IT Controls and COBIT

25 downloads 130 Views 594KB Size Report
generally accepted Information. Technology Control Objectives for day-to-day use by business and. IT managers and the auditors.” COBIT Mission ...
Our mission is to build relationships and develop innovative solutions which help dynamic people and organizations to create and realize value...

IT Controls and COBIT Presentation © 2004 Wöll Consulting, CH-8807 Freienbach

Homepage: www.woell.ch Email: [email protected] Tel: +41 55 420 12 72

Changing Emphasis

Ten years ago we were afraid of rockets destroying computing centres..........

..........right now, we should be aware of software errors destroying rockets ! Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 2

Content

 Overview of COBIT  General understanding of COBIT  Gain an understanding of IT controls and control objectives

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 3

Structur of COBIT (3rd ed)

Executive Summary

Framework

Senior Executives (CEO, CIO) “There is a Method...”

Senior Operational Management “The Method Is...”

Implementation Tool Set Director, Middle Management “Here’s How You Implement...”

Management Guidelines Director, Middle Management “Here’s How You Measure...”

Control Objectives Middle Management “Minimum Controls Are...”

Audit Guidelines Line Management, Controls Practitioner “Here’s How You Audit...”

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 4

COBIT Mission

“To research, develop, publicise and promote an authoritative, upto-date, international set of generally accepted Information Technology Control Objectives for day-to-day use by business and IT managers and the auditors.”

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 5

The Framework’s Principles

Linking the management’s IT expectations with the management’s IT responsibilities

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 6

COBIT Overview • Board • User / Business Owner • Auditor • IT Manager

IT-Processes

Information Technology

“ Black-box IT ”

IT-Resources • People • Applications • Technolgies • Facilities • Data

COBIT FRAMEWORK OF CONTROLS

• Planning & Organisation • Acquisition & Implementation • Delivery & Support • Monitoring

InformationCriteria Criteria Information • Quality • Fiduciary • Security

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 7

What‘s a control?

Control “The policies, procedures, practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected.” IT Control Objective “A statement of the desired result or purpose to be achieved by implementing control procedures in a particular IT activity.” Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 8

Example

Control • policies and directives for the user authorization process i.e. directive to use the ‘4-eyes principle’ in the user authorization processes, segregation of duties in the organization) • periodically audits of the user rights in specific (most critical) applications, systems and facilities Control objective • to take sure, that only autorized users has access rights to critical applications, systems and facilities

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 9

The COBIT Cube Cobit = Control Objectives for Information and related Technology

Information Criteria

ity r u c Se Applications Technology Facilities Data

y r a i c du i F

Domains

so ur c

es

Processes

People

Activities

ITRe

IT Processes

y la it Qu

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 10

Information criteria Business Requirements

Quality





Security

  

Fiduciary





Effectiveness deals with information being relevant and pertinent to the business process as well as being delivered in a timely, correct, consistent and usable manner. Efficiency concerns the provision of information through the optimal (most productive and economical) usage of resources. Confidentiality concerns protection of sensitive information from unauthorized disclosure. Integrity relates to the accuracy and completeness of information as well as to its validity in accordance with the business' set of values and expectations. Availability relates to information being available when required by the business process, and hence also concerns the safeguarding of resources. Compliance deals with complying with those laws, regulations and contractual arrangements to which the business process is subject; i.e., externally imposed business criteria. Reliability of information relates to systems providing management with appropriate information for it to use in operating the entity, in providing financial reporting to users of the financial information, and in providing information to report to regulatory bodies with regard to compliance with laws and regulations.

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 11

IT Resources  Data: Data – Data objects in their widest sense, i.e., external and internal, structured and non-structured, graphics, sound, etc.

 Application ApplicationSystems: Systems – understood to be the sum of manual and programmed procedures.

Technology  Technology – covers hardware, operating systems, database management systems, networking, multimedia, etc..

 Facilities: Facilities – Resources to house and support information systems.

People  People: – Staff skills, awareness and productivity to plan, organise, acquire, deliver, support and monitor information systems and services.

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 12

IT Processes

4

Domains

34

Processes

318

Activities (Controls)

>3000

Control Questions

 Natural grouping of processes, often matching an organisational domain of responsibility.  A series of joined activities with natural (control) breaks.  Actions needed to achieve a measurable result. Activities have a life-cycle whereas tasks are discreet.

