SlideShare a Scribd company logo
3
Most read
10
Most read
14
Most read
Presented by – Sugako Amasaki (Principal Auditor)
University of California, San Francisco
December 3, 2015
Information Technology
General Controls (ITGCs) 101
Internal Audit Webinar Series
 Introduction
 Why are IT General Controls Important?
 Types of Controls
 IT General Controls Review - Audit Process
 IT General Controls Review - Overview and Examples
 Access to Programs and Data
 Program Changes and Development
 Computer Operations
 Q&A
Webinar Agenda
 IT systems support many of the University’s business processes, such as these below:
 Finance
 Purchasing
 Research
 Patient care
 Inventory
 Payroll
Why are IT General Controls Important?
We cannot rely on IT systems or data therein
without effective IT General Controls
Why are IT General Controls Important?
Financial Objectives, such as:
- Completeness
- Accuracy
- Validity
- Authorization
Operational & IT Objectives, such as:
- Confidentiality
- Integrity
- Availability
- Effectiveness and Efficiently
Ineffective ITGCs = No achievement of
business objectives
How are controls implemented?
 Automated Controls
 Manual Controls
 Partially Automated Controls
What are controls for?
 Preventive Controls
 Detective Controls
 Corrective Controls
Types of Controls
IT General Controls Review - Audit Process
1. Understand and identify the IT Environment and systems to be reviewed
2. Perform interviews, walkthroughs, and documentation reviews to gain an
understanding on processes
3. Assess appropriateness of existing control environment (control design)
4. Validate existing controls to assess control operating effectiveness
IT General Controls Review - Overview
Access to Program and Data
 Risk: Unauthorized access to program and data may result in improper
changes to data or destruction of data.
 Objectives: Access to program and data is properly restricted to
authorized individuals only.
IT General Controls
Program Changes
Program
Development
Computer
Operations
Access to
Program and
Data
 Access to programs and data components to be considered:
 Policies and procedures
 User access provisioning and de-provisioning
 Periodic access reviews
 Password requirements
 Privileged user accounts
 Physical access
 Appropriateness of access/segregation of duties
 Encryption
 System authentication
 Audit logs
 Network security
IT General Controls Review - Overview
Access to Programs and Data
Area Existing Control Design How to Test/Validate
User access
provisioning
A formal process for granting or modifying system access (based
on appropriate level of approval) is in place.
Review an evidence of approval
User access
de-provisioning
A formal process for disabling access for users that are
transferred or separated is in place.
Compare existing user accounts
with a list of users that are
transferred or separated
Periodic access
reviews
Periodic access reviews of users, administrators, and third-party
vendors are performed.
Review an evidence of periodic
reviews
Password
requirements
Unique (to individual) and strong passwords are used. Assess password rules enforced
Privileged user
accounts
Accounts having privileged system access rights (e.g. servers,
databases, applications, and infrastructure) are limited to
authorized personnel.
Review accounts with privileged
access rights
Physical access Only authorized personnel are allowed to access secured areas
and computer facilities.
Walkthrough of areas (e.g. data
center, backup storage etc.)
IT General Controls Review - Example
Access to Programs and Data
IT General Controls Review - Overview
Program Changes and Development
 Risk: Inappropriate changes to systems or
programs may result in inaccurate data.
 Objectives: All changes to existing systems
are properly authorized, tested, approved,
implemented and documented.
IT General Controls
Program Changes
Program
Development
Computer
Operations
Access to
Program and
Data
 Risk: Inappropriate system or program
development or implementation may result
in inaccurate data.
 Objectives: New systems/applications being
developed or implemented are properly
authorized, tested, approved, implemented
and documented.
 Program changes and development components to be considered:
 Change management procedures and system development methodology
 Authorization, development, implementation, testing, approval, and
documentation
 Migration to the production environment (Separation of Duties (SOD))
 Configuration changes
 Emergency changes
 Data migration and version controls
 Post change/implementation testing and reviews
IT General Controls Review - Overview
Program Changes and Development
Area Existing Control Design How to Test/Validate
Change
management
controls
A formal process for proper change management is in
place.
Review/assess change
management procedures and
validate that procedures are
followed
Change
documentation
All changed made to systems (e.g. servers, databases,
applications, batch jobs and infrastructure) are
documented and tracked.
Review change logs
Testing Appropriate level of testing is performed. Review an evidence of test plans
and results
Approval Appropriate approval prior to migration to production is
required.
Review an evidence of approval
Migration Access to migrate changes into production is appropriately
restricted.
Verify that a separation of duties
(SOD) between developers and
operators (= making changes) exists
IT General Controls Review - Example
Program Changes and Development
IT General Controls Review - Overview
Computer Operations
 Risk: Systems or programs may not be available for users or may not be
processing accurately.
 Objectives: Systems and programs are available and processing
accurately.
IT General Controls
Program Changes
Program
Development
Computer
Operations
Access to
Program and
Data
 Computer operations components to be considered:
 Batch job processing
 Monitoring of jobs (success/failure)
 Backup and recovery procedures
 Incident handling and problem management
 Changes to the batch job schedules
 Environmental controls
 Disaster Recovery Plan (DRP) and Business Continuity Plan (DRP)
 Patch management
IT General Controls Review - Overview
Computer Operations
Area Existing Control Design How to Test/Validate
Batch job
processing
Batch jobs are appropriately scheduled, processed, monitored,
and tracked.
Review/assess procedures for
batch job processing and
monitoring and validate that
procedures are followed
Monitoring of
jobs
Failed jobs are followed-up and documented (including
successful resolutions and explanations)
Validate that failed jobs are
followed-up and documented
Backup and
recovery
Backups for critical data and programs are available in the
event of an emergency.
Review/assess procedures for
backup and recovery and
validate that procedures are
followed
Problem/issue
management
A formal process for problem/issue handling is in place in
order to ensure timely identification, escalation , resolution
and documentation of problem.
Review/assess procedures for
problem/issue management
and validate that procedures
are followed
IT General Controls Review - Example
Computer Operations
Conclusion/Q&A

