SlideShare a Scribd company logo
Lecture 3
COBIT
(Control Objectives for Information and related Technology)
ISA 3 COBIT
ISA 3 COBIT
ISA 3 COBIT
ISA 3 COBIT
ISA 3 COBIT
Introduction to COBIT (Control Objectives for
Information and related Technology)
• One major challenge faced by auditor
– Lack of common framework within which to operate
– This problem was first addressed with release of the
COBIT framework, by IT Governance Institute, USA
sponsored by ISACA (Information System Audit Control
Association)
Introduction to COBIT (Control Objectives for
Information and related Technology)
• IT Governance and Auditors
– To meet the business objectives, there had to be a common
ground for proactive discussion among auditors, IT management,
and the board.
– COBIT, and IT governance framework, addresses these issues
through several supporting tools and mechanism.
– These mechanism – defined the role of the auditor within the
realm of IT governance
– IT governance activities have thirty four objectives, one for each
of the IT process. These are grouped into four domains, viz.,
Introduction to COBIT (Control Objectives for
Information and related Technology)
• IT Governance and Auditors
– IT governance activities have thirty four objectives, one for each
of the IT process. These are grouped into four domains, viz.,
• Planning and Organization
• Acquisition and Implementation
• Delivery and Support
• Monitoring
– COBIT as a standard for IT security and control practices is not
only meant for auditors but also the management, users, etc.
– COBIT is helpful to manager, users, and auditors in the following
manner:
Introduction to COBIT (Control Objectives for
Information and related Technology)
• IT Governance and Auditors
– COBIT is helpful to manager, users, and auditors in the
following manner:
• Management: it helps them balance risk and control investments in
an often unpredictable IT environment
• Users: Help them obtain assurance on the security and control of IT
services provided by internal and third parties
• IS auditors: Enables them substantiate their opinion and/ or provide
advice to the management on matters of internal controls
Introduction to COBIT (Control Objectives for
Information and related Technology)
• IT Governance and Auditors
• Let us discuss the Role of auditor in each of four domains of
COBIT mentioned earlier
– Planning and Organization
• Board of directors, and management decide the strategy that would help
achieve business objectives, and ensure the technological infrastructure is in
place.
• Here, the auditor’s role is to evaluate and /or assess whether the
functioning of these process is in accordance with the business objectives.
• The only process that auditor is directly responsible for within this domain is
quality management.
• This process includes the development of long-term strategic plan
• This process is concern with the measurement criteria to be applied
• Identification of specific projects and work plan
Introduction to COBIT (Control Objectives for
Information and related Technology)
• The processes and auditor’s duties that are part of this domain
are:
– Define a strategic IT plan (evaluate/assess)
– Define the information architecture (evaluate/assess)
– Determine technological direction (evaluate/assess/inform/support)
– Define the IT organization and relationship
(evaluate/assess/inform/support)
– Communicate management’s aim and direction
(evaluate/assess/inform)
– Manage human resources (evaluate/assess/inform)
– Ensure compliance with external requirements (evaluate/assess)
– Assess risks (evaluate/assess)
– Manage projects (evaluate/assess/inform/support)
– Manage quality (evaluate/assess/responsible)
Introduction to COBIT (Control Objectives for
Information and related Technology)
• IT Governance and Auditors
– Acquisition and Implementation
• To realize the business strategies and tactics, IT solutions need to be
identified, developed or acquired.
• Within this domain, the primary role of auditor is still to assess the
process.
• However, here support needed to control issues regarding the
acquisition and maintenance of application software.
• The processes and auditor’s duties that are part of this domain are:
Introduction to COBIT (Control Objectives for
Information and related Technology)
• Acquisition and Implementation
– The processes and auditor’s duties that are part of this
domain are:
• Identify automated solutions (evaluate)
• Acquire and maintain application software (evaluate /
support)
• Acquire and maintain technology infrastructure
(evaluate)
• Develop and maintain procedures (evaluate)
• Install and accredit systems (evaluate)
• Manage changes (evaluate / support)
Introduction to COBIT (Control Objectives for
Information and related Technology)
• Delivery and Support
– This domain concern with the delivery of IT services, includes operations
through security, training, and support.
– The role of auditor here, is to evaluate and assess.
– The processes and auditor’s duties that are part of this domain are:
• Define and manage service levels (evaluate/assess)
• Manage third party services (evaluate/assess)
• Manage performance and capacity (evaluate/assess)
• Ensure continuous service (evaluate/assess)
• Ensure system security (evaluate/assess/support)
• Identify and allocate costs (evaluate/assess)
• Educate and train users (evaluate/assess)
• Assist and advice customers (evaluate/assess)
• Manage configuration (evaluate/assess)
• Manage problems and incidents (evaluate/assess)
• Manage data (evaluate/assess)
• Manage facilities (evaluate/assess)
• Manage operations (evaluate/assess)
Introduction to COBIT (Control Objectives for
Information and related Technology)
• Monitoring
– In all previous domains, auditor required to check for compliance of
processes with quality, and control requirements
– Here the auditors have direct responsibility and provide direct
support to the domain’s processes.
– The processes and auditor’s duties that are a part of this domain are:
• Monitor the process (evaluate/assess/support)
• Asses internal control adequacy (evaluate/assess/support)
• Obtain independent assurance (evaluate/assess/support)
• Provide for an independent audit (evaluate/assess/support)
Directed Unsupervised Activity
• Visit the website of ISACA and find out the standards for IS
Audit documentation and give your comments.
• List ten assurance services and group them into
attestation and non-attestation services.
Control
• “any input given to a dynamic system to produce a desired
output.”
• Here the word dynamic and desired output are very
important.
Input Dynamic
System
Desired
output
Control
• Dynamism of the system and Control Requirement
– Static system – control is not required
– More dynamism – the greater will be the control requirement of
the system
– Computer system – control not required, if it is not being used
for any application or switched off
– As complexity increases – its control requirement will also rise.
– This implies that
• Lesser control is required for stand-alone system
• Greater for one which is connected to network or Internet
Control
• Knowledge of Dynamism of the System Makes Control
Effective
– The predictability of the complexity of the disease has helped in
development of vaccines to prevent and cure
– Similarly, in computer system – control measures would operate
effectively if the dynamism and complexity were known.
Control
• The Input should be Directed towards Achieving the
Desired Output
– If the inputs are not focused and directed towards specific
outputs – then control mechanism will not be successful.
– There are No thumb rule
– Each input or control measure should be directed towards
achieving a specific output.
Control
• The Output Should be Evaluated for Giving further
Appropriate Input to the System
Effects of Computers on Internal Controls
• The internal controls within an enterprise in a
computerized environment the major areas of impact
with the goal of asset safeguarding, data integrity,
system efficiency and effectiveness are discussed below.
– Personnel
– Segregation of duties
– Authorization Procedures
ISA 3 COBIT
ISA 3 COBIT

