KL - Business Continuity Management Audit Work Program (3 Samples)
KL - Business Continuity Management Audit Work Program (3 Samples)
Planning
Fieldwork
PRELIMINARY STEPS
Schedule kickoff meetings and exit meetings. Collect the following information:
• Business continuity policy/plan (BCP)
• Board presentations covering the business continuity program.
• Disaster recovery plans for all core systems, applications and voice/data telecommunications.
• IT disaster recovery test reports, including objectives, scenarios, test scripts, and log of any issues
encountered and how they were resolved.
• Business-focused business continuity plans, including manual workarounds, plans to relocate personnel or
business processes, and plans to restore lost electronic and paper records.
• Business continuity exercise reports, including objectives, scenarios, test scripts, and log of any issues
encountered and how they were resolved.
• Strategic-level crisis management plans used by executives to manage the institution’s overall response to an
event.
• Crisis communication plans used for internal and external audiences.
• Employee call tree or other tools used to communicate with staff timely.
• Any plans related to how the institution would attend to the human impact (to its employees and their
dependents) following an event.
• Business continuity-related training programs and documentation.
• Recent SAS 70 report(s).
• Records retention policy, off-site storage program and documentation demonstrating compliance.
• Business continuity program strategic plan, schedule, and budget information.
• Business continuity program maintenance records.
• Plans regarding continuity planning with technology services providers.
• Contracts for any disaster recovery service providers.
• Business continuity-related risk assessments, including natural hazards information.
2 Source: www.knowledgeleader.com
EXAMINATION SCOPE AND OBJECTIVES
Objective: Determine examination scope and objectives for reviewing the business continuity planning program.
3 Source: www.knowledgeleader.com
Time Task Initial Index
4 Source: www.knowledgeleader.com
Time Task Initial Index
Determine if the board reviews and approves the written BCP and
testing results at least annually and documents these reviews in the
board minutes.
Ensure that the risk assessment and BIA have been reviewed and
approved by senior management and the board.
5 Source: www.knowledgeleader.com
Time Task Initial Index
RISK MANAGEMENT
Objective: Determine if appropriate risk management over the business continuity process is in place.
6 Source: www.knowledgeleader.com
Time Task Initial Index
TESTING
Objective: Determine whether the BCP includes appropriate testing to ensure that the business processes will be
maintained, resumed and/or recovered as intended.
7 Source: www.knowledgeleader.com
Time Task Initial Index
• Backup system and data files are used while maintaining off-site
backup copies for use in case of an event concurrent with the
testing.
• Internal audit reviews and participates.
• A post-test analysis report and review process are conducted
that include a comparison of test results to the original goals.
• Corrective action plans are developed for all problems
encountered.
• A board of directors’ review is performed.
8 Source: www.knowledgeleader.com
IT DOCUMENTATION
Objective: Determine if the information technology environment has a properly documented BCP that
complements the enterprisewide and other departmental BCPs.
Verify that the IT BCP properly supports and reflects the goals and
priorities found in the business unit BCP.
9 Source: www.knowledgeleader.com
Time Task Initial Index
Objective: Determine whether the BCP includes appropriate preparation to ensure that the data center recovery
processes will work as intended.
10 Source: www.knowledgeleader.com
Time Task Initial Index
11 Source: www.knowledgeleader.com
CRITICAL OUTSOURCED ACTIVITIES
Objective: Determine whether the BCP addresses critical outsourced activities.
CONCLUSIONS
Objective: Discuss corrective action and communicate findings.
12 Source: www.knowledgeleader.com
Time Task Initial Index
FINAL STEPS
13 Source: www.knowledgeleader.com
BUSINESS CONTINUITY MANAGEMENT AUDIT WORK
PROGRAM: SAMPLE 2
Planning
Fieldwork
Examination Objective: Determine the quality and effectiveness of the organization’s business continuity
planning process. These procedures will disclose the adequacy of the planning process for the organization to
maintain, resume and recover operations after disruptions ranging from minor outages to full-scale disasters. This
work program can be used to assess the adequacy of the business continuity planning process enterprisewide or
across a particular line of business. Depending on the examination objectives, a line of business can be selected
to sample how the organization’s continuity planning process works on a micro-level or for a particular business
function or process.
This work program is intended to be comprehensive and assist examiners in determining the effectiveness of a
financial institution’s business continuity planning process. However, examiners may choose to use only particular
components of the work program based on the size, complexity and nature of the institution’s business.
The objectives and procedures are divided into Tier I and Tier II:
• Tier I assess an institution’s process for identifying and managing risks.
• Tier II provides additional verification where risk is evident.
Tier I and Tier II objectives and procedures are intended to be a toolset examiners may use when selecting
examination procedures for their particular examination. Examiners should use these procedures as necessary to
support examination objectives.