More Related Content

PDF
audit_it_250759.pdf
PDF
Auditing application controls
PPTX
03.1 general control
PDF
IT-Audit-Manual-2017-1st-Edition.pdf
PPTX
Auditing SOX ITGC Compliance
PDF
Information Technology Control and Audit.pdf
PPTX
CISA Training - Chapter 3 - 2016
PDF
Segregation of Duties Solutions
audit_it_250759.pdf
Auditing application controls
03.1 general control
IT-Audit-Manual-2017-1st-Edition.pdf
Auditing SOX ITGC Compliance
Information Technology Control and Audit.pdf
CISA Training - Chapter 3 - 2016
Segregation of Duties Solutions

What's hot (20)

PPTX
IT General Controls
PPT
IT System & Security Audit
PDF
IT General Controls Presentation at IIA Vadodara Audit Club
PDF
Steps in it audit
PDF
Basics in IT Audit and Application Control Testing
PPTX
IT Audit For Non-IT Auditors
PPT
Introduction to it auditing
PDF
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
PDF
Control and audit of information System (hendri eka saputra)
PDF
Cisa domain 1
PPTX
CISA Training - Chapter 5 - 2016
PDF
CISA DOMAIN 2 Governance & Management of IT
PDF
What is ISO 27001 ISMS
PPTX
Information System Architecture and Audit Control Lecture 1
PPTX
CISA Training - Chapter 2 - 2016
PPS
ISO 27001 2013 isms final overview
PPT
Security audit
PPTX
Data Protection Officer Dashboard | GDPR
DOCX
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
PPTX
03.2 application control
IT General Controls
IT System & Security Audit
IT General Controls Presentation at IIA Vadodara Audit Club
Steps in it audit
Basics in IT Audit and Application Control Testing
IT Audit For Non-IT Auditors
Introduction to it auditing
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
Control and audit of information System (hendri eka saputra)
Cisa domain 1
CISA Training - Chapter 5 - 2016
CISA DOMAIN 2 Governance & Management of IT
What is ISO 27001 ISMS
Information System Architecture and Audit Control Lecture 1
CISA Training - Chapter 2 - 2016
ISO 27001 2013 isms final overview
Security audit
Data Protection Officer Dashboard | GDPR
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
03.2 application control
Ad

