructure needs supporting IT processes
• SDLC, operations, security, change management, problem management and many more
– And lets throw in compliance activities
• Regulatory, financial reporting
– They all have risks elements and contribute to risk‐based audit planning
www.technodyneuniversity.com
21
www.technodyneuniversity.com
22
2. Know the Audit Universe
Audit Universe
• What is audit universe
– Finite and all encompassing collection of audit areas
– Organizational entities
– Locations related to business functions
• Most comprehensive list of audits if CAE had UNLIMITED RESOURCES and TIME ;)
• It is independent of risk assessment
• There are 2 parallel universe ;)
– IT Audit universe and Business Audit universe
www.technodyneuniversity.com
24
Audit Universe
• You have to know what is possible before you know what is feasible • To know the audit universe you should know
– Organization’s objectives
– Business model
– IT support model
www.technodyneuniversity.com
25
Audit Universe
‐ Business Model
• Business Model
– Organization has business objectives
– Operations units and support functions support those objectives
– And each of them has business processes
• Business processes of sales units, marketing units, • Support functions have their own processes
– IT applications support these processes
– Infrastructure supports applications
www.technodyneuniversity.com
26
Audit Universe
‐ Centralized vs. Decentralized
• Centralized functions good for individual audits
– Network audit, Security admn. audit, DBM audit, server admn. audit, help desk audit etc
– These functions, if centralized, are ideal for individual audits – Audit team can cover a lot with a single audit
– Single GC audit paves way for application audits on a platform
www.technodyneuniversity.com
27
Audit Universe
‐ Centralized vs. Decentralized
• Centralized functions good for individual audits
– Centralized audit functions reviewed at least annually
– In decentralized, each location is a different audit at GC level
– In a decentralized environment, with diverse technologies, multiple number of reviews needed
www.technodyneuniversity.com
28
Audit Universe
‐ IT Support Processes
• IT Support Processes
– Infrastructure supported by support processes
– ITIL is the leader in support processes
– Change management, asset management, configuration management, release management, incident management, problem management
– Their effectiveness determines effectiveness of infrastructure to support applications
– Site audit is about “how they are followed and not effectiveness” because standard processes are always affective www.technodyneuniversity.com
29
Audit Universe
‐ Audit Subject Areas?
• What are audit subject areas
– Goal is to create most affective audits and coverage
– Business risk is NOT evaluated at this stage
– Defining too small audit subject areas hinder audit effort
• Because there is admn. overhead for each audit
– Large (long) audits can hinder client productivity
www.technodyneuniversity.com
30
Audit Universe
‐ Audit Subject Areas?
• What are audit subject areas
– There is no right or wrong way, depends upon organization culture
– 2‐3 IT auditors for 3‐4 weeks is appropriate audit size for a subject area
– Need highly technical people for GC audit and general auditors for AC – Management accountability consideration for grouping audit subjects
• Else resolution of audit issues becomes an issue
– Scope of each audit must be defined properly
www.technodyneuniversity.com
31
Audit Universe
‐ Business Applications
• Business audit universe
• IT audit universe
• Business applications usually audited with business audit universe
• And GCs audited as a separate entity
• ERP applications span many business processes
– So, they are given special consideration
www.technodyneuniversity.com
32
Audit Universe
‐ Now the RA
• Now you do risk assessment
• So that you can create a subset of audit universe
• And that is the basis of annual audit plan
www.technodyneuniversity.com
33
3. Perform Risk Assessment
Why Risk Assessment?
• Objectives are related to (this is what business wants from IT)
– Confidentiality
– Integrity
– Availability
– Reliability
– Efficiency
– Effectiveness
– Compliance
www.technodyneuniversity.com
35
What is RA Process?
• RA based on IT risk
– Likelihood
– Impact on the organization
• Audit based on if adequate controls in place to bring risk down to acceptable level
• Audit plan will be based on selecting a subset of universe based on RA
www.technodyneuniversity.com
36
Perform Risk Ranking (RR)…..