Review Process: For each of the review area, process owners must document the status of each control
objectives listed in the audit steps. Each control maturity must be ranked according to the scale detailed below.
Once the process has been completed and submitted to management, they can create a remediation plan to
address each of the items.
Maturity Model
The scale is based on the Capability Maturity Model with generic definitions from COBIT.
0 Non-Existent: Recognizable processes are completely lacking. The enterprise has not even recognized
that there is an issue to be addressed.
1 Initial/Ad Hoc: There is evidence that the enterprise has recognized that the issues exist and need to be
addressed. There are, however, no standardized processes; instead, there are ad hoc approaches that
tend to be applied individually or case-by-case.
14 Source: www.knowledgeleader.com
Maturity Model
2 Repeatable but Intuitive: Processes have developed to the stage where similar procedures are followed
by different people undertaking the same task. There is no formal training or communication of standard
procedures, and responsibility is left to the individual. Individual knowledge is relied on heavily and,
therefore, errors are likely.
3 Defined Process: Procedures have been standardized and documented and communicated through
training. It is mandated that these processes should be followed; however, it is unlikely that deviations will
be detected. The procedures themselves are not sophisticated but are the formalization of existing
practices.
4 Managed and Measurable: Management monitors and measures compliance with procedures and takes
action where processes appear to not be working effectively. Processes are under constant improvement
and provide good practice. Automation and tools are used in a limited or fragmented way.
5 Optimized: Processes have been refined to a level of good practice, based on the results of continuous
improvement and maturity modeling with other enterprises. IT is used in an integrated way to automate the
workflow, providing tools to improve quality and effectiveness, making the enterprise quick to adapt.
15 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
process.
• Any material changes in the audit program, scope or
schedule related to business continuity activities.
• IT environments and changes to configuration nor
components.
• Changes in key service providers (technology,
communication, backup/recovery, etc.) and software
vendors.
• Any other internal or external factors that could affect
the business continuity process.
Objective 2: Determine the quality of business continuity plan oversight and support provided by the board of
directors and senior management.
16 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
Objective 3: Determine whether an adequate business impact analysis (BIA) and risk assessment have been
completed.
17 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
• Pandemics
Objective 4: Determine whether appropriate risk management over the business continuity process is in place.
18 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
19 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
Objective 5: Determine the existence of an appropriate enterprisewide business continuity plan (BCP).
20 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
Objective 6: Determine whether the BCP includes appropriate hardware backup and recovery.
21 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
22 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
23 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
24 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
Objective 10: Determine whether the BCP testing program is sufficient to demonstrate the financial institution’s
ability to meet its continuity objectives.
Testing Policy
Testing Strategy
25 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
objectives.
26 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
documented.
27 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
28 Source: www.knowledgeleader.com
Objective 11: Discuss corrective action and communicate findings.
29 Source: www.knowledgeleader.com
The procedures provided in this section should not be construed as requirements for control implementation. The
selection of controls and control implementation should be guided by the risk profile of the institution. Therefore,
the controls necessary for any single institution or any given area may differ from those noted in the following
procedures.
Objective 1: Determine whether the testing strategy addresses various event scenarios, including potential
issues encountered during a wide-scale disruption:
30 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
31 Source: www.knowledgeleader.com
Audit Steps Status Maturity Action Plan
32 Source: www.knowledgeleader.com
BUSINESS CONTINUITY MANAGEMENT AUDIT WORK
PROGRAM: SAMPLE 3
EXAMINATION OBJECTIVE
Assess the quantity of risk and the effectiveness of the institution’s risk management processes as they relate to
the security measures instituted to ensure confidentiality, integrity and availability of information and to instill
accountability for actions taken on the institution’s systems. The objectives and procedures are divided into Tier 1
and Tier II:
• Tier I assesses an institution’s process for identifying and managing risks.
• Tier II provides additional verification where risk warrants it.
Tier I and Tier II are intended to be a tool set examiners will use when selecting examination procedures for their
particular examination. Examiners should use these procedures as necessary to support examination objectives.
Internal audit provided a maturity ranking for each of the audit steps listed in the eight objectives of the FFIEC
standard. Internal audit used the Capability Maturity Model scale for ranking each audit step. The scale is
provided below with generic definitions from COBIT 4.1.
Maturity Model
The scale is based on the Capability Maturity Model with generic definitions from CobiT 4.1.
Nonexistent: Complete lack of any recognizable processes. The enterprise has not even recognized that
0
there is an issue to be addressed.
Initial/Ad Hoc: There is evidence that the enterprise has recognized that the issues exist and need to be
1 addressed. There are, however, no standardized processes; instead, there are ad hoc approaches that
tend to be applied on an individual or case-by-case basis. The overall approach.
