It Governance Group 3
It Governance Group 3
BOHOL
VICTORIA ANNE DIAZ
RHEANNE JOY RAGSAG
KAREN LAS-AY
MARY ANGELINE SON
NIAH MARGARETT
ANDRUE FACTOR
LOURDES SOLIVA
SHARA MAE ADENA
VENUS MIANO
ROSEMARIE LANTAJO
JULLANE ACERDIN
JOHN KEVIN CANAMAQUE
Learners are expected to have
insights about IT governance
PRESIDENT
SYSTEM DATA
DATABASE
DEVELOPMENT PROCESSING
ADMINISTRATOR
MANAGER MANAGER
Processing • The electronic files produced in data convertion are later processed by
the central computer, which is managed by the computer operations
Computer
The data processing group Operations groups.
manages the computer
resources used to perform the
day-to-day processing of • The data library is a room adjacent to the computer center that provides
transactions. It consists of the safe storage for the off-line data files.
Data Library
following organizational
functions:
GOVERNANCE MANAGEMENT
• EVALUATION • PLANS
• DIRECTION • BUILDS
• MONITOR • RUN
• MONITOR
COBIT defines the components to build and sustain a
governance system: processes, organizational
structures, policies and procedures, information flows,
culture and behaviors, skills, and infrastructure.
ses
• 1996 ISACA released the first edition of COBIT
Evoluti framework
• 2003 ISACA created an online version of the third
on of edition of COBIT
• 2007 COBIT 4.1
COBIT • 2012 COBIT coordinated with frameworks and
standards
2019 • 2018 ISACA published COBIT 2019
• 2024 COBIT 2019 in a digital landscape
COBIT 5 COBIT 2019
Five governance principles Six governance principles
37 processes 40 processes
End-to-end Enabling a
Governance
COBIT System
governance
system
holistic
approach
2019 was
The Six
developed Principles for
on two a Governance
System
sets of Governance Tailored to
principles: Framework the enterprise
Dynamic
governance
needs
Separating
governance
from
management
Meeting
stakeholde
r needs
Tailored to
Enabling a
the
holistic
enterprise
approach
needs
The Six
Principles
for a
Governanc
e System
Tailored to
Dynamic
the
governanc
enterprise
e
needs
Separating
governanc
e from
manageme
nt
By adhering to these
principles, organizations
can establish a mature
and effective IT Based on conceptual
model
governance framework.
COBIT provides detailed The Three
process descriptions, Principles for a Open and flexible
design factors, and Governance
performance
Aligned to major
management practices to standards
support organizations in
implementing these
principles
Based on conceptual
model
Aligned to major
standards
IT Business Processes
Alignment Services,
Infrastructur Organization
e and al Structure
Applications
Benefits COBIT
IT Risk
of COBIT Management People,
Component
s of
Governanc Principles,
2019 Skills and
Competenci
es
e System Policies and
Frameworks
IT
Performance
Culture,
and Value Ethics and Information
Behavior
Optimization
Processes
Services,
Infrastructure Organizational
and Structure
Applications
COBIT
Componen
ts of
People, Skills Governanc Principles,
and e System Policies and
Competencies Frameworks
Culture, Ethics
Information
and Behavior
Policies, procedures, and standards define IT organizational
behavior and uses of technology. They are part of the written
record that defines how the IT organization performs the services
that support the organization. As an IT auditor, you must
understand the purpose of your audit.
STANDARDS
•These are mid-level documents to ensure uniform application of a policy. After a standard
is approved by management, compliance is mandatory. All standards are used as reference
points to ensure organizational compliance. Testing and audits compare a subject to the
standard, with the intention of certifying a minimum level of uniform compliance.
GUIDELINES
•These are intended to provide advice pertaining to how organizational objectives might be
obtained in the absence of a standard. The purpose is to provide information that would aid
in making decisions about intended goals (should do), beneficial alternatives (could do) and
actions that would not create problems (won't hurt). Guidelines are often discretionary.
PROCEDURES
•These are “cookbooks” recipes for accomplishing specific tasks necessary to meet a
standard. Details are written in step-by-step format from the very beginning to the end.
Good procedures include common troubleshooting steps in case the user encounters a
known problem. Compliance with established procedures is mandatory to ensure
consistency and accuracy. The purpose of a procedure is to maintain control over the
outcome. Procedures are written to support the implementation of the policies.
An IT Governance audit assesses the
performance and efficiency of IT
processes and activities to identify areas
for improvement. This includes evaluating
the effectiveness of IT strategies, the
efficiency of resource allocation, and the
reliability of IT systems and infrastructure.
“the internal audit activity must
assess whether the information
technology governance of the
organization supports the
organization's strategies and
objectives (2110)”
OBJECTIVES:
• Ensure the IT organization has adopted and applied sound project
management techniques for each project undertaken which includes
project ownership, user involvement, task breakdown and milestones,
allocation of responsibilities, cost, quality plan, and security plan for
sensitive systems.
• Verify a change management system exists which provides for analysis,
implementation and follow-up of all charges requested and made to
the existing IT infrastructure.
• Verify that appropriate information security policies have been
established and communicated to user community and ensure a
process is in place to monitor compliance to security policies.
DISTRIBUTED DATA PROCESSING (DDP)
DESTRUCTION OF TRAILS
•an audit trail provides the linkage between a company’s financial activities (transactions)
and the financial statements that report on those activities.
LACK OF STANDARDS
•because of the distribution of responsibility in the DDP environment, standards for
developing and documenting system, choosing programming languages, acquiring
hardware and software, and evaluating performance may be unevenly applied or even
nonexistent
ADVANTAGES OF DDP
1. COST REDUCTIONS
4. BACKUP FLEXIBILITY
CONTROLLING
THE DDP Central testing of
commercial
ENVIRONMENT software and
hardware
Fault
Construction
Tolerance
THE
COMPUTER
SYSTEM
Fire
Access
Suppression
Air
Conditioning
The physical location of the computer center directly affects
the risk of destruction to a natural or man-made disaster
Physical
Location
Must be located in a single-story building of
solid construction with controlled access
Construction
THE COMPUTER
SYSTEM Should be limited to the operators and other
employees who work there
Access
Location
Air
Conditioning
Computers function best in an air-conditioned environment and
providing adequate air conditioning is often a requirement of the
vendor's warranty
AUDIT OBJECTIVE
The auditor must verify Tests of Physical
Construction
that:
• Physical security Tests for Tests of the Fire
Insurance Detection
controls are adequate to Coverage System
reasonably protect the
organization from AUDIT
PROCEDURE
physical exposures.
• Insurance coverage on Tests of the
Tests of Access
equipment is adequate Uninterruptible
Power Supply
Control
to compensate the
organization for the Tests of RAID
destruction of, damage
to, its computer center.
.
DISASTER RECOVERY
PLANNING
• Identify critical
applications
• Create a disaster
recovery team
• Provide site back-up
• Specify back-up and
off-site procedures
• Provide Site Back-up
DRP TEAM
COORDINATOR VP
OPERATIONS
Mutual aid pact- An agreement SECOND SITE FACILITIES PROGRAM AND DATA DATA CONVERTION AND
GROUP BACK-UP GROUP DATA CONTROL GROUP
between two or more organizations
to aid each other with their data SYSTEM DEVELOPMENT MANAGER DATA
DP MANAGER
processing needs in the event of a MANAGER CONTROL
disaster.
PLANT SYSTEM MAINTENANCE MANAGER DATA
Empty Shell - An arrangement ENGINEER MANAGER CONVERTION
INTERNAL AUDIT
REPRESENTATIVE
Site backup