• Risk Ranking
– Impact and likelihood of occurrence
– Each risk may not be significant in the audit universe
– Weight differentiates relative importance over others
– E.g. for SOX compliance, an area directly related to accuracy of financial statements carries a higher weight vis‐à‐vis an area not directly related to financial statements
www.technodyneuniversity.com
37
Three RR Techniques ‐ 1
• Direct probability estimates and expected loss functions. Or application of probability to asset value
– Insurance industry uses this method, IT auditors do not
• Based on ALE = SLE x ARO – where SLE = AV x EF
www.technodyneuniversity.com
38
Three RR Techniques ‐ 2
• Observable or measurable factors to measure risk or class of risk
– Good for macro risk assessment not micro risk assessment
– This approach is OK if all auditable units are homogenous in the audit universe
www.technodyneuniversity.com
39
Three RR Techniques ‐ 3
• Weighted or sorted matrices. • Use of threats vs. component metrics
– Good for micro risk assessment
– Weight of component taken into consideration
• All components are not equal
– E.g. web‐facing applications carry more weight than non web‐facing application
– Used for application level risk assessment www.technodyneuniversity.com
40
Likelihood Scale
Likelihood Scale
H
3
High probability that the risk will occur.
M
2
Medium probability that the risk will occur
L
1
Low probability that the risk will occur
www.technodyneuniversity.com
41
Impact Model
• Impact is to business process and not IT
• Different impact models for different organizations
• Impact can be financial, reputational, asset‐
specific, client‐retention specific
www.technodyneuniversity.com
42
Impact Model Scale
Impact Scale (Financial)
H
3
The potential for material impact on the organization’s earnings, assets, reputation, or stakeholders is high.
M
2
The potential for material impact on the organization’s earnings, assets, reputation, or stakeholders may be significant to the audit unit, but moderate in terms of the
total organization.
L
1
The potential impact on the organization is minor in size or limited in scope.
www.technodyneuniversity.com
43
RR Score Model‐ an example
• Refer to the spreadsheet –Financial Impact
–Quality of internal controls
–Changes in audit unit
–Confidentiality, integrity, availability
www.technodyneuniversity.com
44
Recommended Annual Cycle
Level
Composite Risk
Score Range
Recommended
Annual Cycle
H
35–54
Every 1 to 2 years
M
20–34
Every 2 to 3 years
L
6–19
Every 3 to 5 years
www.technodyneuniversity.com
45
ITG Frameworks
• COBIT
– 4 domains and 34 processes
– 218 Control objectives
– CMM scale maturity level for each IT process
– Good for large organizations
• ITIL v.3
– Service strategy, design, transition, operations, continuous improvement
• ISO 27001/27002
www.technodyneuniversity.com
46
Prioritizing Applications
• Business processes are supported by applications
• So, computer applications form the hub of risk‐based audit plan • So, how do you prioritize applications? www.technodyneuniversity.com
47
3A. Prioritizing Applications
Examples of IT‐AC
• 3‐way match for AP
– PO, vendor invoice, recipient of goods/services
• Depreciation of CAPEX is recorded in the correct period
• Received goods are accrued upon receipt only
• SoD based on job function
– Governed by the principle of CARRE
• Goods procured with approved PO
www.technodyneuniversity.com
49
IT‐AC Transaction Audits
• No one person should...
– Initiate the transaction
– Approve the transaction
– Record the transaction
– Reconcile balances
– Handle assets
– Review reports
• ∙ At least two sets of eyes needed
www.technodyneuniversity.com
50
Facts about GCs and ACs
• IT‐ACs depend upon reliability of IT‐GCs
• If GCs are malfunctioning, ACs don’t have any value
– E.g. if change controls are weak, auditing internal processing of application has no value www.technodyneuniversity.com
51
Complex vs. Non‐Complex IT Environment
• Application controls differ in both
• Complex IT Environment’s characteristics
– Source code is developed in‐house – Customized prepackaged software is adapted to organization’s needs
– Changes made to systems, databases, and applications
– Production deployment of pre‐packaged applications, changes, and code
www.technodyneuniversity.com
52
Complex vs. Less‐Complex IT Environment cntd.
