Automated Business processes-LAPTOP-APPTNJ0E
Automated Business processes-LAPTOP-APPTNJ0E
1. Operational process: they deal with the core business and value chain.
These processes deliver value to the customer by helping to produce a product or service.
Operational processes represent essential business activities that accomplish business
objectives.
Example: order to cash cycle(O2C), Purchase to Pay cycle(P2P) are associated with revenue
generation.
2. Supporting processes: they back core processes and functions with an organisation.
Examples of supporting or management process include Accounting, Human resource
management and Workplace safety. One key differentiator between operational and
supporting activities is that support processes do not provide value to the customers
directly. However, it should be noted that hiring the right people for the right job has a
direct impact on the efficiency of the enterprise.
Example: the main HR processes areas are grouped into logical areas functional areas that
include Recruitment and staffing; Goal setting; Training and Development Compensation and
Benefits; Performance management; Career development and leadership development.
3. Management Processes: they measure, monitor, and control the activities related to the
business procedures and systems. Examples of management processes include internal
communications, governance strategic planning, budgeting and infrastructure or capacity
management. Like supporting processes, management processes do not provide direct value
to the customers. However, it has a direct impact on the efficiency of the enterprise.
Processes of the budgeting:
In any enterprise budgeting requires to be driven by the vision (what the enterprise plans to
accomplish) and the strategic plans (the steps to get there). Having a formal and structured
budgeting process is the foundation for a good business management, growth and
development.
Business process Automation: BPA is the tactic a business uses to operate efficiently and
effectively.
BPA is the tradition of analysing, documenting, optimising and then automating business
process.
Factors affecting business process
1 Confidentiality: To ensure that the data is available only to the persons who are
authorized to see the same.
2 Integrity: To ensure that no unauthorized amendments can be made in the data;
3 Availability: To ensure that the data is available when asked for.
4 Timeliness: To ensure that data is made available at the right time.
IMPLEMENTATION COST:
The implementation of the automated processes may be an expensive proposition in
terms of acquisition /development cost of automated systems and special skills
required to operate and maintain these systems.
BPA IMPLEMENTATION
Business needs a reason to go for any new system. Today the connected world has
opened huge opportunities as well as brought new threats to any business. The
increased availability of choice to customers about products or services makes it very
important for business to keep themselves to new technology and new mechanisms.
Steps to implement business process automation:
Step 1: Define why we plan to implement BPA?
Errors in manual processes leading to higher costs.
Payment processes not streamlined, due to duplicate or late payments,
missing early pay discounts and losing revenue.
Paying for goods and services not received.
Poor debtor management leading to high invoice
Not being able to find documents quickly during an audit or lawsuit or not
being able to find all documents.
Lengthy or incomplete information of new employee or new or new account
on boarding
Unable to recruit and train new employees but where employees are
urgently required.
Lack of management understanding of business processes.
Poor customer services
Step 2: Understand the rules / regulation under which enterprise needs to
comply with?
One of the most important steps in automating any business process is to understand the
rules engagement which include following rules, adhering to regulations and the following
document retention requirements. This governance is established by a combination of
internal corporate policies external industry regulations and local state and external central
laws. Regardless of the source it is important to be aware of their existence and how they
affect the document that drive the processes. It is important to understand that laws may
require documents to be retained for specified number of the years in a specified format.
Entity needs to ensure that any BPA adheres to the requirements of law.
Step 3: understand the rules / regulation under which enterprise needs to comply with?
At this step all the documents that are currently being used need to be documented. The
following aspects need to be kept in mind while documenting the present process:
Step 1: Define why we The answer to this question will provide justification for
plan to implement implementing BPA?
BPA?
Step 2: Understand the The underlying issue is that any BPA created needs to comply
rules/regulations with applicable laws and regulations.
under which it needs
to comply with?
Step 3: Document the The current processes which are planned to be automated need
process we wish to to be correctly and completely documented at this step.
automate.
