IS Audit Checklist in Excel
IS Audit Checklist in Excel
B.Effectiveness of IS Policy
1 Whether a well-documented Organisation specific security policy is available?
2 Whether Inventory management of IT assets is made part of IS policy ?
3 Whether policies related to all the IT activities are listed in the security policy?
4 Whether Policy takes into account the all Legal & Regulatory requirements?
5 Whether the policy is approved and updated from time to time by the Board of Directors/
Top Management?
6 Whether the policy is communicated to all concerned Departments and is understood by
them?
7 Whether the following major security areas are covered in the IS Policy?
a) PC, LAN, MAN and WAN security?
b) Physical Security to IS establishments?
c) Handling of confidential information?
d) Handling of security incidents?
e) Privacy related issues for outside entities?
f) E-mail security?
g) Application security?
h) Interface Security?
i) Password Security?
j) Operating system security, web site security?
k) Database security?
l) Anti virus and piracy policy?
m) Archived and Backed up data security?
n) Procedures for handling incidence of security breach/ violation?
o) Disaster Recovery Plan/ Business Continuity Plan?
p) Persons responsible for implementing security policy and consequence for willful
violation of the Security Policy?
8 Whether a review process is in place for reviewing the IS policy at periodic intervals
and /or on any other major event?
c) Does the Bank have a system of floating formal RFP (Request for Proposal) for systems
with estimated budget exceeding a certain amount?
d) Is there any separate Cell/Team comprising of personnel from IT Department,
Functional Departments and Internal Audit Department in charge of vendor selection and
implementation?
e) Does Team use prepared check lists for?
-Product Evaluation
-Site Visits
-Client Reference
f) Is final evaluation and selection fully documented and the document clearly reflect the
rationale used for the selection?
5 Contracting with vendor:
a) Does the bank have approved terms and conditions for Product Licensing Agreements?
b) Does the Bank have a Service Level Agreement with Product Vendors for Support and
Maintenance?
c) Does the contract clearly segregate duties and responsibilities of the Bank and the
Vendor?
d) Does the contract include a clause to protect the Bank from the Vendor using the bank
data?
e) Does the contract clearly specify the product base lines?
6 Implementation of Packaged software:
a) Is variance analysis between the requirement and the selected product carried out and
documented?
b) Does the Bank’s policy provide for parallel run of previous system during the
implementation period?
c) Is there an agreed plan for implementation? Has the plan been approved by the Vendor
and IT Department?
d) Does the implementation plan clearly identify product customisation requirements,
user acceptance criteria and test for such customisation?
e) Does the implementation plan address data migration from previous systems?
f) Is there a list of areas which will be controlled by the Vendor during the implementation
phase?
g) Does Bank have a test environment to simultaneously allow familiarisation during the
implementation process?
h) If there are bugs and errors due to design flaws, are they escalated to higher levels?
i) Is there a clearly identified data integration strategy during customisation period?
7 Post implementation issues:
a) Has the IT Department in consultation with User Department worked out Database
Controls?
b) Has IT Department introduced a system to track problems reported by Users,
escalation to vendor and their resolution?
c) Is there a system of measuring vendors’ support with the agreed service levels?
E.Development of software- In House/ Outsourced
i) In House
1 Is the Software audit (SA)-(Detailed guidelines given in RBI circular) conducted using pre-
designed formats at three levels i.e Program level , Application level and Organization
level?
2 Has IT department adopted any Standardised quality processes such as ISO, SEI CMM etc.,
for Software development?
3 Has Non compliance reported in such quality audit are properly attended to and rectified?
4 Whether a structure is in place for effective Software Audit so that reliable results can be
obtained?
ii) Outsourcing
1 For software development outsourcing, are there laid down criteria for selection of
vendors?
2 Whether formal outsourcing strategy for necessary interface with the vendor is in place?
3 List out the events that cause the transaction to be generated (e.g. input of a parameter
such as a date, attainment of a condition, etc.), the key data used as a basis for the
generation, and the programmed procedures that perform the generation. (e.g., in the
interest calculation process, generally, the user will run the interest run job and the
system will take the customer balances (key data) and apply interest rates (key data) and
debit/credit the interest. The program, which performs these activities, should be logically
sound so that no processing errors are introduced).
4 Where applicable, whether the key data is authorised by appropriate level of users and
kept secure?
5 For the programmed procedure that generates the data, if user controls are relied on to
check the accuracy of the generation process, are these controls adequate?
6 Are there adequate procedures to investigate and correct any differences or exceptions
identified by the controls over the completeness and accuracy of generation?
7 If the process has to be done only once, does the software ensure that the process is not
executed more than once?
8 Is there any day begin, day end process? If so, are these processes logically sound to carry
out the designed objectives completely and accurately?
9 Does the software ensure sequencing of processes? i.e., does the software ensure that
processes are not initiated out of sequence?
10 Whether the application is able to handle processing at peak times (e.g. is the application
capable of handling progressively increasing volumes)?
iv) Output Controls
1 Whether the format, contents, accuracy and utility of the reports generated by the
system are accurate?
