Cisa 02
Cisa 02
Section 2: IT Governance
Governance
Risk Identification and Management
Management Practices and
Controls
COBIT
The Capability Maturity Model
Define governance
Define COBIT
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Introduction (cont.) 2-4
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Governance 2-5
IT governance:
Is a subset of corporate governance
Focuses on the belief that the managers, directors, and
others in charge of the organization must understand the
role of IT in the organization
Management must:
Implement rules and regulations to control IT
infrastructure
Develop practices to distribute responsibilities
These practices:
Prevent a single person or department from shouldering
responsibility
Set up a framework of control
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Best Practices for Senior
2-6
Management
IT governance best practices require the company
to meet two specific goals:
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Best Practices for Senior
2-7
Management (cont.)
Organization and IT alignment:
Overall
goals
IT purpose
Marketing
IT
Customer requirements
needs
Required
Sales and
service levels
delivery
IT controls and
Fulfillment change management
Accounting and
audit
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Audit’s Role in Governance 2-8
The objective:
improve quality
Improve effectiveness
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Audit’s Role in Governance (cont.) 2-9
Auditors should:
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
The Auditor’s Role 2-10
Auditors:
Play a significant role in the organization’s success
Must be independent from
management and have the
authority to cross over
departmental boundaries
Usually report governance
issues to the highest
level of management and
must have the proper set
of skills
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
IT Steering Committee (1) 2-11
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
IT Steering Committee (3) 2-13
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Balanced Scorecard 2-15
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Balanced Scorecard… 2-16
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Information Security Governance 2-17
Focuses on:
Availability of services
Integrity of information
Protection of data confidentiality
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Enterprise Architecture (1) 2-18
Planning
Management
Expansion
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Enterprise Architecture (2) 2-19
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Enterprise Architecture (3) 2-20
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Enterprise Architecture (4) 2-21
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Determining Who Pays 2-22
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
The Role of Strategy, Policies,
2-23
Planning, and Procedures
Policies should exist to cover organizational
control.
Companies have legal and business requirements to
establish policies and procedures.
Law dictates who is responsible and what
standards must be upheld to meet minimum
corporate governance requirements.
Management is responsible for dividing the
company into smaller subgroups that control
specific functions.
Policies and procedures dictate how activities
occur in each functional area.
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Strategic Goals and Security Policy 2-24
Issue-specific
Operational
System-specific
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Goals and Documents 2-25
© 2009
2017 Global
PreciseKnowledge Training
Thinking TCT. LLC.reserved.
All rights All rights reserved.
Policy Development 2-27
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Policy Types 2-28
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Policy Types (cont.) 2-29
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Reviewing Policies, Procedures, and
2-30
Documentation
Per ISACA, the following items should be examined
as part of the AUDIT:
Human resources’ documents
Quality-assurance procedures
Process and operation manuals
Change-management documentation
IT forecasts and budgets
Security policies and procedures
Organizational charts and functional diagrams
Job details and descriptions
Steering committee reports
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Reviewing Policies, Procedures, and
2-31
Documentation (cont.)
During the review of policies, procedures, and
documentation, any of the following might indicate
potential problems:
Excessive costs
Budget overruns
Late projects
A high number of
aborted projects
Lack of documentation
Out-of-date documentation
Employees unaware or unknowledgeable about
documentation
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Risk Identification and Management 2-32
The first step in the risk-management process is to
identify and classify the organization’s assets.
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Asset Value 2-35
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Threat Identification 2-36
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Threats (cont.) 2-38
Physical threat/theft
Human error
Application error/buffer overflow
Equipment malfunction
Environmental hazards
Malicious software/covert channels
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Threats and Losses 2-39
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Risk-Analysis Methods 2-40
Qualitative:
Ranks threats by non-dollar values
Is based more on scenario, intuition, and
experience
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Quantitative Risk Assessment 2-41
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Qualitative Risk Analysis 2-42
Is scenario based
Purpose:
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Qualitative Analysis (6 Steps) (1) 2-44
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Qualitative Analysis (6 Steps) (2) 2-45
© 2009
2017 Global
PreciseKnowledge Training
Thinking TCT. LLC.reserved.
All rights All rights reserved.
Qualitative Analysis (6 Steps) (3) 2-46
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Qualitative Analysis: Results 2-47
© 2009
2017 Global
PreciseKnowledge Training
Thinking TCT. LLC.reserved.
All rights All rights reserved.
Qualitative Risk Analysis Techniques 2-48
Qualitative risk analysis techniques include:
Delphi technique
Brainstorming
Story boarding
FRAP
Accounting
Statistical
Quantitative
Analysis Methods
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Quantitative vs. Qualitative 2-50
© 2009
2017 Global
PreciseKnowledge Training
Thinking TCT. LLC.reserved.
All rights All rights reserved.
Management Practices and Controls 2-51
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Employee Management 2-52
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Pre-Employment Checks 2-53
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Current Employee Controls 2-54
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Employee Training 2-55
Exit interviews
Change control
Resetting accounts
Restricting access
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Sourcing 2-57
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Service Level Agreement 2-59
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Capability Maturity Model 2-61
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Five Maturity Levels 2-62
2. Repeatable
3. Defined
4. Managed
5. Optimized
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
1. Initial 2-63
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
2. Repeatable 2-64
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
4. Managed 2-66
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
5. Optimized 2-67
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Capability Maturity Model 2-68
Maturity
Name Description
Level
An ad-hoc process is used with no
1 Initial
assurance of repeatability.
Change control and quality assurance are in
2 Repeatable place and controlled by management,
although a formal process is not defined.
Defined processes and procedures are in
3 Defined place and used. Qualitative process
improvement is in place.
Qualitative data is collected and analyzed. A
4 Managed
process-improvement program is used.
Continuous process improvement is in place
5 Optimized
and has been budgeted.
© 2009
2017 Global
PreciseKnowledge Training
Thinking TCT. LLC.reserved.
All rights All rights reserved.
Control Objectives for Information
2-69
and Related Technology
COBIT:
A framework that can be used to better
control processes
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Control Objectives for Information
2-70
and Related Technology (cont.)
Auditors can use COBIT.
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Understanding Personnel Roles and 2-72
Responsibilities
The Auditor should review each
employee’s area to see how the job
description compares to actual
activities.
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Employee Roles and Duties (1) 2-73
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Employee Roles and Duties (4) 2-76
Database administrator: Responsible for the
organization’s data and maintenance of data
structure:
Usually a senior information systems employee
Has control over physical data definition, implementing
data definition controls, and defining and initiating
backup and recovery
Detective controls and supervision of duties must be
observed closely
Defined governance
Explained risk identification and
management
Described management practices and
controls
Defined CobIT
Explained Capability Maturity Model
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.
Q&A 2-82
QUESTIONS?
2017 Global
© 2009 PreciseKnowledge
Thinking TCT. All rights
Training LLC.reserved.
All rights reserved.