More Related Content

PPTX
ITGC audit of ERPs
PPTX
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
PPTX
Conducting an Information Systems Audit
PPT
Cissp business continuity planning
 
PPT
Security Audit Best-Practices
PPTX
CISA Training - Chapter 1 - 2016
PPT
008.itsecurity bcp v1
PPTX
Compliance
ITGC audit of ERPs
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Conducting an Information Systems Audit
Cissp business continuity planning
 
Security Audit Best-Practices
CISA Training - Chapter 1 - 2016
008.itsecurity bcp v1
Compliance

What's hot (20)

PPTX
Donna Febriani
PPTX
Auditing SOX ITGC Compliance
PPTX
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
PPT
Chap2 2007 Cisa Review Course
PPTX
CISA Training - Chapter 3 - 2016
PPTX
CISSP Chapter 1 BCP
PPT
Ch2 2009 cisa
PDF
Basics in IT Audit and Application Control Testing
PPTX
IT Audit For Non-IT Auditors
PPT
Chap5 2007 C I S A Review Course
PDF
Cisa domain 1
DOCX
Audit Checklist for Information Systems
PDF
It change management
PPTX
It audit methodologies
PDF
Technology considerations
PPTX
Rm 11-1
PDF
CISA Domain 1 - IS Auditing (day 1)
PPTX
CISA Training - Chapter 5 - 2016
Donna Febriani
Auditing SOX ITGC Compliance
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Chap2 2007 Cisa Review Course
CISA Training - Chapter 3 - 2016
CISSP Chapter 1 BCP
Ch2 2009 cisa
Basics in IT Audit and Application Control Testing
IT Audit For Non-IT Auditors
Chap5 2007 C I S A Review Course
Cisa domain 1
Audit Checklist for Information Systems
It change management
It audit methodologies
Technology considerations
Rm 11-1
CISA Domain 1 - IS Auditing (day 1)
CISA Training - Chapter 5 - 2016
Ad

Viewers also liked (8)

PPTX
Feedback control for system tuning
PPTX
DOCX
process control seminar topics
PPTX
Feedback control
PPT
5. feedback control[1]
PPTX
An introduction to system dynamics & feedback loop
PPTX
block diagram representation of control systems
Feedback control for system tuning
process control seminar topics
Feedback control
5. feedback control[1]
An introduction to system dynamics & feedback loop
block diagram representation of control systems
Ad

Similar to ISA 3 COBIT (20)