• Less‐Complex IT Environment’s characteristics
– Existing IT environment not changed much
– Pre‐packaged software implementation with no major modifications in current year
– User‐configurable options that do not change application functioning
– Not many IT development projects
www.technodyneuniversity.com
53
Complex vs. Non‐Complex IT Environment cntd.
• Less complex environment = more complex auditing – Because less complex environment does not have many inherent or configurable application controls for risk management
• So, degree of transactional or support application will drive scoping, implementation, effort level, and knowledge to perform application control review
• Auditing is about DE and OE of controls
– Less complex environment does not have many controls
www.technodyneuniversity.com
54
Manual Controls vs. IT‐ACs cntd.
• Risk Factor
– Pre‐packaged application does not allow for code changes
– However, application controls within complex ERP (SAP, PeopleSoft) can be disabled w/o code change
– And Packaged applications are ALL parameter driven for control changes
www.technodyneuniversity.com
55
AC and Risk Assessment
www.technodyneuniversity.com
56
Financial Reporting Risks
• Summary (Very important)
Revenue is from Business Units
Payables, payroll, treasury is corporate
But risks are in business processes
Controls are in processes
Processes can span business units
IT‐applications support business processes
IT‐AC are in IT applications Controls are also in underlying technology which is IT‐GC
– Control weakness in any of them can affect financial statement, so we do end‐to‐end audit
–
–
–
–
–
–
–
–
www.technodyneuniversity.com
57
So, How do You do IT‐AC Risk Assessment?
• Define the universe of – Applications supporting processes
– Databases supporting those applications (GC)
– Technology supporting those applications (GC)
• Remember that 3 associated GCs directly affect applications
– Change management
– Logical security
– Operational controls
• Remember that a table change in an application can eliminate controls thus bypassing change management controls for code changes
www.technodyneuniversity.com
58
So, How do You do IT‐AC Risk Assessment?
• Two methods to do risk assessment
– Qualitative
– Quantitative
• Qualitative is subjective
– Risk (1= low impact, 5= high impact)
– Controls (1= strong control, 5= weak control)
– Determine risk and control weights for each of the 10 factors • Quantitative is objective
– Annual < $100,000 is risk level 1
– Annual > $2,000,000 is risk level 5
www.technodyneuniversity.com
59
So, How do You do IT‐AC Risk Assessment?
• Qualitative is subjective (cntd.)
– Calculate (risk factor rating x current risk weight) or (risk factor rating x current control weight) for all 10 risk factors for an application
– Add score for 10 risk factors
– Calculate for all applications that need assessed
– Sort results in descending order of composite score
– Create audit plan based on higher composite risk score
www.technodyneuniversity.com
60
So, How do You do IT‐AC Risk Assessment?
• 10 factors and their weight for each application RA
–
–
–
–
Application contains primary controls (30)
DE of AC (20)
Complex or Less‐complex application (15)
Application deals with privacy issues (20)
• Depends if affected by EuroSOX, GLBA, HIPAA, Turnbull etc.
– Application supports more than one critical business processes (20)
www.technodyneuniversity.com
61
So, How do You do IT‐AC Risk Assessment?
• 10 factors and their weight for each application RA (cntd.)