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 13

Example of a control DS Delivery & Support … DS 5 Ensure Systems Security DS 5.1 Manage Security Measures DS 5.2 Identification, Authentication and Access DS 5.3 Security of Online Access to Data DS 5.4 User Account Management DS 5.5 Management Review of User Accounts DS 5.6 User Control of User Accounts DS 5.7 Security Surveillance DS 5.8 Data Classification DS 5.9 Central Identification and Access Rights Management DS 5.10 Violation and Security Activity Reports DS 5.11 Incident Handling DS 5.12 Re-Accreditation DS 5.13 Counterparty Trust DS 5.14 Transaction Authorisation DS 5.15 Non-Repudiation DS 5.16 Trusted Path DS 5.17 Protection of Security Functions DS 5.18 Cryptographic Key Management DS 5.19 Malicious Software Prevention, Detection and Correction DS 5.20 Firewall Architectures and Connections with Public Networks DS 5.21 Protection of Electronic Value

Control Objectives 

The information services function’s security administration should assure that violation and security activity is logged, reported, reviewed and appropriately escalated on a regular basis to identify and resolve incidents involving unauthorised activity.



The logical access to the computer resources accountability information (security and other logs) should be granted based upon the principle of least privilege, or need to know.

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 14

Planning & Organisation IT Domain

PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PO 11

Define a Strategic IT Plan Define the Information Architecture Determine the Technological Direction Define the IT Organisation and Relationships Manage the IT Investment Communicate Management Aims and Direction Manage Human Resources Ensure Compliance with External Requirements Assess Risks Manage Projects * Strategy and tactics for IT contribution Manage Quality * Meeting business objectives * Appropriately planned, communicated and managed * Proper organisation and technological infrastructure Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 15

Acquisition & Implementation IT Domain

AI 1

Identify Solutions

AI 2 AI 3 AI 4 AI 5 AI 6

Acquire and Maintain Application Software Acquire and Maintain Technology Architecture Develop and Maintain IT Procedures Install and Accredit Systems Manage Changes

* Realization of IT strategy * Solutions identified, developed, or acquired and implemented * Solutions integrated into business process * Change and maintenance of systems Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 16

Delivery and Support IT Domain

DS 1 DS 2 DS 3 DS 4 DS 5 DS 6 DS 7 DS 8 DS 9 DS 10 DS 11 DS 12 DS 13

Define Service Levels Manage Third-Party Services Manage Performance and Capacity Ensure Continuous Service Ensure Systems Security Identify and Attribute Costs Educate and Train Users Assist and Advise IT Customers Manage the Configuration Manage Problems and Incidents * Actual delivery of required services Manage Data * Actual operations through security including training Manage Facilities * Establishment of support processes * Actual processing of data by applications Manage Operations Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 17

Monitoring IT Domain

M 1 Monitor the Processes M 2 Assess Internal Control Adequacy M 3 Obtain Independent Assurance M 4 Provide for Independent Audit

* Regular assessment of all IT processes * Compliance with and quality of controls Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 18

The Framework’s Principles

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 19

Control Objectives

Summary Table

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 20

Control Objectives

Example

ENSURING SYSTEMS SECURITY (DS-5)

P P

P P

S S

S S

S S

IT Resources pe a p opl e pl ic at io te ch ns no l fa ogy ci lit ie da s ta

ef fe c

tiv e ef fic nes s co i e nf nc y id en in tial te ity g r av ai i ty l co abil ity m pl i re anc lia e bi lit y

Information Criteria

 



Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

 

Page 21

Link the control to the business requirement Control over the IT process of ENSURING SYSTEMS SECURITY (DS-5)

that satisfies the business requirement to safeguard information against unauthorized use, disclosure or modification, damage or loss

is enabled by Logical access controls which ensure that access to systems, data and programs is restricted to authorized users

and takes into consideration: •authorisation & authentication •User profiles and identification •trusted path, firewalls •virus prevention and detection •cryptographic key management •incident handling, reporting and follow up

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 22

Adopt COBIT? Why Should an Organisation

      

Attention on Corporate Governance Management accountability for resources Specific need for control of IT resources Business oriented solutions Framework for risk assessment Authoritative basis Improved communication among management, users and auditors

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 23

A Product For Many Audiences

        

IT manager Auditor Executive manager Business manager Project manager Developer Operations User Information security officer Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 24

Who needs COBIT ?