Step 4: define the This enables the developer and the user to understand the
objectives/goals to be reasons for going for BPA. This goal needs to be precise and
achieved by clear.
implementing BPA.
Step 5: Engage the Once the entity has been able to define the above, the entity
business process needs to appoint and expert who can implement it for the
consultant. entity.
Step 6: Calculate the The answer to this question can be used for convincing top
ROL for the project management to say yes to the BPA exercise.
Step 7: Development Once the top management grants their approval the right
of BPA. business solutions has to be procured and implemented or
developed and implemented covering the necessary BPA.
Step 8: Testing the BPA Before making the process live, the BPA solutions should be
fully tested.
How much could be saved if they were taken advantage of and if the entity has got
the cash flow to do so?
Vendor priority can be created based on above calculations for which gets paid
sooner rather than later.
CASE 1: To determine the average invoice aging per customer. Entity can decide to reduce
the average from 75 to 60 days. This alone can dramatically improve cash flow.
STEP 5: Engage the business process consultant.
To decide as to which company/consultant to partner with depends upon the following:
♦ How much could be saved if they were taken advantage of, and if the entity has got the
cash flow to do so?
♦ Vendor priority can be created based on above calculations, for which gets paid sooner
rather than later.
Case 2: To determine the average invoice aging per customer. Entity can decide to reduce
the average from 75 days to 60 days. This alone can dramatically improve cash flow.
Step 5: Engage the business process consultant.
ABC limited, a consultant or repute, has been engaged for the same. The consultant has
prior experience and knowledge about entity’s business.
Step 6: Calculate the ROI for the project.
The opportunity loss for the project comes to around Rs. 100 lakhs per year. The cost of
implementing the whole BPA shall be around Rs. 50 lakhs. It is expected that the
opportunity loss after BPA shall reduce to Rs. 50 lakhs in year one, Rs. 25 lakhs in later years
for the next five years.
Step 7: Developing the BPA.
Once the top management says ‘Yes’, the consultant develops the necessary BPA. The BPA is
to generate purchase orders as soon as an item of inventory reaches to its re-order level. To
ensure accuracy, all data in the new system need to be checked and validated before being
put the same into system:
Leaving the front door unlocked makes the house vulnerable to unwanted visitors.
Short passwords (less than 6 characters) make the automated information system
vulnerable to password cracking or guessing routines.
Missing safeguards often determine the level of vulnerability.
Determining vulnerabilities involves a security evaluation of the system including inspection
of safeguards, testing, and penetration analysis.
Normally, vulnerability is a state in a computing system which must have at least one
condition out of the following:
Example:
Sources of Risk
When an enterprise adopts automation to support its critical business processes, it
exposes itself to several risks, such as downtime due to failure of technology. The
most important step in risk management process is to identify the sources of risk,
the areas from where risks can occur. This will give information about the possible
threats, vulnerabilities and accordingly appropriate risk mitigation strategy can be
adapted. Some of the common sources of risk are commercial and legal
relationships, economic circumstances, human behaviour, natural events, political
circumstances, technology and technical issues, management activities and controls,
and individual activities.
Broadly risk has the following characteristics:
Potential loss that exists as the result of threat / vulnerability process.
Threats have the potential to cause damage or loss. A risk is an expectation
that a threat may succeed and potential damage may occur.
Uncertainty of loss expressed in terms of probability of such loss. The extent
of loss includes not only the immediate direct financial loss but also the loss
due to its impact in the long run. Loss in the long run includes losses such as
loss of business, loss of reputation, etc.
The probability/likelihood that a threat agent may mount a specific attack
against a particular system. The assessment of both the likelihood/probability
of occurrence and the consequence of risk is a high probability event.
To conclude, Risk can be defined as the potential to harm caused if a threat exploits a
particular vulnerability to cause damage to an asset.