Repeatable but Intuitive: Processes have developed to the stage where similar procedures are followed
by different people undertaking the same task. There is no formal training or communication of standard
2
procedures, and responsibility is left to the individual. There is a high degree of reliance on the knowledge
of individuals and, therefore, errors are likely.
Defined Process: Procedures have been standardized and documented and communicated through
training. It is mandated that these processes should be followed; however, it is unlikely that deviations will
3
be detected. The procedures themselves are not sophisticated but are the formalization of existing
practices.
Managed and Measurable: Management monitors and measures compliance with procedures and takes
4 action where processes appear not to be working effectively. Processes are under constant improvement
and provide best practices. Automation and tools are used in a limited or fragmented way.
Optimized: Processes have been refined to a level of good practice, based on the results of continuous
5 improvement and maturity modeling with other enterprises. IT is used in an integrated way to automate the
workflow, providing tools to improve quality and effectiveness, making the enterprise quick to adapt.
33 Source: www.knowledgeleader.com
OBJECTIVE 1: DETERMINE THE APPROPRIATE SCOPE FOR THE EXAMINATION.
34 Source: www.knowledgeleader.com
OBJECTIVE 2: DETERMINE THE COMPLEXITY OF THE INSTITUTION’S INFORMATION
SECURITY ENVIRONMENT.
35 Source: www.knowledgeleader.com
Audit Steps Status Maturity Recommendations
the institution
• Identified all reasonably foreseeable threats to the
financial institution assets
• Analyzed its technical and organizational vulnerabilities
• Considered the potential effect of a security breach on
customers as well as the institution
Determine whether the risk assessment provides
adequate support for the security strategy, controls and
monitoring that the financial institution has implemented.
Evaluate the risk assessment process for the
effectiveness of the following key practices:
• Multidisciplinary and knowledge-based approach
• Systematic and centrally controlled
• Integrated process
• Accountable activities
• Documented
• Knowledge enhancing
• Regularly updated
Identify whether the institution effectively updates the risk
assessment prior to making system changes,
implementing new products or services, or confronting
new external conditions that would affect the risk analysis.
Identify whether, in the absence of the above factors, the
risk assessment is reviewed at least once a year.
36 Source: www.knowledgeleader.com
Audit Steps Status Maturity Recommendations
• Network Access
− Security domains
− Perimeter protection, including firewalls,
malicious code prevention, outbound filtering and
security monitoring
− Appropriate application access controls
− Remote access controls, including
wireless, VPN, modems and internet-based
• Host Systems
− Secure configuration (hardening)
− Operating system access
− Application access and configuration
− Malicious code prevention
− Logging
− Monitoring and updating
• User Equipment
− Secure configuration (hardening)
− Operating system access
− Application access and configuration
− Malicious code prevention
− Logging
− Monitoring and updating
• Physical controls over access to hardware, software,
storage media, paper records and facilities
• Encryption controls
• Malicious code prevention
• Software development and acquisition, including
processes that evaluate the security features and
software trustworthiness of code being developed or
acquired, as well as change control and configuration
management
• Personnel security
• Media handling procedures and restrictions, including
procedures for securing, transmitting and disposing of
paper and electronic information
• Service provider oversight
• Business continuity
• Insurance
Evaluate the policies and standards against the following
key actions:
• Implementing through ordinary means, such as system
administration procedures and acceptable-use policies
• Enforcing with security tools and sanctions
37 Source: www.knowledgeleader.com
Audit Steps Status Maturity Recommendations
• Delineating the areas of responsibility for users,
administrators and managers
• Communicating in a clear, understandable manner to
all concerned
• Obtaining employee certification that they have read
and understood the policy
• Providing flexibility to address changes in the
environment
• Conducting annually a review and approval by the
board of directors
38 Source: www.knowledgeleader.com
Audit Steps Status Maturity Recommendations
Evaluate the institution’s monitoring plans for
appropriateness given the risks of the institution’s
environment.
39 Source: www.knowledgeleader.com
Audit Steps Status Maturity Recommendations
Determine whether security responsibilities are
appropriately apportioned among senior management,
front-line management, IT staff, information security
professionals and other staff, recognizing that some roles
must be independent of others.
Determine whether the individual or department
responsible for ensuring compliance with security policies
has sufficient position and authority within the organization
to implement the corrective action.
Evaluate the process used to monitor and enforce policy
compliance (e.g., granting and revocation of user rights).
Evaluate the adequacy of automated tools to support
secure configuration management, security monitoring,
policy monitoring, enforcement and reporting.
Evaluate management's ability to effectively control the
pace of change to its environment, including the process
used to gain assurance that changes to be made will not
pose undue risk in a production environment. Consider the
definition of security requirements for the changes,
appropriateness of staff training, quality of testing and
post-change monitoring.
Evaluate the coordination of incident response policies
and contractual notification requirements.
40 Source: www.knowledgeleader.com
41 Source: www.knowledgeleader.com