2 Is there is any provision for generating exception transactions statement from the
system?
3 Whether outputs can be viewed/generated by users only on need to know basis. In other
words, check whether outputs cannot be generated by all and sundry users in the
system?
4 Whether the controls exercised by the users on the generation, distribution,
authentication and preservation of computer outputs are adequate?
5 Whether the application is keeping adequate controls over computer generated outputs
lying in print queue/spool?
6 Does the output contain key control information necessary to validate the accuracy and
completeness of the information contained in the report such as last document reference,
period, etc.?
7 If the data has to be transferred from one process to another process,Whether it is
ensured that no manual intervention is possible and no unauthorised modification to data
can be made?
v) Authentication Controls
1 If the data has to be transferred from one process to another process, verify if no manual
intervention is possible and no unauthorised modification to data can be made?
2 Does the software prevent the same user from performing both the functions of entering
a transaction and verifying the same?
3 If transactions are authorised manually, are there controls to ensure that a) they are
properly authorised by an independent and responsible official and b) no unauthorised
alterations are made to authorised transactions?
4 Whether hash total is used to verify the continued integrity of data? Is the total of the
items on data file regularly reconciled to an independently established total (e.g.
agreement to a manual control account or computer agreement to a control record) on a
suitable timely basis to ensure that there is no tampering of data?
5 Verify whether the entire record after commit can be physically deleted (it should not be
allowed)?
6 If the software keeps record of security items, are there adequate controls to ensure the
complete and accurate recording of security items in the system?
7 Are the programmed procedures, which utilise the security items in the system, logically
sound so that there are no errors?
H. Database Controls
1 Whether Database is physically secure and free of any corruption?
2 Whether Access to the database is restricted and permitted only to authorized personnel?
c) Whether all e-mails are identified with a user’s name or e-mail ID to facilitate tracking?
Whether e-mail ID allotted to a user is prevented from being used by another user?
d) Whether there are procedures to ensure that users do not send confidential or
sensitive information via e-mail? Whether the information transmitted through e-mail is
encrypted?
e) Whether all e-mails sent and received by employees via Bank’s network are treated as
Bank’s records? Is there procedure to monitor them?
6 PC Security related:
a) Does the LAN servers, mail servers, and microcomputers have IT Department approved
anti-virus products installed?
b) Are all product/service specific PCs secured against removal and theft commensurate
with the value of the computer and information it holds along with a process to report
any thefts to the IT Department?
c) Are all PCs having sensitive information protected with power on password to prevent
unauthorised access?
7 Audit Trails:
a) Does the financial transactions as well as additions, changes and deletions to client
demographic data/important statistics, get recorded in the product/service audit trail?
b) Does the audit trail for product/service record all identification and authentication
processes? Also Is there a retention period for the Audit trails
c) Is there a process to log and review all actions performed by systems operators,
systems managers, system engineers, system administrators, security administrators, and
highly privileged IDs.?
8 Information storage and retrieval:
a) Has all the media (File/Pendrives/Disks etc) under the control of the product/service
owner been marked with the classification and securely stored with access restricted to
authorized personnel only?
b) Is there a procedure in place that enforces and maintains a clean desk program, which
secures all critical information from unauthorized access?
9 Penetration testing:
a) Is it ensured that products/services that use the Internet for connectivity or
communications have undergone a successful penetration test prior to production
implementation?
b) Is there an intrusion detection system in place for all the external IP connections?
J.Maintenance
1 Back up and Recovery:
a) Whether a latest copy of backup of software (Operating System, RDBMS, application,
etc.) is taken and preserved at the user site?
b) Whether different types of data backup are taken periodically at specified intervals as
advised by the software developer / vendor?
c) Are there proper records for noting the media in which different data backups are
stored, data type, location where it is stored, date of backup, due date for recycle, etc?
d) Is one copy of data backup kept in an offsite location with proper records?
e) Does the database / system administrator at the user site carry out restoration testing
of these backups periodically? Is it recorded and authenticated?
e) Is there any archival policy and data housekeeping is as per this policy?
2 Hardware Mantenance:
a) Is there any Service Level Agreement between the hardware vendor and
IT Department?
b) Does the AMC with the vendor for maintenance of hardware
equipments is active and currently in force?
c) Does the user site have the names and photographs of the service personnel and are
they identified by the users before allowing them to handle the hardware?
d) Verify whether the hardware inventory is maintained at the user site. Ensure whether
the physical stock of hardware items matches with the hardware inventory?
e) Whether the hardware maintenance register is maintained, with full details such as
nature of trouble, date and time of reporting, name of the vendor, Engineer’s name, date
etc?
f) In case hardware are taken by the vendors for servicing / repair, does the user site
ensure that the equipment does not contain sensitive live data?
3 Training related:
a) Whether the Users are given adequate training on the application systems
functionalities?
b) Whether the Technical persons are given adequate training in the technical details of
the application system, to provide necessary trouble shooting / help to users?
c) Whether the Users are aware of the steps to be carried in case of contingency due to
nonavailability of systems?