Types of Risks
The risks can be broadly categorized as follows:
A. Business Risks: Business risk is a broad category which applies to any event or
circumstances related to business goals. Business face all kinds of risks ranging from
serious loss of profits to even bankruptcy and are discussed below:
Strategic Risks: These are the risks that would prevent an organization from
accomplishing its objectives. Examples include risks related to strategy, political,
economic relationship issues with suppliers and global market conditions; also, cold
include reputation risk, leadership risk, brand risk, and changing customer needs.
Financial Risks: Financial risks are those risks that could result in a negative financial
impact to the organization. Examples include risks from volatility in foreign
currencies, interest rates and commodities, credit risks, liquidity risk, and market
risk.
Regulatory (compliance) Risks: This incudes risks that could expose the organization
to fines and penalties form a regulatory agency due to noncompliance with laws and
regulations. Example include violation of laws or regulations governing areas such as
environmental, employee health and safety, lack of due diligence, protection of
personal data an accordance with global data protection requirements and local tax
and statutory laws. New and emerging regulations can have a wide-ranging impact
on management’s strategic direction business model and compliance system. It is
therefore important to consider regulatory requirements while evaluating business
risks.
Operational risks: Operational risks include those risks that could prevent an
organisation form operating in the most effective and efficient manner or be
disruptive to other operations due to inefficiencies or breakdown in internal
processes, people and systems. Examples include risk of loss resulting from the
inadequate or failed internal process, fraud or any criminal activity by an employee,
business continuity, channel effectiveness, customer satisfaction and
product/service failure, efficiency, capacity, and change integration.
Hazard Risks: Hazard risks include risks that are insurable such as natural disasters
various insurable liabilities, impairment of physical assets terrorism.
Residual risks: This includes any risk remaining even after the countermeasures are
analysed and implemented. An organization’s management of risk should consider
two areas -Acceptance of residual risks and Selection of safeguards are applied,
there is probably going to be some residual risk. The risk can be minimised but it can
be seldom be eliminated. Residual risk must be kept at a minimal acceptable level.
As long as it is kept at an acceptable level the risk can be managed.
B. Technology risks: Automated process are technology driven. The dependence on
technology in BPA for most of the key business processes has led to various
challenges. All risks relating to technology equally applicable to BPA. As technology is
taking new forms and transforming as well the business processes and standards
adapted by enterprises should consider these new set of IT risks and challenges
which are describe below:
(i) Downtime due to technology failure: Information system facilities may
become unavailable due to technological problems or equipment failure. A
common example of this type of failure is non-availability of system due to
server failure.
(ii) Multiplicity and complexity of systems: The technological architecture used
for services could include multiple digital platforms and is quite complex.
Hence this requires the personnel to have knowledge about requisite
technology could be outsourced to a company having the relevant skill set.
(iii) Frequent changes or obsolescence of technology: Technology keeps on
evolving and changing constantly and becomes obsolete very quickly. Hence,
there is always a challenge that the investment in technology solutions unless
properly planned may result in loss to the organization due to risk of
obsolescence.
(iv) Different types of controls for different types of technologies/systems:
Deployment of technology often gives rise to new types of risks. These risks
need to be mitigated by relevant controls as applicable as applicable to the
technology could be outsourced to a company having relevant skill set.
(v) Proper alignment with the business objectives and legal requirements:
Organizations must ensure that the systems implemented cater to all the
business objectives and needs, in addition to the legal/regulatory
requirements envisaged.
(vi) Dependence on vendors due to outsourcing if IT services: In a system
environment the organization requires staff with specialized domain skills to
manage IT deployed. Hence these services could be outsourced to vendors
and there is heavy dependency on vendors and gives rise to vendor risks
which should be managed by proper contracts, controls and monitoring.
(vii) Vendor related concentration risks: there may not be one but multiple
vendors providing different services. For example, network, hardware,
system software and application software services may be provided by
different vendors on these services may be provided by a single vendor. Both
these situations result in higher risks due to heavy dependence on vendors.