Similar to ITGCs.pdf (20)

PDF
IT & the Auditor
PDF
Internal Controls Over Information Systems
PDF
Fundamentals of Information Systems Security
DOCX
Effects of IT on internal controls
PPTX
Controls in Audit.pptx
PPTX
CISA Training - Chapter 4 - 2016
PPTX
Chapter 15-Accounting Information System
PDF
The Information Office
PPTX
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
PPT
8. operations security
PPTX
CISM_WK_3.pptx
PPTX
Security Baselines and Risk Assessments
PPT
It Audit And Forensics
PPT
Testing
ODP
CISSP Week 12
PPT
The Importance of Security within the Computer Environment
PPTX
Infosec policies to appsec standards ed final
PPT
Introduction to Information Security CSE
PPT
Intro.ppt
PPT
Intro kavindu rasanjahshdjdhhjxjxuxgxjdjs
IT & the Auditor
Internal Controls Over Information Systems
Fundamentals of Information Systems Security
Effects of IT on internal controls
Controls in Audit.pptx
CISA Training - Chapter 4 - 2016
Chapter 15-Accounting Information System
The Information Office
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
8. operations security
CISM_WK_3.pptx
Security Baselines and Risk Assessments
It Audit And Forensics
Testing
CISSP Week 12
The Importance of Security within the Computer Environment
Infosec policies to appsec standards ed final
Introduction to Information Security CSE
Intro.ppt
Intro kavindu rasanjahshdjdhhjxjxuxgxjdjs
Ad

Recently uploaded (20)

PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPTX
Lecture (1)-Introduction.pptx business communication
DOCX
Business Management - unit 1 and 2
PPTX
5 Stages of group development guide.pptx
PDF
Business model innovation report 2022.pdf
PDF
Training And Development of Employee .pdf
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Types of control:Qualitative vs Quantitative
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PPT
Chapter four Project-Preparation material
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
WRN_Investor_Presentation_August 2025.pdf
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Lecture (1)-Introduction.pptx business communication
Business Management - unit 1 and 2
5 Stages of group development guide.pptx
Business model innovation report 2022.pdf
Training And Development of Employee .pdf
Power and position in leadershipDOC-20250808-WA0011..pdf
Types of control:Qualitative vs Quantitative
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Chapter 5_Foreign Exchange Market in .pdf
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Chapter four Project-Preparation material
ICG2025_ICG 6th steering committee 30-8-24.pptx
Unit 1 Cost Accounting - Cost sheet
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Belch_12e_PPT_Ch18_Accessible_university.pptx
WRN_Investor_Presentation_August 2025.pdf