PPTX
management system development and planning
PPT
PDF
Structured NERC CIP Process Improvement Using Six Sigma
PPT
2A-1.ppt this presentation is for free users
PPTX
Requirement engineering in S/W Engineering
PPTX
Chapter 2 Analyzing the Business Case .pptx
PPTX
HI600 Ch 1 Inst_slides
PPTX
Comparison of it governance framework-COBIT, ITIL, BS7799
PPTX
PDF
chapter02-120827115348-phpapp01.pdf
PPTX
Creation of Information Systems.pptx
PPTX
Week 4_Lecture_Internal Control_Student.pptx
PPT
IT Governance Presentation by omaha 2008
PPTX
INFORMATION SYSTEMS DEVELOPMENT SOLUTION
PPTX
INFORMATION SYSTEMS DEVELOPMENT SOLUTION
PDF
Lecture 3 spm
PPT
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PPTX
IntroToActiveAuditHandbookEN.pptx
PPTX
System engineering analysis and design
PPTX
papp01.pptx
management system development and planning
Structured NERC CIP Process Improvement Using Six Sigma
2A-1.ppt this presentation is for free users
Requirement engineering in S/W Engineering
Chapter 2 Analyzing the Business Case .pptx
HI600 Ch 1 Inst_slides
Comparison of it governance framework-COBIT, ITIL, BS7799
chapter02-120827115348-phpapp01.pdf
Creation of Information Systems.pptx
Week 4_Lecture_Internal Control_Student.pptx
IT Governance Presentation by omaha 2008
INFORMATION SYSTEMS DEVELOPMENT SOLUTION
INFORMATION SYSTEMS DEVELOPMENT SOLUTION
Lecture 3 spm
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
IntroToActiveAuditHandbookEN.pptx
System engineering analysis and design
papp01.pptx

Recently uploaded (20)

PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
innovation process that make everything different.pptx
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPT
tcp ip networks nd ip layering assotred slides
PPTX
Digital Literacy And Online Safety on internet
PPTX
Funds Management Learning Material for Beg
Module 1 - Cyber Law and Ethics 101.pptx
How to Ensure Data Integrity During Shopify Migration_ Best Practices for Sec...
WebRTC in SignalWire - troubleshooting media negotiation
Sims 4 Historia para lo sims 4 para jugar
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Paper PDF World Game (s) Great Redesign.pdf
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Power Point - Lesson 3_2.pptx grad school presentation
The New Creative Director: How AI Tools for Social Media Content Creation Are...
international classification of diseases ICD-10 review PPT.pptx
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
innovation process that make everything different.pptx
522797556-Unit-2-Temperature-measurement-1-1.pptx
The Internet -By the Numbers, Sri Lanka Edition
Unit-1 introduction to cyber security discuss about how to secure a system
SASE Traffic Flow - ZTNA Connector-1.pdf
tcp ip networks nd ip layering assotred slides
Digital Literacy And Online Safety on internet
Funds Management Learning Material for Beg