(viii) Segregation of duties (SOD): Organizations may have a highly defined
organization structure with clearly defined roles, authority and responsibility.
The segregation of duties as per organizations structure should be clearly
mapped. This is a high-risk area since any SOD conflicts can be potential
vulnerability for fraudulent activities. For example, if a single employee can
initiate, authorize and disburse a loan, the possibility of misuse cannot be
ignored.
(ix) External threats leading to cyber frauds/crimes: the system environment
provides access to customers anytime, anywhere using internet. Hence
information system which was earlier accessible only within and to the
employees is now exposed and it’s open to be accessed by anyone from
anywhere. Making the information available is business imperative but this
also fraught with risks of increased threats from hackers and others who cold
access the software to commit frauds/crimes.
(x) Higher impact due to intentional or unintentional acts of internal
employees: employees in a technology environment are the weakest link in
an enterprise. Employees are expected to be trusted individuals that are
granted extended privileges which can easily be abused.
(xi) New social engineering techniques employed to acquire confidential
credentials: Fraudsters use new social engineering techniques such as
socializing with employees and extracting information which is used for
committing frauds. For example, extracting information about passwords
from staff acting as genuine customer and using it to commit frauds.
(xii) Need for governance process to adequately manage technology and
information security: Controls in system should be implemented from macro
and business perspective and not just from function and technology
perspective. With BPA, technology becomes the key enabler for the
organization and is implemented across the organization. The senior
management should be involved in directing in bow technology is deployed in
and approve appropriate policies this re1qires governance process to
implement security as required.
(xiii) Need to ensure continuity of business process in the event of major
exigencies: the high dependency on technology makes it imperative to
ensure resilience to ensure that failure does not impact the organizations
services. Hence a documented business continuity plan with adequate
technology and information systems should be planned an implemented and
monitored.
C. Data related risks: The primary concern of any organization should be its data
because it is often a unique resource. All data and applications are susceptible to
disruption, damage and theft. Data related risks includes unauthorized
implementation and or modification of data and software and are discussed below:
(i) Data diddling: This involves the change of data before or after they entered
the system. A limited technical knowledge is required to data diddling and
the worst part with this is that it occurs before computer security can protect
the data.
(ii) Bomb: Bomb is the piece of bad code deliberately planted by an insider or
supplier of program. An event which is logical, triggers a bomb or time based.
The bomb explodes when the condition of explosion gets fulfilled causing the
damage immediately. However, these programs cannot infect other
programs; chances of widespread epidemic are relatively low.
(iii) Christmas card: It is a ell known example of trojan and was detected on
internal email of IBM systems. In tying the word ‘Christmas’ it will draw the
Christmas tree as expected but in addition it will send copies of similar output
to all the other users connected to the network. Because of this message on
the other terminals other users cannot save their half-finished work.
(iv) Worm: A worm does not require a host program like trojan to relocate itself’
thus a program copies itself to another machine on the network. Since,
worms are stand-alone programs and they can be detected easily in
comparison to trojans and computer viruses. Examples of worms are
essential worms, Alarm clock worms etc. the alarm clock worm places wake
up calls on list of users. It passes through the network to an essential
outgoing terminal while sole purpose of existential worm is to remain alive.
Existential worm does not cause damage to the system, nut only copies itself
to several places in a computer network.
(v) Rounding down: This refers to rounding of small fractions of denomination
and transferring these small fractions into an authorized account is small it
gets rarely noticed.
(vi) Salami techniques: This involves slicing of small amounts of money form a
computerized transaction or account. A salami technique is slightly different
form rounding technique in the sense a fixed amount is deducted. For
example, in the rounding off technique, Rs.2123456.39 becomes
Rs.2123456.40, while in salami technique the transaction amount
Rs.2123456.39 is truncated to either 2123456.30 or Rs 2123456.00
depending upon the logic.
(vii) Trap doors: Trap doors allow insertion of specific logic such as program
interrupts that permit a review of data. They also permit insertion of
unauthorized logic.
