Domain 2 LDR
Domain 2 LDR
This table provides a clear and concise overview of the key components
involved in the governance and management of IT as per the CISA certification
requirements.
2.1 EGIT ( Enterprise Governance of IT )
3. Consistency with Business Plan: Plan, build, run, and monitor (PBRM -
Plan, Build, Run, Monitor).
IT plans should be consistent with the
organization’s business plan. Focuses on tactical plans.
4. IT Investments: 3. Delegation:
2. Accountability: 2. Policies:
5. IT Plans:
Disclaimer:
Key Aspects of COBIT:
No direct questions are asked on any specific
framework as different exams focus on Covers end-to-end IT processes.
different frameworks.
Provides solutions for every business process
including finance, HR, production, sales,
COBIT-5:
marketing, etc.
Released in 2012 by ISACA. Ensures each top management person is
given accountability and responsibility.
COBIT 2019: The latest version of COBIT.
Helps align IT goals with enterprise goals.
COBIT is a GEIT (Governance of Enterprise IT)
framework. Transforms business by teaching
accountability, responsibility, and how to
It encompasses 37 processes, 206 practices,
turn a business effectively.
1116 tasks, etc.
Examples of frameworks included are ISMS (ISO Illustrations :
27001), Val IT Framework, IT Service
Management (ITIL). COBIT is depicted as a comprehensive
governance framework that aligns IT goals
Governance vs Management: with stakeholders' needs and enterprise
goals.
Governance involves Evaluate, Direct, Monitor
It is likened to a rocket engine that
(EDM).
accelerates the organization’s journey
Management involves Plan, Build, Run, Monitor towards achieving its objectives.
(PBRM).
When COBIT processes are implemented, it's
as if fixing up the rocket engine to accelerate
COBIT's Value:
into the sky.
COBIT integrates all best practices and
Key Concepts:
frameworks into a one-stop solution.
It helps ensure IT investments bring appropriate COBIT principles focus on meeting
results. stakeholder needs and transforming
Customization is available in COBIT for various unstructured needs into structured
industries. enterprise goals and objectives.
ISP Definition: Information Security Policy (ISP) End Users: The policy should be circulated to all
is a statement of intent by management on end users. Relevant portions of security
how to protect a company’s information assets. requirements should be provided to third-party
suppliers.
Auditor’s Role: Sign-off: Obtain sign-off from all employees and
third parties, indicating their preparedness to
Accessibility: Ensure that the policy is readily comply with the ISP.
accessible to all employees and that all Termination Action: The most important action
employees are aware of its contents. when terminating an employee is disabling all
Approval: Ensure the policy is approved by their logical access rights.
senior management, not lower-level staff.
Awareness: Third-party suppliers should also 4. ISP Audit & Alignment
be aware of the policy.
Review Frequency: ISP should be reviewed at Revision Considerations:
least annually or during significant changes.
Ownership: Ensure the policy has an owner Audit Findings: Review and consider audit
responsible for its maintenance and updates. findings.
Reported Incidents: Include reported incidents
2 Hierarchy of ISP in the review.
Legal & Statutory Requirements: Align with
ISP Overview: legal and statutory requirements.
Summary
Function of Committees:
The organizational structure for IT governance and
IT Strategy Committee: Advises the Board on IT management involves the Board of Directors,
strategy and ensures alignment with business Strategy Committee, and IT Steering Committee.
objectives. Takes high-level decisions on IT The Board of Directors provides overall direction
policies and strategies. and decision-making for IT strategies. The Strategy
IT Steering Committee: Responsible for the Committee advises the Board and ensures
implementation of IT strategies, ensuring alignment with business goals, while the IT Steering
projects meet business needs, approving plans Committee oversees the implementation of these
and budgets, and driving IT initiatives. strategies, ensuring projects meet business
requirements and are efficiently executed. The
Involvement of Executive-Level Officers: structure emphasizes the segregation of duties and
the involvement of executive-level officers to
CEO, CIO, and other Key Executives: Involved in optimize IT resources and align IT projects with
the IT Steering Committee to ensure business business needs.
alignment and resource optimization.
MCQ Clarification:
Summary
EA is a crucial process within COBIT that
involves designing and structuring enterprises
to meet both current and future objectives. It
provides a comprehensive view that ensures the
organization adopts successful technologies
and aligns IT strategies with business goals. EA
supports the transformation from the current
state to a desired future state by addressing
challenges from both technology and business
perspectives. Continuous adaptation to
changing environments, customer expectations,
competition, and regulations is essential for
successful EA implementation. The ultimate
goal of EA is to facilitate technology selection Space intentionally left blank-
and adoption, ensuring that IT strategies are in
harmony with business requirements.