– Frequency of application change (15)
– Complexity of application change (20)
– Financial impact of change (25)
– Overall effectiveness of IT‐GCs (25)
– Audit history of controls (10)
• Previous audits discovered serious DE and OE deficiencies
www.technodyneuniversity.com
62
Example‐ Application = A/P
Risk Factor Rating
Rating
Risk/Control Rank (1 to 5)
Risk Score App. Has Primary controls
30
4
120
DE of AC
20
3
60
Complex or non‐complex application
15
3
45
Privacy Issues or confidentiality issues
20
1
20
Support > one critical application
20
4
80
Frequency of application change
15
1
15
Complexity of application change
20
4
80
Financial impact of changes
25
5
125
IT‐GC Effectiveness
25
1
25
Audit History of controls
10
5
50
Cumulative Score
Remarks
600
www.technodyneuniversity.com
63
Next step……..
• Note: Total possible cumulative score is 1000. You may change risk factor rating or risk/control factor based on your subjective judgment
• Sort in the descending order of cumulative score
• Select higher score applications based on audit resource availability
• Important: Irrespective of cumulative score, audit will include evaluation of input, processing, and output controls
www.technodyneuniversity.com
64
AC and GC SoD Principles
• GC SoD follow DOPESS principles • AC SoD follow CARRE principles
• Note: Risk Assessment model depends upon may factors. It depends on your environment. We discussed only 10 in our case. There are some of those factors as well (given in the next foil). www.technodyneuniversity.com
65
17 factors for Application Assessment
• This one has 17 factors for Application Assessment:
•
•
•
•
•
•
•
•
•
Quality of internal controls
Economic conditions‐ fraud increases in bad economy
Recent accounting system changes
Time elapsed since last audit
Operational complexity
Operational environment change
Recent changes in key positions
Time in existence
Competitive environment
www.technodyneuniversity.com
66
17 factors for Application Assessment
•
•
•
•
•
•
•
•
Prior audit results
Assets at risk
Transaction volume
Regulatory agency impact
Staff turnover
Impact of application failure
Sensitivity of transactions
Monetary volume
www.technodyneuniversity.com
67
AC Audit Methods
• Business Process Method
– ACs present in all the systems that support particular business process
– BP may span many BUs
– ERP transactional applications arising out of BPR – In non‐ERP applications, review all applications spanning a BP
– Consider downstream and upstream interfaces (aka inbound and outbound interfaces)
www.technodyneuniversity.com
68
AC Audit Methods
• Single Application Method
– Suitable for non‐ERP and non‐integrated environment
– Not a recommended method for ERP applications
• There could be many data feeds going in and coming out of a module
• Difficult to assess ERP with single application
www.technodyneuniversity.com
69
Business Process Method Auditing An Example www.technodyneuniversity.com
70
Four Types of BP Audits
• Mega Process
– End‐to‐end audit or integrated audit
– E.g. in AP, it is procure‐to‐pay process
– Level 1
• Major Process
– One component of mega process
• E.g. one of the AP components
• procurement or receiving or payment of goods – Level 2
www.technodyneuniversity.com
71
Four Types of BP Audits cntd.
• Minor Process
– Component of major process
• E.g. PR and PO sub‐process of procurement process
– Level 3
• Activity
– System transactions that create, modify or delete data in a sub‐process
– Level 4
– IT auditor’s traditional domain
– But levels 1,2,3 are very important
www.technodyneuniversity.com
72
Example of Mega Process Procure‐to‐pay
Level 2
Level 3
Level 4
Procurement
PR and requisition processing
PO Processing
A, C, D
A, C, D
Receiving
Goods (services) receipt processing
Goods return Processing
A, C, D
A, C, D
Accounts Payable
Vendor management
Invoice processing
Credit memo processing
Process payments
Void payments
A, C, D
A, C, D
A, C, D
A, C, D
A, C, D
www.technodyneuniversity.com
73
Example of Mega Process Procure‐to‐pay cntd.