(viii) Spoofing: A spoofing attack involves forging one’s source address. One
machine is used to impersonate the other in spoofing technique. Spoofing
occurs only after a particular machine has been identified as vulnerable. A
penetrator makes the user think that she/ he is interacting with the operating
system. For example, a penetrator duplicates the login procedure, captures
the user’s password, attempt for a system crash and makes the user login
again.
(ix) Asynchronous Attacks: They occur in many environments where data can be
moved synchronously across telecommunication lines. These kind of attacks
makes use of timing difference between the time when the data is inputted
to the system to the system and the tome when it gets processed by the
system. Data is waiting to be transmitted are liable to unauthorized access
called Asynchronous Attack. These attacks are hard to detect because they
are usually very small pin like insertions and are of following types:
Data leakage: This involves leaking information out of the computer
by means of dumping files to paper or stealing computer reports or
tape.
Subversive attacks: These can provide intruders with important
information about messages being transmitted and the intruder may
attempt to violate the integrity of some components on the sub-
system.
Wire-Tapping: This involves spying on information being transmitted
over communication network.
Piggybacking: This is the act of following an authorized person
through a secured door or electronically attaching to an unauthorized
telecommunication link that intercepts and alters transmissions. This
involves intercepting communication between the operating system
and the user and modifying them or substituting new messages.
RISK MANAGEMENT STRATEGIES
Risk analysis is defined as the process of identifying security risks and determining their
magnitude and impact on an organization. Effective risk management begin with a clear
understanding of an enterprise’s risk appetite and identifying high-level risk exposures.
The un acceptable high levels of risks can be controlled by designing and implementing
adequate proactive controls.
Risk management is the process of assessing risks taking steps to reduce risk to an
acceptable level and maintaining that level of risk. Risk management involves identifying,
measuring and minimizing uncertain events affecting resources.
But it is not always appropriate to counter risks by implementing controls because
controls involve cost. After defining risk appetite and identified risk exposure, strategies
for managing risk can be set and responsibilities clarified. Based and senior management
may choose to take up any of the following risk management strategy in isolation or
combination as required:
Tolerate /Accept the risk. One of the primary functions of the management is
managing risk. Some risk may be considered minor because their impact and
probability of occurrence is low. In this case, consciously accepting the risk as a
cost of doing business is appropriate. The risks should be reviewed periodically to
ensure that their impact remains low. A common example of risk acceptance is
planning for potential production delays (within a reasonable time range) since it’s
often difficult to predict a precise delivery schedule in advance.
Terminate/eliminate the risk: Especially on the case of risks that have high
probability and impact values, it may be best to modify and any project strategy to
avoid them altogether. For example- it is possible for a risk t be associated with the
use of technology, supplier, or vendor. The risk can be eliminated by replacing the
technology with more robust products and by seeking more capable suppliers and
vendors.
Transfer/ share the risk: Risk mitigation approaches can be shared with trading
partners and suppliers. A good example is outsourcing infrastructure management.
In such a case the supplier mitigates the risks associated with the managing the IT
infrastructure by being more capable and having access to more highly skilled staff
than the primary organization. Risk also may be mitigated by transferring the cost
of realized risk to an insurance provider.
Treat/mitigate the risk: Where other options have been eliminated, suitable
controls must be devised and implemented to prevent the risk form manifesting
itself or to minimize its effects. A good example of risk mitigation is planning for
the eventuality in case an enterprise won’t have sufficient capacity or supplies to
deal with a very high demand. In that case , enterprise shall have a mitigation
strategy in place that allows them to rapidly scale their capacity, or to subcontract
some of the work some of the work to other parties to meet high demand.
Align risk appetite and strategy: Risk appetite is the degree of risk on a board-based
level that an enterprise is willing to accept in pursuit of its goals. Management
considers entity’s risk appetite first in evaluating strategic alternatives, then in
setting objectives aligned with the selected strategy and in developing mechanisms
to manage the related risks.
