Auditing in CIS Environment
Auditing in CIS Environment
LECTURE NOTES
INTRODUCTION TO IT ENVIRONMENT
An IT environment exists when a computer of any type or size in involved in the processing by the
entity of financial information of significance to the audit, whether the computer is operated by the
entity or by a third party.
IT infrastructure – comprises the network, operating systems, and databases and their
related hardware and software.
IT processes – are the entity’s processes to manage access to the IT environment, manages
program changes or changes to the IT environment and manage IT operations.
Basic Components
A. Hardware – physical devices or equipment used to accomplish data processing function.
Hardware devices include
1. Input- the purpose of the device is to convert information into a machine-readable form.
Examples of input devices
1,1, Online entry – keyboard, mouse, microphone, webcam, and touch-sensitive screens.
1.2. Turnaround documents – documents sent to customers and returned as inputs.
1.3. Electronic commerce and electronic data interchange – involves one entity’s computer
communicating with another’s computer.
2. Central Processing Unit (CPU) – the principal hardware component and processes
programs of instructions for manipulating data, it contains
2.1. Control unit – interpreter of programs coded that will manipulate the data.
2.2. Primary Memory Storage
2.2.1 Random Access Memory (RAM) – stores application programs and data at
execution timer and may be modified by the user.
2.2.2 Read-only Memory (ROM) – is a memory that cannot be changed; contains the
system’s boot input/output system (BIOS) and more.
2.3. Arithmetic and Logic Unit (ALU) – performs arithmetic and logic functions
3. Output - these devices translate processed data into forms understandable by users
3.1 Monitor, printers, plotters, and microfilm.
B. Software – consists of sets of instructions (programs) that direct, control and coordinates the
operation of the hardware components.
1. Systems Software
1.1 Operating System – is a group of computer programs that monitor and control all the
input, output, processing and storage devices and operations of a computer (e.g. DOS,
Windows, Linux, Mac, etc.)
1.2 Utility (user) programs – handle common file, data manipulation and “housekeeping”
tasks. It performs commonly required process such as sorting and merging.
1.3 Communication software – controls and supports transmission between computers,
computers and monitors, and accesses various databases.
2. Application software -these are programs designed for specific uses or desired processing
tasks such as payroll preparation, word processing, and accounting software.
3. Database Management System (DBMS) – a software package for the purpose of creating,
accessing and maintaining a database.
INTERNAL CONTROL IN A CIS ENVIRONMENT
Auditing in CIS Environment has not changed the fundamental nature of Auditing, it has caused
substantial changes in the method of evidence collection and evaluation.
2. Nature of processing
a. Lack of visible transaction trails (input output and audit trail)
In an IT environment, data may be entered directly into the computer system without
supporting documents. Also, records and files may not be printed and cannot be read
without using the computer.
b. Ease of access to data and computer programs
Data and computer programs may be accessed by unauthorized persons, either at the
computer or through the use of computer equipment at remote locations, leaving no visible
evidence.
CLASSIFICATION OF CONTROLS
1. As to objectives
1.1 Preventive
1.2 Detective
1.3 Corrective
2. As to scope
2.1 General Controls – typically related to the entire information systems and apply to all
programs used by the system.
2.2 Application Controls – relate to control over a particular computer task or application.
General Controls
General IT Controls covers controls over the entity’s IT processes that support the continued
proper operation of the IT environment, including continued effective functioning of information
processing controls and the integrity of information in the entity’s information system.
1. Inform System Management - handled by a Chief Information Officer and supervises the
operation of the department.
2. System Analysts – responsible for designing the information systems. Focus on setting
the goals of the information systems and means of achieving them after considering the
goals of the organization and the computer processing needs of the entity.
3. Application programming – codes the system specifications determined by system
analysts using programming languages (Pascal, Foxpro, etc.)
4. Database Administration – focus on planning and administering the database by
designing it and controlling its use.
5. Data Entry - prepare and verify input data for processing.
6. Computer operation – run and monitor central computer in accordance with standard
instructions. Sometimes operators may need to access computer console to correct
indicated errors in processing; this is a risk exposure that an operating system should be
designed to maintain a log of computer operator intervention. Also, computer operation
should be separated with application programming to mitigate the possibility of
unauthorized changes in computer programs.
7. Program and file library – protects computer programs, master files, transactions tapes
and other records from loss, damage, and unauthorize use or alteration.
8. Data control – review and test all input procedures, monitor computer processing,
reviews exception reports, handles reprocessing of exceptions detected by the computer
and distributes all computer output; also review computer log of operator intervention
and library log of program usage.
9. Telecommunications – responsible for maintaining and enhancing computer networks
and network connections.
10. Systems Programming – responsible for troubleshoot the operating the operating system
or systems in use, upgrading it and working with application system programs in case of
incompatibility with the operating systems.