2.7 Enterprise Risk Management ( ERM)
Identify Critical Assets: These can include Evaluate Existing Controls: Determine if
hardware, software, information, documents, existing controls are adequate.
etc. Design New Controls: If necessary, design
new controls.
Step 2: Identify Threats & Vulnerabilities Residual Risk vs. Acceptable Risk: Compare
residual risk to acceptable risk (risk
Threats: External factors generally not under appetite).
control that can harm the organization (e.g., o Response:
floods, earthquakes, thieves, viruses).
Vulnerabilities: Internal weaknesses that can If Residual Risk (R.R.) >
be controlled (e.g., no CCTV, no security Acceptable Risk (A.R.): Apply
guards). more controls.
If R.R. < A.R.: Consider
Step 3: Evaluation of Impact withdrawing controls for cost
savings.
Impact of Vulnerability: When a threat exploits
II. Risk Analysis Methods
a vulnerability, it will have an impact.
Qualitative Analysis
Financial Losses: Threats may result in financial
losses such as loss of money or goodwill.
Terminology: Uses terms like high, medium,
Step 4: Calculation of Risk low, severe, moderate, likely, occasional,
rare.
Time Consumption: Simple and less time-
Risk Formula: Risk = Threat x Vulnerability x
consuming compared to quantitative
Impact or Probability.
analysis.
o Risk Event Example: Consider a risk
event with a probability of 1 and an Semi-Quantitative Analysis
impact score of 4; the risk score would
be 4. Probability & Impact Scores: Uses
o Example Calculation: (0.75 x 1000) = probability and impact scores.
750. Quantification: Some quantification for
scores, making it better than qualitative but
less detailed than quantitative.
Time Consumption: More time-consuming
than qualitative but less than quantitative
analysis.
2.7 Enterprise Risk Management ( ERM)
Summary
3. Quantitative Analysis
The Enterprise Risk Management (ERM) process
Detailed Analysis: Uses detailed numerical involves several key steps, starting with the
values for probability, impact, and risk. identification of critical assets and moving through
the identification of threats and vulnerabilities,
o Example: Probability of 80%, Impact of
evaluation of impacts, calculation of risk, and
$10,000, resulting in a risk score of
response to risk. Different methods can be used for
$8,000.
risk analysis, including qualitative, semi-
Time Consumption: Very difficult and time- quantitative, and quantitative approaches, each
consuming due to the detailed analysis with varying levels of detail and time consumption.
required. The goal is to ensure that risks are properly
identified, evaluated, and managed to align with
Process of Risk Analysis the organization's risk appetite and ensure
Maintain Risk Register: Keep a record of effective control measures are in place.
identified risks.
Perform Qualitative Analysis: Assess risks
using qualitative methods.
Select High Risk Items: Identify high-risk items
from the qualitative analysis.
Perform Semi-Quantitative Analysis: Further
analyze high-risk items using semi-quantitative
methods.
Compute Quantitative Analysis: For critical
risks, perform a detailed quantitative analysis.
2.8 Laws & Regulations
General Compliance:
Importance of Compliance:
Focuses on the protection of information assets,
including privacy, intellectual property, and Compliance with laws is crucial to avoid non-
other rights. compliance, which can affect the
organization's going concern.
Industry-Specific Compliance:
It should be given top priority within the
organization to ensure smooth operation
Some compliance requirements are specific to and avoid legal repercussions.
certain industries and must be adhered to
accordingly. Considerations for Cloud Services:
Multi-Jurisdictional Compliance:
The use of offshore or cloud services
introduces additional considerations for
Organizations operating in multiple jurisdictions data protection and privacy laws.
must determine and comply with the laws of all
relevant areas. Key concerns include:
o Compliance with regulations and
Responsibility Assignment: laws.
o Confidentiality of information.
Compliance responsibility should be assigned to
specific individuals or groups from top
Summary
management. This includes adherence to
standards, policies, and procedures. Compliance with laws and regulations is
essential for protecting information assets,
Communication: ensuring privacy, and safeguarding
intellectual property. Organizations must
Standards, policies, procedures, and guidelines adhere to both general and industry-specific
(SPPG) must be communicated through proper compliance requirements and must ensure
documentation and training. that they comply with the laws of all
Proper monitoring of compliance should be in jurisdictions in which they operate.
place. Responsibility for compliance should be
clearly assigned, and communication of
Disciplinary Actions: standards, policies, procedures, and
guidelines should be thorough and well-
Appropriate disciplinary actions should be taken documented. Monitoring compliance and
against offenders to enforce compliance. taking appropriate disciplinary actions
against offenders are necessary steps to
Fraud Reporting: enforce these regulations. Reporting fraud
and ensuring compliance with cloud services
Any instances of fraud should be reported to add further complexity to the compliance
relevant authorities or law enforcement and landscape. Overall, prioritizing compliance
documented by Information Systems (IS) helps maintain the organization's integrity
auditors. and operational stability.
