SlideShare a Scribd company logo
SCOPE OF WORK
1 IT DUE DILIGENCE
A) Overall Assessment of the IT Environment
1. High level review of the IS/IT environment, the internal procedures and internal
infrastructure;
2. Inquiries with responsible IT personnel and the company’s management;
3. High level review of internal guidelines, policies and procedures;
4. Observation of the Company’s premises and data center; and
5. Identification of the IT issues and classification of their potential financial impact.
B) Strategy support
6. High level review of:
o IS/IT strategy;
o IT budgets and their plausibility (OPEX, CAPEX);
o Planned and recently completed changes/upgrades; and
o IS/IT contracts.
7. Assessment of the IT services – internal and external.
C) IT operations
8. Understanding of the business operations support by the IT function;
9. Evaluation of the scope and adequacy of the IT support;
10. Understanding of the IT systems;
11. System management and control;
12. Internal and external SLAs; and
13. Development, testing and release management.
D) IT assets
14. High level review of:
o Hardware sufficiency (capability to support business)and monitoring;
o Hardware cost and aging;
o Software licenses and related costs; and
o Network infrastructure – network diagrams.
E) System and data security
15. High level review of:
o Internal policies, procedures and standards in the systemand data security area;
o Security administration and monitoring;
o System security (application, database,operating systemand network level);
o Data protection standards; and
o User management standards.
16. Identification of the key IT security issues and classification of their potential impact.
F) Business continuity
17. High level review of:
o Business Continuity Plans;
o Disaster Recovery Plans;
o Backup management
o Data centersecurity; and
o Data centercapabilities.
18. Evaluation of the Disaster recovery capabilities.
G) IT HR issues
19. Evaluation of the Company’s IT organization chart;
20. Review of the job descriptions and employment contracts of the IT staff; and
21. Analysis of IT personnel expenses and training costs.
H) IT audits
22. Review of the IS/IT audit reports (internal and external);
23. Review of the reports from security assessments;and
24. Identification of the key IT issues and classification of their potential impact.

More Related Content

PDF
ISO 27001 (v2013) Checklist
PDF
Chapter 10 security standart
PPTX
It audit methodologies
PPT
Use of the COBIT Security Baseline
PPTX
IS audit checklist
PPT
IT Audit methodologies
PDF
Whitepaper iso 27001_isms | All about ISO 27001
PDF
CISA Domain 4 Information Systems Operation | Infosectrain
ISO 27001 (v2013) Checklist
Chapter 10 security standart
It audit methodologies
Use of the COBIT Security Baseline
IS audit checklist
IT Audit methodologies
Whitepaper iso 27001_isms | All about ISO 27001
CISA Domain 4 Information Systems Operation | Infosectrain

What's hot (20)

PPTX
Security
PDF
Hipaa checklist - information security
PPTX
IS Audit Checklist- by Software development company in india
PPTX
Information System Audit and Control
PPTX
Auditing SOX ITGC Compliance
PDF
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
PDF
Basics in IT Audit and Application Control Testing
PPTX
CMMC Certification
PPT
It Audit Expectations High Detail
PDF
IT General Controls Presentation at IIA Vadodara Audit Club
DOC
Redspin HIPAA Security Risk Analysis RFP Template
PPT
The information security audit
PDF
What is a Firewall Risk Assessment?
PPTX
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
PDF
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
PPT
Security policy
PDF
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
PPT
Audit of it infrastructure
PDF
Cdpse course content infosec train
PPTX
Nist 800 53 deep dive 20210813
Security
Hipaa checklist - information security
IS Audit Checklist- by Software development company in india
Information System Audit and Control
Auditing SOX ITGC Compliance
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
Basics in IT Audit and Application Control Testing
CMMC Certification
It Audit Expectations High Detail
IT General Controls Presentation at IIA Vadodara Audit Club
Redspin HIPAA Security Risk Analysis RFP Template
The information security audit
What is a Firewall Risk Assessment?
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Security policy
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
Audit of it infrastructure
Cdpse course content infosec train
Nist 800 53 deep dive 20210813
Ad

Viewers also liked (20)

DOCX
Вопросы для интервью ISO 27001
PDF
Комплект документов по ISO 27001-2013
PDF
Внедрение СУИБ на основе ISO/IEC 27001
PDF
Практические аспекты проведения аудита информационной безопасности компании 2...
PDF
Управление инцидентами информационной безопасности от А до Я
PDF
Общий план комплексного аудита информационной безопасности
PDF
пр Управление инцидентами ИБ (Dozor) v.2.1
PDF
Чеклист по безопасности облачного провайдера
PDF
пр Разработка комплекта документов по управлению ИБ (прозоров)
PDF
Модель зрелости процесса (мониторинг и оценка ИБ)
PDF
Доступ к технической библиотеке обучающих материалов Symantec
PDF
Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]
PDF
Renuncia de Mario Gomez
PPTX
Cre ar toledo juegos_101
PPT
Solar Security. Алексей Данилин. "Что действительно может и не может DLP в ко...
PDF
Internet Marketing Company of the Year 2012
PDF
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
PDF
[Инфографика] Исследование эффективности SIEM систем для аудита изменений в И...
PDF
Кузнецов_v1
PPTX
Вопросы для интервью ISO 27001
Комплект документов по ISO 27001-2013
Внедрение СУИБ на основе ISO/IEC 27001
Практические аспекты проведения аудита информационной безопасности компании 2...
Управление инцидентами информационной безопасности от А до Я
Общий план комплексного аудита информационной безопасности
пр Управление инцидентами ИБ (Dozor) v.2.1
Чеклист по безопасности облачного провайдера
пр Разработка комплекта документов по управлению ИБ (прозоров)
Модель зрелости процесса (мониторинг и оценка ИБ)
Доступ к технической библиотеке обучающих материалов Symantec
Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]
Renuncia de Mario Gomez
Cre ar toledo juegos_101
Solar Security. Алексей Данилин. "Что действительно может и не может DLP в ко...
Internet Marketing Company of the Year 2012
Дмитрий Петращук - Аутсорсинг системы мониторинга событий информационной безо...
[Инфографика] Исследование эффективности SIEM систем для аудита изменений в И...
Кузнецов_v1
Ad