• Highlighted items in previous slide are called “triple control”
• Level 4 is where IT auditor concentrates
• But, if you don’t know level 1,2, and 3, risk is not mitigated because
– Controls at the lower level (level 4) do not compensate for controls at the higher levels
www.technodyneuniversity.com
74
4. Create the Audit Plan
The End Result
• Audit plan a subset of the audit universe
• It is an outcome of risk assessment
• Additions to audit plan from senior management and audit committee
• Everything must be risk based
www.technodyneuniversity.com
76
The Real Audit Plan
• In risk assessment driver is risk, influencer is resources
• In creating audit plan, driver is resources and influencer is risk
www.technodyneuniversity.com
77
Key Activities
Understand
Risks
Risk Assessment
• Obtain explicit input
Driver = Risks
Influencer = Resources
from stakeholders.
• Identify relevant risks.
• Assess risks.
• Prioritize risks.
Key Activities
Audit Plan
Driver = Resources
Influencer = Risks
Allocate
Resources
• Understand universe of
potential
audits subjects.
• Allocate and rationalize
resources.
• Reconcile and finalize
the audit plan.
Objectives For Risk Assessments And Audit Plans
www.technodyneuniversity.com
78
Requests from Stakeholders
• Stakeholder requests from board, audit committee, senior management, operating managers
• Special audit assurance from stakeholders
• Consulting services requests from stakeholders
• Fraud investigations requests come throughout the year
• Consulting engagements to be included in the audit plan
www.technodyneuniversity.com
79
Audit Frequency
• Multiyear plans presented to audit committee and management
• 3 to 5 years is normal for planning
• May need external resources • Annual plan is a subset of multiyear plan
• Audit frequency established at RA time
www.technodyneuniversity.com
80
Frequency vs. Resource Allocation
Priority
Frequency
Resource Allocation
H
Immediate action, usually within the first year Annual reviews or multiple actions within the cycle High allocation M
Mid‐term action within the audit cycle One or several audit engagements within the cycle; could be postponed Base allocation
L
Limited allocation
Audit engagements At most one audit usually not planned engagement planned within the cycle within the cycle Frequency and resource allocation of audit activities
www.technodyneuniversity.com
81
Audit Plan Contents
• Different types of IT audits
• Integrated business process audits
–
–
–
–
–
IT processes (as in COBIT, ISO, and ITIL)
SDLC reviews
Application controls
Technical infrastructure audits
Network audits
• Financial reviews, operational reviews, compliance reviews
• SoD
• New threats and innovations
www.technodyneuniversity.com
82
Integration of IT Auditing
• Low integration IT audit
– Isolated from non‐IT activities
• Partially Integrated
– Associated with business process reviews
– Application reviews
• Highly integrated
– IT audit part of business process engagement
– Multidisciplinary team
www.technodyneuniversity.com
83
Audit Universe
Low‐integrated
Audit Plan
Partially Integrated
Audit Plan
Highly Integrated
Audit Plan
Business Processes
• Operational
• Financial
• Compliance
Non‐IT audit
Non‐IT audit
Integrated approach
Applications Systems
• Application controls
• IT general controls
IT audit
Integrated approach
Integrated approach
IT Infrastructure Controls
• Databases
• Operating systems
• Network
IT audit
IT audit
Integrated approach
IT auditing and integrated auditing
www.technodyneuniversity.com
84
TARGETED RESULT
T
O
T
A
L
AUDIT RESOURCES
HIGH
A
U
DI
T
U
NI
V
E
R
S
E
Consider
alternative audit
approach (CSA)
LOW
Chart of targeted audit results
www.technodyneuniversity.com
85
Audit Plan –
A Living Document
• New threats and new vulnerabilities evolve
• IT has higher rate of change than non‐IT activities
• New technologies‐ e‐commerce, web applications
• Therefore, audit plan is a living document
www.technodyneuniversity.com
86
Executive buy‐in and Plan Approval • Audit plan presented to audit committee and senior management
• Also discussed with CIO, CTO, IT managers, business application owners
• Client interaction during RA is important • Buy‐in brings cooperation, hence value to the organization
www.technodyneuniversity.com
87
Questions
www.technodyneuniversity.com
88