COBIT Mission Framework Governance and Controls
COBIT Mission Framework Governance and Controls
com
COBIT : Mission, Framework, Governance and
Controls
Introduction
Information Technology Governance is the structure of relationships and
processes within an enterprise which add value to a corporation's goals while
balancing risk with return-on-investment.
CobIT is an acronym which stands for "Control Objectives for Information and
related Technology"
COBIT Mission
To research, develop, publicize and promote an authoritative, up-to-date,
international set of generally accepted information technology control
objectives for day-to-day use by business managers and auditors.
Control Objectives ... provide tools which integrate the 34 high-level control
objectives with 318 specific/detailed control objectives for the development of
clear policy, good practice/procedure and defined responsibility.
Page 1 of 1
www.itilhelp.com
Implementation Tool Set ... facilitates the implementation of governance
tools with case studies, lessons learned, and FAQ. Included is an
implementation guide, management awareness section and diagnostic
standards for IT control
COBIT design is based on the perception that there are three levels of
management for information technology resources .. domains, processes and
activities/tasks - the intent is that the grouping of activities/tasks to processes
and processes to domains has a logical organization which permits the clear
definition of goals for tasks and measurable results which permit "life-cycle"
management for information technology resources.
Page 2 of 2
www.itilhelp.com
• Monitoring : assessment of all infrastructure components over time
The goal of control theory is to identify and establish the correct balance for
each system.
• nature
• functional area
• action or objective
• management controls
• physical controls
• technical controls
• application controls
• network controls
• development controls
• operations controls
• security controls
• integrity controls
Page 3 of 3
www.itilhelp.com
From the perspective of assessment/audit activity, control classification by
action/objective is the most useful conceptualization and within that context:
preventive, detective and corrective controls the most useful for analysis.
Practically speaking, internal controls are usually effective by people and help
the enterprise achieve its performance/profitability targets and prevent the
loss of resources. Controls should help ensure reliable financial reporting and
permit the corporation to comply with laws and regulations thus avoiding
damage to its reputation and other consequences.
Page 4 of 4
www.itilhelp.com
• Risk Assessment ................ objective setting & risk assessment
integrated throughout operations
Detective Controls
Corrective Controls
• exception reports
• progress reports
• control reports
Page 5 of 5
www.itilhelp.com
• error reports
• statistical reports
• special reports
• mission/vision statement
• TQM program
• integrate business strategic planning with IS strategic planning
• establish IS steering committee
• install CIO position
• establish benchmark studies
• implement charge back system
• conduct software license audits and enforce software license
requirements
• establish service level agreements
• issue acquisition policies and procedures
• establish data classification scheme and ownership rules
• issue job descriptions
• develop system access rules
• establish software QA function
• establish separation of duties
• establish and enforce policies, procedures and standards
• practice portfolio management approaches to IS investments
• issue internet use policy
Detective Controls
Corrective Controls
Page 6 of 6
www.itilhelp.com
• issue exception reports
• develop security violation reports
• issue data file maintenance reports
• issue computer security incidence reports
Detective Controls
Corrective Controls
Detective Controls
Corrective Controls
Page 8 of 8
www.itilhelp.com
• establish and enforce computer centre policies, procedures and
standards
• establish a problem, change and configuration management structure
• install and empower help-desk staff to support system users
• require periodic audits of the computer centre
• install automated job scheduling system
• discourage printing of hardcopy reports and encourage on-line viewing
• install automate tape and disk management systems
• develop partnership relationships with customers and suppliers
• install program library management software
Detective Controls
Corrective Controls
Page 9 of 9
www.itilhelp.com
• implement reference monitor concept
• establish security tags (labels) for sensitive information
• use traffic padding or flooding techniques to confuse intruders
• install secure gateways and firewalls for internet security
• protect modems and terminal servers
• implement least privilege concept
• implement cryptographic techniques
• implement strong password management
• implement logical and physical access controls
• assign asset responsibility to employees and exact accountability from
them
• distribute job descriptions with security responsibility
• generate a security awareness among employees
• encourage legal ownership of software and protection of copyrighted
(intellectual) property
• provide guidelines to protect confidentiality of data and information with
data ownership/custody
• establish a quality control technique for computer security function
• require periodic security audits
• issue guidelines for software development and maintenance
methodology focusing on computer security design
Detective Controls
Page 10 of 10
www.itilhelp.com
Correction Controls
Detective Controls
Corrective Controls
• provide periodic backup of data and programs and rotate through off-
site storage
• test the disaster recovery plan
Page 11 of 11
www.itilhelp.com
• install automated job recovery software
• test the emergency procedures
• obtain sufficient insurance coverage
• implement vital records retention programs
• develop fall-back systems and procedures
• update the panning document
• issue a report of lessons learned from testing
Detective Controls
Page 12 of 12
www.itilhelp.com
• practice software verification and validation techniques
• use software debugging tools during testing
• design data editing and validation control routines into the software
• inspect and test software independently
• conduct code and file comparisons
• install management oversight reviews
• implement formal technical reviews
• conduct through testing of software
• practice be-bugging (error seeding) techniques to detect errors in
software
Corrective Controls
Page 13 of 13
www.itilhelp.com
• data ownership / classification
• table lookups
• passwords
• transaction cancellation
• management approvals
• concurrent access controls
• two-person controls
• system or manual over-rides
• validity checks
• fail safe and fail soft systems
• TQM programs
• benchmarks and best practices
• risk assessment guidelines
Detective Controls
Page 14 of 14
www.itilhelp.com
• key verification
• one-for-one checking
• cross-footing
Corrective Controls
• program comments
• job control comments
• automatic error correction
• over-ride by supervisors
• audit trail reports
• control reports
• exception reports
• productivity reports
• aging reports
• error reports
• before/after image reporting
• clear and complete error messages
• error totals
• documentation
• automated back-up and recovery mechanisms
• journaling
• data retention
• checkpoint controls
• transaction back-out
• recovery logging
• fall-back procedures
• end-of-job markers
• end-of-report markers
© http://www.peacefulpackers.com/it_solutions/cobit_1.htm
Reproduced by www.itilhelp.com
©itilhelp.com 2005
Page 15 of 15