11. Quality Assurance – ensures that new systems developed and old ones being replaced are
controlled with and ensures the new system to meet user application and documentation
standards.
c) Access controls – provide reasonable assurance that access to equipment, files and programs
are limited only to authorized personnel
1. Physical Access Control
a) Limited physical access – automated key cards and manual key locks
b) Visitor entry log
3. Hardware Controls
a) Diagnostic routines – hardware of software supplied by manufacturers to check the
internal operations and devices within the computer systems.
b) Boundary protection – to ensure integrity of the allocated memory for a job
currently running under a simultaneous processing in a multiprogramming
environment
c) Periodic maintenance
e) Monitoring controls - design to ensure that IT controls are working effectively. These may
include:
• Monitoring of key IT performance indicators
• Internal/external T audits.
IT Application Controls
Control policies and procedures that relate to specific use of the system in order to provide
reasonable assurance that all transactions are authorized, recorded, and are processed completely,
accurately and on a timely basis.
1. The overall objective and scope of an audit, including auditor's responsibilities, does not change in
an IT environment The overall objective and scope of an audit does not differ whether an entity
operates in a mainly manual environment, a completely automated environment, or an environment
involving some combination of manual and automated elements (ie, manual and automated controls
and other resources used in the entity's system of internal control)
1. The auditor should obtain an understanding of the significance and complexity of the IT
environment to be able to design further audit procedures. Furthermore, the following are the
significance why the auditor should understand the IT environment relevant to the information
system:
✓ The auditor's understanding of the information system includes the IT environment
relevant to the flows of transactions and processing of information in the entity's information
system because the entity's use of IT applications or other aspects in the IT environment may
give rise to risks arising from the use of IT.
✓ The understanding of the entity's business model and how it integrates the use of IT may
also provide useful context to the nature and extent of IT expected in the information system.
Understanding the entity's use of IT.
✓ The auditor's understanding of the IT environment may focus on identifying, and
understanding the nature and number of, the specific IT applications and other aspects of the
IT environment that are relevant to the flows of transactions and processing of information
in the information system. Changes in the flow of transactions, or information within the
information system may result from program changes to IT applications, or direct changes to
data in databases involved in processing, or storing those transactions or information.
✓ The auditor may identify the IT applications and supporting IT infrastructure concurrently
with the auditor's understanding of how information relating to significant classes of
transactions, account balances and disclosures flows into, through and out the entity's
information system.
2. When obtaining an understanding of the significance and complexity of the IT environment, the
auditor may use automated tools and techniques. Examples of procedures that may be performed
include:
✓ Perform risk assessment procedures on large volumes of data (from the general ledger,
sub-ledgers or other operational data) including for analysis, recalculations, reperformance
or reconciliations.
✓ Perform analytical procedures (commonly called data analytics).
✓ Observe or inspect, in particular assets, for example through the use of remote observation
tools (eg, a drone).
✓ Understand flows of transactions and processing as part of the auditor's procedures to
understand the information system. An outcome of these procedures may be that the auditor
obtains information about the entity's organizational structure or those with whom the entity
conducts business (e.g. vendors, customers related parties).
✓ Obtain direct access to, or a digital download from, the databases in the entity's information
system that store accounting records of transactions. With this, the auditor may confirm the
understanding obtained about how transactions flow through the information system by
tracing journal entries, or other digital records related to a particular transaction, or an entire
population of transactions, from initiation in the accounting records through to recording in
the general ledger.
✓ When automated procedures are used to maintain the general ledger and prepare financial
statements such entries may exist only in electronic form and may therefore be more easily
identified through the use of automated techniques.
3. Understanding the risks arising from the use of IT and the general IT controls implemented by the
entity to address those risks may affect:
✓ The auditor's decision about whether to test the operating effectiveness of controls to
address risks of material misstatement at the assertion level,
✓ The auditor's assessment of control risk at the assertion level;
✓ The auditor's strategy for testing information produced by the entity that is produced by
or involves information from the entity's IT applications.
✓ The auditor's assessment of inherent risk at the assertion level, or
✓ The design of further audit procedures
For the IT applications relevant to the information system, understanding the nature and complexity
of the specific IT processes and general IT controls that the entity has in place may assist the auditor
in determining which IT applications the entity is relying upon to accurately process and maintain
the integrity of information in the entity's information system Such IT applications may be subject to
risks arising from the use of IT
4. The auditor shall also consider risk arising from the use of IT. Such risks may arise from:
✓ Susceptibility of information processing controls to ineffective design or operation, or risks
to the integrity of information (i.e. the completeness, accuracy and validity of transactions
and other information) in the entity's information system, due to ineffective design or
operation of controls in the entity's IT processes.
✓ Risks to the integrity of information arise from susceptibility to ineffective implementation
of the entity's information policies, which are policies that define the information flows,
records and reporting processes in the entity's information system. Information processing
controls are procedures that support effective implementation of the entity's information
policies. Information processing controls may be automated (i.e. embedded in IT
applications) or manual (e.g. input or output controls) and may rely on other controls,
including other information processing controls or general IT controls.
Applicable risks arising from the use of IT may also be identified related to cybersecurity
Also, it is more likely that there will be more risks arising from the use of IT when the volume
or complexity of automated application controls is higher and management is placing greater
reliance on those controls for effective processing of transactions or the effective
maintenance of the integrity of underlying information.