ITGCs.pdf

  • 1. Presented by – Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Information Technology General Controls (ITGCs) 101 Internal Audit Webinar Series
  • 2.  Introduction  Why are IT General Controls Important?  Types of Controls  IT General Controls Review - Audit Process  IT General Controls Review - Overview and Examples  Access to Programs and Data  Program Changes and Development  Computer Operations  Q&A Webinar Agenda
  • 3.  IT systems support many of the University’s business processes, such as these below:  Finance  Purchasing  Research  Patient care  Inventory  Payroll Why are IT General Controls Important? We cannot rely on IT systems or data therein without effective IT General Controls
  • 4. Why are IT General Controls Important? Financial Objectives, such as: - Completeness - Accuracy - Validity - Authorization Operational & IT Objectives, such as: - Confidentiality - Integrity - Availability - Effectiveness and Efficiently Ineffective ITGCs = No achievement of business objectives
  • 5. How are controls implemented?  Automated Controls  Manual Controls  Partially Automated Controls What are controls for?  Preventive Controls  Detective Controls  Corrective Controls Types of Controls
  • 6. IT General Controls Review - Audit Process 1. Understand and identify the IT Environment and systems to be reviewed 2. Perform interviews, walkthroughs, and documentation reviews to gain an understanding on processes 3. Assess appropriateness of existing control environment (control design) 4. Validate existing controls to assess control operating effectiveness
  • 7. IT General Controls Review - Overview Access to Program and Data  Risk: Unauthorized access to program and data may result in improper changes to data or destruction of data.  Objectives: Access to program and data is properly restricted to authorized individuals only. IT General Controls Program Changes Program Development Computer Operations Access to Program and Data
  • 8.  Access to programs and data components to be considered:  Policies and procedures  User access provisioning and de-provisioning  Periodic access reviews  Password requirements  Privileged user accounts  Physical access  Appropriateness of access/segregation of duties  Encryption  System authentication  Audit logs  Network security IT General Controls Review - Overview Access to Programs and Data
  • 9. Area Existing Control Design How to Test/Validate User access provisioning A formal process for granting or modifying system access (based on appropriate level of approval) is in place. Review an evidence of approval User access de-provisioning A formal process for disabling access for users that are transferred or separated is in place. Compare existing user accounts with a list of users that are transferred or separated Periodic access reviews Periodic access reviews of users, administrators, and third-party vendors are performed. Review an evidence of periodic reviews Password requirements Unique (to individual) and strong passwords are used. Assess password rules enforced Privileged user accounts Accounts having privileged system access rights (e.g. servers, databases, applications, and infrastructure) are limited to authorized personnel. Review accounts with privileged access rights Physical access Only authorized personnel are allowed to access secured areas and computer facilities. Walkthrough of areas (e.g. data center, backup storage etc.) IT General Controls Review - Example Access to Programs and Data
  • 10. IT General Controls Review - Overview Program Changes and Development  Risk: Inappropriate changes to systems or programs may result in inaccurate data.  Objectives: All changes to existing systems are properly authorized, tested, approved, implemented and documented. IT General Controls Program Changes Program Development Computer Operations Access to Program and Data  Risk: Inappropriate system or program development or implementation may result in inaccurate data.  Objectives: New systems/applications being developed or implemented are properly authorized, tested, approved, implemented and documented.
  • 11.  Program changes and development components to be considered:  Change management procedures and system development methodology  Authorization, development, implementation, testing, approval, and documentation  Migration to the production environment (Separation of Duties (SOD))  Configuration changes  Emergency changes  Data migration and version controls  Post change/implementation testing and reviews IT General Controls Review - Overview Program Changes and Development
  • 12. Area Existing Control Design How to Test/Validate Change management controls A formal process for proper change management is in place. Review/assess change management procedures and validate that procedures are followed Change documentation All changed made to systems (e.g. servers, databases, applications, batch jobs and infrastructure) are documented and tracked. Review change logs Testing Appropriate level of testing is performed. Review an evidence of test plans and results Approval Appropriate approval prior to migration to production is required. Review an evidence of approval Migration Access to migrate changes into production is appropriately restricted. Verify that a separation of duties (SOD) between developers and operators (= making changes) exists IT General Controls Review - Example Program Changes and Development
  • 13. IT General Controls Review - Overview Computer Operations  Risk: Systems or programs may not be available for users or may not be processing accurately.  Objectives: Systems and programs are available and processing accurately. IT General Controls Program Changes Program Development Computer Operations Access to Program and Data
  • 14.  Computer operations components to be considered:  Batch job processing  Monitoring of jobs (success/failure)  Backup and recovery procedures  Incident handling and problem management  Changes to the batch job schedules  Environmental controls  Disaster Recovery Plan (DRP) and Business Continuity Plan (DRP)  Patch management IT General Controls Review - Overview Computer Operations
  • 15. Area Existing Control Design How to Test/Validate Batch job processing Batch jobs are appropriately scheduled, processed, monitored, and tracked. Review/assess procedures for batch job processing and monitoring and validate that procedures are followed Monitoring of jobs Failed jobs are followed-up and documented (including successful resolutions and explanations) Validate that failed jobs are followed-up and documented Backup and recovery Backups for critical data and programs are available in the event of an emergency. Review/assess procedures for backup and recovery and validate that procedures are followed Problem/issue management A formal process for problem/issue handling is in place in order to ensure timely identification, escalation , resolution and documentation of problem. Review/assess procedures for problem/issue management and validate that procedures are followed IT General Controls Review - Example Computer Operations