EDM01 Ensure Governance Framework
EDM01 Ensure Governance Framework
1 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)
Organizational failure to maximize the use of emerging technological opportunities to improve business and IT capability
Performance gaps not identified in a timely manner
Remedial actions to maintain and improve IT process effectiveness and efficiency not identified or implemented
Service deviations and degradations not recognized and addressed, resulting in failure to deliver business requirements
Service performance failures causing legal and regulatory compliance exposures
Technical incompatibilities or maintenance issues within the IT infrastructure
The IT portfolio failing to support the enterprise's objectives and strategies
2 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)
3. Understand,
3 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)
EDM01.01.02 - Business Determine the significance of IT 1. Obtain the Company and IT Scorecard's (or other similar strategic planning documentation).
Significance and its role with respect to the
2. Review, compare, and analyze the two sets of documents to determine the significance of IT:
business
a. In the number of strategic level measureable goals, and
b. In the significance of each goal
EDM01.01.03 - External Determine if and analyze how IT 1. From the listing of the regulations and laws that affect this organization’s IT, analyze how they
Influences considers external regulations, apply to the Company's governance.
laws and contractual obligations
and how to apply them within the 2. Through inquiry, understand how IT monitors and applies these laws and regulations within the
governance of enterprise IT. governance of IT.
EDM01.01.04 - Ethical Determine if and analyze how IT 1. Obtain the Company's statement of direction and any related IT direction documents.
Use of Information aligns the ethical use and
2. Through analysis, determine the influence that society, natural environment, and internal and
processing of information; its
4 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)
5 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)
EDM01.01.07 - Understand IT’s decision-making 1. Obtain, if possible, the annual planning document for managers.
Decision-Making Culture culture and determine the optimal 2. Determine if these planning documents roll up to the head of IT and if that, in turn, rolls up
decision making model. and ties to the corporate planning documents.
3. From an analysis of these documents and inquiry, determine how decisions are made.
EDM01.01.08 - Determine and analyze the 1. For financial decision-making, obtain and review financial decision-making delegation rules
Delegation appropriate levels of authority that may apply to IT.
delegation, including threshold 2. Through inquiry of IT management, determine the levels of authority delegation, including
rules, for IT decisions. threshold rules, for IT decisions.
3. Analyze and determine that the delegations are appropriate and meet the letter and spirit of
the Company's policies.
6 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)
Direct the governance system. Inform leaders and obtain their support, buy-in and commitment. Guide the structures, processes and practices for the
governance of IT in line with agreed- on governance design principles, decision-making models and authority levels. Define the information required for informed
decision-making.
Activity Title1 Activity Assessment Activity Assessment Step(s)2
Objectives1
EDM01.02.01 - Determine and analyze how IT 1. Obtain recent Board and Audit Committee minutes. Review them to determine if regular and
Governance communicates governance of IT special reporting occurs from IT.
Communications principles and agrees with
2. Obtain the most recent minutes of the IT Steering Committee. Determine that IT governance
executive management on the
status and issues are reported and any issues acted upon.
way to establish informed and
committed leadership.
EDM01.02.02 - Determine and analyze how IT 1. Through inquiry of the IT management team, determine their governance processes and
Governance Structure establishes or delegates the practices.
Design establishment of governance
2. Appropriate management governance structures exist, such as the IT strategy committee,
structures, processes and
IT steering committee, technology council, IT architecture review board and IT audit
practices to be in line with agreed-
committee. Verify that terms of reference and charters exist for each of these.
on design principles.
3. Determine if these are compatible with the corporate governance design.
EDM01.02.03 - Understand how IT allocates Through inquiry of the CIOs direct reports, determine and understand that the CIO allocates
Responsibility Allocation responsibility, authority, and responsibility, authority and accountability in line with agreed-on governance design principles,
7 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)
8 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)
9 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)
10 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)
Create multiple risk scenarios for each risk identified in the summary above that affects achieving the objective.
Risk Scenario - Describe the risk/opportunity scenario, including a discussion of the negative and positive impact of the scenario. The description clarifies the threat/
vulnerability type and includes the actors, events, assets and time issues.
Malicious
⃣ Accidental
⃣ Error
⃣ Failure
⃣ Natural
⃣ External requirement
Actor (Who or what could trigger the threat that exploits a vulnerability) ⃣ Internal
⃣ External
⃣ Human
⃣ Non-Human
Event (Something that happens that was not supposed to happen, something does not ⃣ Disclosure
happen that was supposed to happen, or a change in circumstances. Events always have ⃣ Interruption
causes and usually have consequences. A consequence is the outcome of an event and has ⃣ Modification
an impact on objectives.) ⃣ Theft
⃣ Destruction
⃣ Ineffective design
⃣ Ineffective execution
⃣ Rules and regulations
⃣ Inappropriate use
Asset (An asset is something of tangible or intangible value that is worth and skills protecting, ⃣ Process
12 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)
13 1 - © 2012 ISACA. All rights reserved. COBIT® 5 is a registered trademark of the Information Systems Audit and Control Association (ISACA)