ISA 3 COBIT

  • 1. Lecture 3 COBIT (Control Objectives for Information and related Technology)
  • 7. Introduction to COBIT (Control Objectives for Information and related Technology) • One major challenge faced by auditor – Lack of common framework within which to operate – This problem was first addressed with release of the COBIT framework, by IT Governance Institute, USA sponsored by ISACA (Information System Audit Control Association)
  • 8. Introduction to COBIT (Control Objectives for Information and related Technology) • IT Governance and Auditors – To meet the business objectives, there had to be a common ground for proactive discussion among auditors, IT management, and the board. – COBIT, and IT governance framework, addresses these issues through several supporting tools and mechanism. – These mechanism – defined the role of the auditor within the realm of IT governance – IT governance activities have thirty four objectives, one for each of the IT process. These are grouped into four domains, viz.,
  • 9. Introduction to COBIT (Control Objectives for Information and related Technology) • IT Governance and Auditors – IT governance activities have thirty four objectives, one for each of the IT process. These are grouped into four domains, viz., • Planning and Organization • Acquisition and Implementation • Delivery and Support • Monitoring – COBIT as a standard for IT security and control practices is not only meant for auditors but also the management, users, etc. – COBIT is helpful to manager, users, and auditors in the following manner:
  • 10. Introduction to COBIT (Control Objectives for Information and related Technology) • IT Governance and Auditors – COBIT is helpful to manager, users, and auditors in the following manner: • Management: it helps them balance risk and control investments in an often unpredictable IT environment • Users: Help them obtain assurance on the security and control of IT services provided by internal and third parties • IS auditors: Enables them substantiate their opinion and/ or provide advice to the management on matters of internal controls
  • 11. Introduction to COBIT (Control Objectives for Information and related Technology) • IT Governance and Auditors • Let us discuss the Role of auditor in each of four domains of COBIT mentioned earlier – Planning and Organization • Board of directors, and management decide the strategy that would help achieve business objectives, and ensure the technological infrastructure is in place. • Here, the auditor’s role is to evaluate and /or assess whether the functioning of these process is in accordance with the business objectives. • The only process that auditor is directly responsible for within this domain is quality management. • This process includes the development of long-term strategic plan • This process is concern with the measurement criteria to be applied • Identification of specific projects and work plan
  • 12. Introduction to COBIT (Control Objectives for Information and related Technology) • The processes and auditor’s duties that are part of this domain are: – Define a strategic IT plan (evaluate/assess) – Define the information architecture (evaluate/assess) – Determine technological direction (evaluate/assess/inform/support) – Define the IT organization and relationship (evaluate/assess/inform/support) – Communicate management’s aim and direction (evaluate/assess/inform) – Manage human resources (evaluate/assess/inform) – Ensure compliance with external requirements (evaluate/assess) – Assess risks (evaluate/assess) – Manage projects (evaluate/assess/inform/support) – Manage quality (evaluate/assess/responsible)
  • 13. Introduction to COBIT (Control Objectives for Information and related Technology) • IT Governance and Auditors – Acquisition and Implementation • To realize the business strategies and tactics, IT solutions need to be identified, developed or acquired. • Within this domain, the primary role of auditor is still to assess the process. • However, here support needed to control issues regarding the acquisition and maintenance of application software. • The processes and auditor’s duties that are part of this domain are:
  • 14. Introduction to COBIT (Control Objectives for Information and related Technology) • Acquisition and Implementation – The processes and auditor’s duties that are part of this domain are: • Identify automated solutions (evaluate) • Acquire and maintain application software (evaluate / support) • Acquire and maintain technology infrastructure (evaluate) • Develop and maintain procedures (evaluate) • Install and accredit systems (evaluate) • Manage changes (evaluate / support)
  • 15. Introduction to COBIT (Control Objectives for Information and related Technology) • Delivery and Support – This domain concern with the delivery of IT services, includes operations through security, training, and support. – The role of auditor here, is to evaluate and assess. – The processes and auditor’s duties that are part of this domain are: • Define and manage service levels (evaluate/assess) • Manage third party services (evaluate/assess) • Manage performance and capacity (evaluate/assess) • Ensure continuous service (evaluate/assess) • Ensure system security (evaluate/assess/support) • Identify and allocate costs (evaluate/assess) • Educate and train users (evaluate/assess) • Assist and advice customers (evaluate/assess) • Manage configuration (evaluate/assess) • Manage problems and incidents (evaluate/assess) • Manage data (evaluate/assess) • Manage facilities (evaluate/assess) • Manage operations (evaluate/assess)
  • 16. Introduction to COBIT (Control Objectives for Information and related Technology) • Monitoring – In all previous domains, auditor required to check for compliance of processes with quality, and control requirements – Here the auditors have direct responsibility and provide direct support to the domain’s processes. – The processes and auditor’s duties that are a part of this domain are: • Monitor the process (evaluate/assess/support) • Asses internal control adequacy (evaluate/assess/support) • Obtain independent assurance (evaluate/assess/support) • Provide for an independent audit (evaluate/assess/support)
  • 17. Directed Unsupervised Activity • Visit the website of ISACA and find out the standards for IS Audit documentation and give your comments. • List ten assurance services and group them into attestation and non-attestation services.
  • 18. Control • “any input given to a dynamic system to produce a desired output.” • Here the word dynamic and desired output are very important. Input Dynamic System Desired output
  • 19. Control • Dynamism of the system and Control Requirement – Static system – control is not required – More dynamism – the greater will be the control requirement of the system – Computer system – control not required, if it is not being used for any application or switched off – As complexity increases – its control requirement will also rise. – This implies that • Lesser control is required for stand-alone system • Greater for one which is connected to network or Internet
  • 20. Control • Knowledge of Dynamism of the System Makes Control Effective – The predictability of the complexity of the disease has helped in development of vaccines to prevent and cure – Similarly, in computer system – control measures would operate effectively if the dynamism and complexity were known.
  • 21. Control • The Input should be Directed towards Achieving the Desired Output – If the inputs are not focused and directed towards specific outputs – then control mechanism will not be successful. – There are No thumb rule – Each input or control measure should be directed towards achieving a specific output.
  • 22. Control • The Output Should be Evaluated for Giving further Appropriate Input to the System
  • 23. Effects of Computers on Internal Controls • The internal controls within an enterprise in a computerized environment the major areas of impact with the goal of asset safeguarding, data integrity, system efficiency and effectiveness are discussed below. – Personnel – Segregation of duties – Authorization Procedures