 Management needs COBIT – to evaluate IT investment decisions – to balance risk and control of investment in an often unpredictable IT environment – to benchmark existing and future IT environment

 Users need COBIT – to obtain assurance on security and controls of products and services provided by internal and third-parties.

 IS auditors need COBIT – to substantiate opinions to management on internal controls – to answer the question: What minimum controls are necessary?

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 25

COBIT for the …

IT Manager

COBIT could serve objectives for you…

Some specific approaches which could prove useful...

Use the COBIT process model and detailed control objectives to structure IT services function into manageable and controllable processes focusing on business contribution policies and norms

Use the COBIT control model to establish SLA’s and communicate with business functions Use the COBIT control model as basis for process-related performance measures and IT-related Use COBIT as baseline model to establish the appropriate level of control objectives and external certifications

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 26

COBIT for …

Auditors

COBIT could serve the following objectives for you…

Some specific approaches which could prove useful...

As basis for determining the IT audit universe and as IT control reference

Use COBIT as criteria for review review and examination, and for framing IT-related audits The objectives of auditing are to: • provide management with reasonable assurance that control objectives are being met; • where there are significant control weaknesses, • to substantiate the resulting risks; and • advise management on corrective actions. Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 27

Auditors

COBIT for … Audit Guidelines

The process is audited by:  Obtaining an understanding of business requirements, related risks, and relevant control measures  Evaluating the appropriateness of stated controls  Assessing compliance by testing whether the stated controls are working as prescribed, consistently and continuously  Substantiating the risk of the control objectives not being met by using analytical techniques and/or consulting alternative sources. Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 28

Auditors

COBIT for … Generic Audit Guideline

 Gain an understanding of: – – – – – –

Business requirements Organisation structure Roles and responsibilities Policies and procedures Laws and regulations Control measures in place

 Evaluate the controls – – – –

Documented processes Appropriate deliverables Responsibility/accountability Compensating controls

 Assess compliance – – – –

procedures process deliverables Determine level of testing provide assurance that the IT process is adequate

 Substantiate the risk – control weaknesses – actual and potential impact

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 29

COBIT for the …

Executive Manager

COBIT could serve the following objectives for you… Accept and promote COBIT as general IT governance model for all enterprises within enterprise

Some specific approaches which could prove useful... Use COBIT to compliment existing internal control framework Use COBIT process model to establish common language between business and IT; allocate clear responsibilities

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 30

COBIT for the …

Business Manager

COBIT could serve the following objectives for you… Use COBIT to establish a common entity-wide model to manage and monitor IT’s contribution to the business

Some specific approaches which could prove useful... Use COBIT control objectives as a code of good practice for dealing with IT within the business function Use COBIT control objectives to determine needs to be covered by Service Level Agreements (internal or outsourced)

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 31

COBIT for the …

Project Manager

COBIT could serve the following objectives for you… As a general framework for minimal project and quality assurance Standards

Some specific approaches which could prove useful... Use COBIT to help ensure that project plans incorporate generally accepted phases in IT planning, acquisition and development, service delivery and project management, and assessment

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 32

COBIT for the …

Developer

COBIT could serve the following objectives for you… As minimal guidance for controls to be applied within development processes as well as for internal control to be integrated in information systems being built

Some specific approaches which could prove useful... Use COBIT to ensure that all applicable IT control objectives in the development project have been addressed

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 33

COBIT for …

Operations

COBIT could serve the following objectives for you… As general framework for minimal controls to be integrated into service delivery and support processes, placing clear focus on client objectives

Some specific approaches which could prove useful... Use COBIT to ensure that operational policies and procedures are sufficiently comprehensive

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 34

COBIT for …

Users

COBIT could serve the following objectives for you… As minimal guidance for internal control to be integrated within information systems, being fully operational or under development

Some specific approaches which could prove useful... Use COBIT to guide service level agreements

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 35

COBIT for the …

Security Officer

COBIT could serve the following objectives for you… As harmonising framework providing a way to integrate information security with other business related IT objectives

Some specific approaches which could prove useful... Use COBIT to structure the information security program, policies and procedures

Homepage: www.woell.ch Email: [email protected] Tel: +41 43 888 90 19

Page 36