2.9 IT Resource Management
Resource Limitation:
Training and Cross-Training:
Resources, including people and money, are
limited and essential for achieving business Cross-Training: More than one person is
goals. trained for specific jobs.
Optimal utilization of resources is necessary. Advantages: Reduces dependency on
a single employee, facilitates
Human Resource (HR) Management: succession planning.
Disadvantages: Single person
Recruitment, Selection, Training, Performance: knowing all parts of the system could
Includes managing hiring processes, be risky; proper risk assessment is
performance reviews, succession planning, and needed.
more.
Background Checks: Conduct checks during the Vacation Policy:
hiring phase for criminal records, qualifications,
financial issues, etc. Mandatory Vacation: Ensures employees
Non-Disclosure Agreements: Ensure employees take time off, reducing the risk of fraud and
do not disclose confidential information. dependency on specific employees.
Bonding Agreements: Protection against losses
due to theft, carelessness, or job tenure. Note: Termination Policies:
This may not be accepted in some countries.
Conflict of Interest Agreements: Prevent Written Policy: Must have a documented
conflicts of interest. termination policy.
Code of Conduct/Professional Ethics: Establish Notification: Notify staff and security
standards for behavior and ethics. personnel appropriately upon termination.
Non-Compete Agreements: Some employees Voluntary/Involuntary Termination:
may sign agreements not to compete with the Address both types of terminations.
organization post-employment. Access Removal: Revoke physical and logical
access (keys, ID cards, logon IDs, passwords)
upon termination.
Employee Handbook: Distribute to all
Payroll Removal: Remove the employee
employees at the time of hire, including:
from active payroll files.
Standard Policies & Procedures
Termination Interview: Gather feedback
Code of Conduct
from the employee about their experience
Performance Evaluation
and thoughts on management.
Emergency Procedures
Transfers: Apply termination procedures in
case of employee transfers to different
departments.
2.9 IT Resource Management
Summary
Organizational Change Management:
IT Resource Management focuses on the optimal
Top Management Approval: Obtain approval utilization of limited resources, including people
before moving forward with changes or and money. This involves a comprehensive HR
projects. management process that includes recruitment,
IT Department Support: Provide full support for training, performance reviews, background checks,
effective implementation. and adherence to ethical standards through
Training and Feedback: Ensure proper training, agreements and codes of conduct. Cross-training
involvement, and feedback for successful employees reduce dependency risks and enhance
change management. succession planning. Mandatory vacation policies
help prevent fraud and over-dependence on specific
employees. Termination policies ensure orderly
removal of access and gather feedback during exit
interviews. Organizational change management
requires top management approval and robust
support from the IT department, including proper
training and feedback mechanisms. This holistic
approach ensures that IT resources are managed
effectively to meet business goals.
2.10 Outsourcing
Summary
Role of IS Auditors:
Outsourcing is driven by cost savings and accessing
Contract Review: Regularly review contracts specialized services. It can be insourced,
and service levels to ensure compliance. outsourced, or a hybrid approach, including onsite,
Process and Performance Monitoring: Conduct offsite, and offshore options. Choosing the right
periodic checks of processes and performance. option requires considering the core function,
Deviation Handling: Identify and address any expertise needed, cost, quality, and compliance
deviations from agreed service levels. with laws. The outsourcing process involves
defining IT functions, establishing SLAs, comparing
Considerations for Offshore Outsourcing: costs, conducting due diligence, and ensuring legal
compliance. Proper SLAs, multiple suppliers,
Legal and Regulatory Issues: Ensure periodic reviews, and vendor compliance are crucial
compliance with international laws. to managing outsourcing risks. IS auditors play a
Continuity: Plan for continuity of service in key role in monitoring and ensuring compliance.
different time zones. Offshore outsourcing adds complexities, including
Telecommunication Problems: Address legal, continuity, and communication challenges,
potential communication issues across different which must be carefully managed.
geographies.
2.11 IT Performance Monitoring & Reporting
Summary -