Link growth, risk and return: Entities accept risk as a part of value creation and
preservation, and they expect return commensurate with the risk. ERM provides an
enhanced ability to identify and assess the risks and establish acceptable level of risk
relative to growth and return objectives.
Enhance risk response decisions: ERM provides the rigor to identify and select
among the alternative risk responses- risk avoidance, reduction, sharing and
acceptance. ERM provides methodologies and techniques for making these
decisions.
Minimize operational surprises and losses: Entities have enhanced capability to
identify potential events assess risk and establish responses thereby reducing the
occurrence of surprises and related cost or losses.
Identify and manage cross enterprise risks: Every entity faces a myriad of risks
affecting different parts of enterprise. Management needs to not only manage
individual risks but also understand interrelated impacts.
Provide integrated responses to multiple risks: business process carry many
inherent risks, and ERM enables integrated solutions for managing the risks.
Seize opportunities: Management considers potential events rather than just risk,
and by considering a full range of events, management gains an understanding of
how certain event represent opportunities.
Rationalize capital: More robust information on entity’s total risk allows
management to assess more effectively overall capital needs and improve capital
allocation.
Enterprise risk management framework
ERM provides a framework for risk management whish typically involves identifying the
events or circumstances relevant to an organization’s objectives assessing them in terms of
likelihood and magnitude of impact, determining a response strategy and monitoring
progress. Various potential threats to computer system affects the confidentiality, Integrity,
and Availability of data and computer system, for successful continuity of business it is very
essential to evaluate these potential threats and control them so as to minimize the impact
of these threats to an acceptable level. By identifying and proactively addressing risk and
opportunities, n=business enterprises protect and create value for their stakeholders
including owners, employees, customers, regulators and society overall.
ERM is a risk-based approach which includes methods and processes used by organizations
to manage risks. ERM provides a framework for risk management which involves:
CONTROLS
CONTROL is defined as policies, procedures, practices and organization structure that are
designed to provide reasonable assurance that business objectives are achieved and
undesired events are prevented or detected and corrected. The main objectives of
information controls and safeguarding of assets, maintenance of data integrity,
effectiveness in achieving organizational objectives, and efficient consumption of resources.
Controls include things like practices, policies, procedures, programs, techniques,
technologies, guidelines, and organizational structures.
Example 1.6: Purchase to Pay(P2P)-Given below is a simple example of controls for the
Purchase to Pay cycle, which is broken down to four main components as shown in the Fig.
1.6.1 (P2P cycle is explained in later part of chapter).
Purchases: when an employee working in specific department wants to purchase
something required for carrying out the job, he/she will submit a purchase
requisition to a manager for approval. Based on the approved PR, a
purchase order (PO) is raised. The PO may be raised manually and then input into
the computer system raised directly by the computer system.
Goods receipt: The PO is then sent to the vendor who will deliver the goods as per
the specifications mentioned in the PO. When the goods are received at the
warehouse, the receiving staff checks the delivery note, PO number etc. and
acknowledges the receipt of the material. Quantity and quality are checked and aby
unfit items are rejected and sent back to the vendor. A goods receipt note (GRN) is
raised indicating the quantity received. The GRN may be raised manually and then
input into the computer system or raised directly by the computer system.
Invoice processing: The vendor sends the invoice to the accounts payable
department who will input the details into the computer system. The vendor invoice
is checked with the PO to ensure that inly the goods ordered have been invoiced and
at the negotiated price. Further the vendor invoice is checked with the GRN to
ensure that the quantity has been received.
Payment: If there is no mismatch between the PO, GRN and the vendor invoice: the
payment is released to the vendor based on the credit period negotiated by the
vendor.
Based on the modes of implementation, these controls can be manual, automated or semi-
automated. The objective of a control is to mitigate the risk.