Similar to Scope of work IT DD (20)

PDF
CIO IT Audit Survival TNS07
PDF
20 IT Auditor questions.pdf
PPT
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PPT
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PDF
Swetana A Purohit
PDF
Auditing information systems
PPT
Feb 26 NETP Slide Deck
PDF
Auditing Systems Development
PPTX
CISA_26e_Ch_2.pptxCISA_26e_Ch_2.pptxCISA_26e_Ch_2.pptxCISA_26e_Ch_2.pptxCISA_...
PDF
CGEIT Course Content InfosecTrain.pdf
PDF
CGEIT Course Content InfosecTrain
DOCX
WLS Services Brochure March 2013
DOCX
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
PPTX
IT Risk Assessments
PDF
GRC in Australia slides
PPTX
Developing IT strategy
PDF
audit_it_250759.pdf
PPT
IT Governance Presentation by omaha 2008
PDF
Bizmanualz-Computer-IT-Policies-and-Procedures-Sample.pdf
PPT
Information Security Program & PCI Compliance Planning for your Business
CIO IT Audit Survival TNS07
20 IT Auditor questions.pdf
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
PPT-UEU-Audit-Kendali-Sistem-Informasi-Pertemuan-4.ppt
Swetana A Purohit
Auditing information systems
Feb 26 NETP Slide Deck
Auditing Systems Development
CISA_26e_Ch_2.pptxCISA_26e_Ch_2.pptxCISA_26e_Ch_2.pptxCISA_26e_Ch_2.pptxCISA_...
CGEIT Course Content InfosecTrain.pdf
CGEIT Course Content InfosecTrain
WLS Services Brochure March 2013
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docx
IT Risk Assessments
GRC in Australia slides
Developing IT strategy
audit_it_250759.pdf
IT Governance Presentation by omaha 2008
Bizmanualz-Computer-IT-Policies-and-Procedures-Sample.pdf
Information Security Program & PCI Compliance Planning for your Business

More from Ivan Piskunov (8)

PDF
Электронная подпись и счет-фактуры в бухгалтерском учете
PDF
Особенности проведения аудита безопасности корпоративной IT-инфраструктуры_PH...
PDF
Человеческий фактор [без]опасного интернета
PPTX
Как сэкономить, вложив в информационную безопасность?
PDF
Аудит ИБ как инструмент повышения эффективности вашего бизнеса
PPTX
Анти-фрод системы: правовые и технические аспекты, перспективы применения и ...
PPTX
Современные технологии и инструменты анализа вредоносного ПО_PHDays_2017_Pisk...
DOCX
Scope of work IT DD
Электронная подпись и счет-фактуры в бухгалтерском учете
Особенности проведения аудита безопасности корпоративной IT-инфраструктуры_PH...
Человеческий фактор [без]опасного интернета
Как сэкономить, вложив в информационную безопасность?
Аудит ИБ как инструмент повышения эффективности вашего бизнеса
Анти-фрод системы: правовые и технические аспекты, перспективы применения и ...
Современные технологии и инструменты анализа вредоносного ПО_PHDays_2017_Pisk...
Scope of work IT DD

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The AUB Centre for AI in Media Proposal.docx
MIND Revenue Release Quarter 2 2025 Press Release
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Weekly Chronicles - August'25 Week I
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Spectroscopy.pptx food analysis technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf

Scope of work IT DD

  • 1. SCOPE OF WORK 1 IT DUE DILIGENCE A) Overall Assessment of the IT Environment 1. High level review of the IS/IT environment, the internal procedures and internal infrastructure; 2. Inquiries with responsible IT personnel and the company’s management; 3. High level review of internal guidelines, policies and procedures; 4. Observation of the Company’s premises and data center; and 5. Identification of the IT issues and classification of their potential financial impact. B) Strategy support 6. High level review of: o IS/IT strategy; o IT budgets and their plausibility (OPEX, CAPEX); o Planned and recently completed changes/upgrades; and o IS/IT contracts. 7. Assessment of the IT services – internal and external. C) IT operations 8. Understanding of the business operations support by the IT function; 9. Evaluation of the scope and adequacy of the IT support; 10. Understanding of the IT systems; 11. System management and control; 12. Internal and external SLAs; and 13. Development, testing and release management. D) IT assets 14. High level review of: o Hardware sufficiency (capability to support business)and monitoring; o Hardware cost and aging; o Software licenses and related costs; and o Network infrastructure – network diagrams. E) System and data security 15. High level review of: o Internal policies, procedures and standards in the systemand data security area; o Security administration and monitoring; o System security (application, database,operating systemand network level); o Data protection standards; and o User management standards. 16. Identification of the key IT security issues and classification of their potential impact. F) Business continuity 17. High level review of: o Business Continuity Plans; o Disaster Recovery Plans; o Backup management o Data centersecurity; and o Data centercapabilities.
  • 2. 18. Evaluation of the Disaster recovery capabilities. G) IT HR issues 19. Evaluation of the Company’s IT organization chart; 20. Review of the job descriptions and employment contracts of the IT staff; and 21. Analysis of IT personnel expenses and training costs. H) IT audits 22. Review of the IS/IT audit reports (internal and external); 23. Review of the reports from security assessments;and 24. Identification of the key IT issues and classification of their potential impact.