5. The auditor should have sufficient knowledge of the IT to plan, direct, supervise and review the
work performed Also, the auditor should determine if assistance from the expert is needed When an
entity has greater complexity in its IT environment, identifying the IT applications and other aspects
of the IT environment, determining the related risks arising from the use of IT, and identifying
general IT controls is likely to require the involvement of team members with specialized skills in IT.
Such involvement is likely to be essential, and may need to be extensive, for complex IT
environments.
TEST OF CONTROLS
The effectiveness of application controls is greatly affected by the effectiveness of general controls
Accordingly, it may be more efficient to review the design of the general controls before reviewing
the application controls.
Application controls which the auditor may wish to test include manual controls exercised by the
user, controls over system output, and programmed control procedure.
2. Test of controls using CAATs may be divided into the following categories of techniques
a. Program analysis
b. Program testing
c. Continuous testing
d. Review of operating systems
Program Analysis
1. These techniques allow the auditor to gain an understanding of the client's program
a. Code review -This technique involves actual analysis of the logic of the program's
processing routines.
b. Comparison programs -These programs allow the auditor to compare computerized files
c. Flowcharting software - This is used to produce a flowchart of a program's logic and may
be used in both in mainframe and microcomputer environments
d. Program tracing and mapping - Program tracing is a technique in which each instruction
executed is listed along with control information affecting that instruction. On the other hand,
program mapping identifies sections of code that can be "entered" and thus are executable.
These techniques allow the auditor to recognize logic sequence or dormant section of code
that may be a potential source of abuse.
e. Snapshot - This technique in essence "takes a picture of the status of program execution,
intermediate results or transactions data at specified processing points in the program
processing. This technique helps the auditor to analyze the processing logic of specific
programs
Program Testing
2. Program testing involves the use of auditor-controlled actual or simulated data. The approach
provides direct evidence about the operation of programs and programmed controls.
a. Test data
• A set of dummy transactions is developed by the auditor and processed by the
client's computer programs to determine whether the controls which the auditor
intends to test are operating effectively.
• Test data shifts control over the processing to the auditor by utilizing the client's
software to process both valid and invalid transactions.
• If embedded controls are functioning effectively, the client's software should detect
all the exceptions planted in the auditor's test data.
• When this technique is to be used, an auditor should run the test data on a surprise
basis.
NOTE: When using these techniques, each control need only be tested once because
several problems, may be encountered during testing. These problems include, but
not limited to the following:
1. Making certain the test data is not included in the client's accounting records.
2. Determining that the program tested is actually used by the client to process data.
3. Adequately developing test data for every possible control.
4. Developing adequate data to test key controls may be extremely time-consuming.
d. Parallel simulation
• Shifts control over the computer software.
• This technique processes actual client data through an auditor's generalized audit
software program and frequently, although not necessarily, the auditor's computer.
• After processing the data, the auditor compares the output obtained with the output
obtained from the client.
• If the client's software is operating effectively, the client's software should generate
the same exceptions as the auditor's software.
• Should be performed on a surprise basis if possible.
e. Controlled reprocessing
• This is only a variation of parallel simulation Instead of using generalized audit
software program to processes actual client data, the auditor uses a copy of the
client's application program
Continuous/Concurrent Testing
3. Advance computer systems, particularly utilizing EDI (electronic data interchange) sometimes do
not retain permanent audit trails, thus requiring capture of audit data as transactions are processed.
Such systems may require audit procedures that are able to identify and capture data as transaction
occurs
a. Embedded audit modules
• Embedded audit modules are programmed routines incorporated into an
application program that are designed to perform an audit function such as
calculations, or logging activity.
• It is used to select client data for subsequent testing and analysis.
b. System control audit review files (SCARF)
• A log, usually created by an embedded audit module, used to collect information for
subsequent review and analysis.
• The auditor determines the appropriate criteria and the SCARF selects the type of
transactions
c. Audit hooks
• An audit hook is an exit point in an application program that allows an auditor to
subsequently add an audit module (or particular instructions) by activating the book
to transfer control to an audit module.
• Auditors sometimes use audit hooks to accomplish transaction tagging.
d. Transaction tagging
• Tagging is a technique in which an identifier providing a transaction with a special
designation is added to the transaction record.
• A transaction is tagged and then traced through critical control points in the
information system.
• The tag is often used to allow logging of transactions or snapshot of activities.
e. Extended records
• This technique attaches additional data that would not otherwise be saved to
regular historic records and thereby helps to provide a more complicated audit trail.
5. The following are computer assisted audit techniques are available for administering, planning,
performing, and reporting of an audit.
a. Generalized audit software (GAS)/Package programs
- The auditor may use various types of software on PCs and may include customized
programs, utility software. and generalized audit software for performing test of controls and
substantive tests
- They can be designed to perform audit tasks such as:
1. Reading computer files
2. Selecting samples
3. Performing calculations
4. Creating data files
5. Printing reports in an auditor-specified format
b. Electronic spreadsheet
- Often included in GAS, may be used for applications such as analytical procedures and
performing mathematical procedures.
-Contain variety of predefined mathematical operations and functions that can be applied to
data entered into the cells of a spreadsheet.