Why do auditors understand information processing controls and general IT controls?

 

Control activities is one of the components of the company’s system of internal control.

Components of the Company’s System of Internal Control

Control activities include information processing controls and general IT controls, both of which may be manual or automated in nature. It is necessary to identify the IT applications and supporting IT infrastructure to understand of how information relating to significant classes of transactions, account balances and disclosures flows into, through and out the company’s information system.

The greater the extent of automated controls,  that management uses and relies on in relation to its financial reporting, the more important it may become for the company to implement general IT controls that address the functioning of the automated aspects of information processing controls.

The auditor obtains an understanding of the information processing controls and general IT control, through performing risk assessment procedures, by:

1. Identifying IT Applications that are Subject to Risks Arising from the use of IT.

2. Identifying Risks Arising from the Use of IT and General IT Controls.

3. Identifying the company’s general IT controls that address such risks.

 1.Identifying IT Applications that are Subject to Risks Arising from the use of IT

The identification of IT applications on which the company relies may affect the auditor’s decision to test the automated controls within such IT applications, assuming that such automated controls address identified risks of material misstatement. In considering whether the IT applications for which the auditor has identified automated controls are subject to risks arising from the use of IT, the auditor is likely to consider whether, and the extent to which, the company may have access to source code that enables management to make program changes to such controls or the IT applications. The auditor is also likely to consider the risk of inappropriate access or changes to data.

Example characteristics of an IT application that is likely subject to risks arising from IT:

  • Applications are interfaced.
  • The volume of data (transactions) is significant.
  • The application’s functionality is complex as   the application automatically initiates transactions; and  there are a variety of complex calculations underlying automated entries. 
  • IT application is likely subject to risks arising from IT because  management relies on an application system to process or maintain data as the volume of data is significant and  management relies upon the application system to perform certain automated controls that the auditor has also identified.
 2. Identifying Risks Arising from the Use of IT and General IT Controls

Examples of risks arising from the use of IT include risks related to inappropriate reliance on IT applications that are inaccurately processing data, processing inaccurate data, or both, such as:

● Unauthorized access to data that may result in destruction of data or improper changes to data, including the recording of unauthorized or non-existent transactions, or inaccurate recording of transactions. Particular risks may arise where multiple users access a common database.

● The possibility of IT personnel gaining access privileges beyond those necessary to perform their assigned duties therefore breaking down segregation of duties.

● Unauthorized changes to data in master files.

● Unauthorized changes to IT applications or other aspects of the IT environment.

● Failure to make necessary changes to IT applications or other aspects of the IT environment.

● Inappropriate manual intervention.

 ● Potential loss of data or inability to access data as required

3.  Identifying the company’s general IT controls that address such risks

General IT controls are implemented to address risks arising from the use of IT.

General IT controls are policies and procedures that relate to many applications and support the effective functioning of application controls by helping to ensure the continued proper operation of information systems. General IT controls usually include controls over data center and network operations; system software acquisition, change and maintenance; access security; and application system acquisition, development, and maintenance.

Examples of general IT controls that may exist, established by IT process include:

           Process to manage access: authentication, authorization, provisioning, deprovisioning, privileged access, user access reviews, security configuration controls, physical access.

        Process to manage program or other changes to the IT environment:

i)     Controls over the process to design, program, test and migrate changes to a production (i.e., end user) environment.

ii)     Controls that segregate access to make and migrate changes to a production environment.

iii)   Controls over initial IT application development or implementation (or in relation to other aspects of the IT environment).

iv)    Controls over the conversion of data during development, implementation or upgrades to the IT environment.

 Process to manage IT operations: job scheduling, job monitoring, backup and recovery, intrusion detection.


Comments

Popular posts from this blog

Why do auditors use assertions?

Audit report