Manual control: Manually verify that the goods ordered in PO are received in good
quality and the vendor invoice reflects the quantity and price that are as per the PO.
Automated control: The above verification is done automatically by the computer
system by comparing (D), (E) &(F) and exceptions highlighted.
Semi automated Control: Verification of goods receipt (E) with PO (D) could be
automated but the vendor invoice matching could be done manually in a
reconciliation process(G).
Importance of IT controls
IT control objective is defined as “A statement of the desired result or purpose to be
achieved by implementing control procedures with a particular IT activity”. Implementing
right type of controls is responsibility of management. Controls provide a clear policy and
good practice for directing and monitoring performance of IT to achieve enterprise
objectives. IT controls perform dual role which is as follows:
(i) They enable enterprise to achieve objectives: and
(ii) They help in mitigating tasks.
Many issues drive the need for implementing IT control. These range rom the need to
control costs to remain competitive to need the for compliance with internal and external
governance. IT controls promote reliability and efficiency and allow the organization to
adapt changing risk environments. Any control that mitigates or detects fraud or cyber
attacks enhances the organization’s resiliency because it helps the organization uncover the
risk and manage its impact. Resiliency is a result of a strong system of internal controls
which enable a well-controlled organization- to manage challenges or disruptions
seamlessly.
Applying IT controls
It is important for an organization to identify controls as per risk management strategy. For
example, the way banking is done in a nationalized bank is traditional way with right
organization structure of managers at different levels, officers and clear demarcation
between department and functions whereas in a private sector, the organization structure is
organized around customers and focused on relationship banking.
A common classification of IT controls is General controls and application controls. General
controls are macro in nature and are applicable to all applications and data resources.
Application controls are controls which are specific to the application software such as
payroll, accounts payable and billing, etc.
Information security policy: An information security policy is the statement of intent
by the senior management about how to protect a company’s information assets.
The security policy is a set of laws, rules and practices that regulates how assets
including sensitive information are managed protected and distributed within the
user organization. The security policy is approved by the senior management and
encompasses all areas of operations across the enterprise and the other
stakeholders.
Administration, Access and Authentication: Access controls are measures taken to
ensure that only authorized persons have access to the system and the actions can
take. IT should be administered with appropriate policies and procedures clearly
defining the levels of access to information and authentication of users.
Separation of IT functions: Secure development of IT requires the organization to
have separate IT organization structure with key demarcation of duties for deferent
personnel with IT department and to ensure that there is no segregation of duties
conflicts.
Management of systems Acquisition and implementation: Management should
establish acquisition standards that addresses the security, functionality and
reliability issues related to systems acquisition. Hence process of acquisition and
implementation of systems should be properly controlled.
Change management: Deployed IT solutions and its various components must be
changed in tune with changing needs as per changes in technology environment,
business processes, regulatory, compliance requirements and changing needs of the
user. These changes impact the live environment of the organization. Hence change
management process should be implemented to ensure smooth transition to the
new environment covering all key changes including, hardware -, software and
business processes. All changes must be properly approved by the management and
tested before implementation.
Backup recovery and business continuity: Heavy dependence in IT controls critically
makes it imperative that resilience of the organization operations should be ensured
by having appropriate business continuity including backup, recovery and off-site
data centre. Business continuity controls ensure that an organization can prevent
interruptions (violations) and processing can be resumed in acceptable period of
time.
Proper development and implementation of application software: Application
software drives the business process of the organizations. These solutions in case
developed and implemented must be properly controlled by using standard software
development process. Controls over software development and implementation and
ensure that the software is developed according to the established policies and
procedures of the organisation. These controls also ensure that the system are
developed within budgets, within budgeted time, security measures are duly
incorporated, and quality and documentation requirements are maintained.
Confidentiality, integrity and availability of software and data files:
security is implemented to ensure confidentiality, integrity and availability (CIA) of
information. Confidentiality refers to protection of critical information to ensure
that information is only available to the persons who have the right to see the same