All systems should be properly authorized to ensure their economic justification and feasibility.
Users need to be actively involved in the systems development process.
The technical design activities translate user specifications into a set of detailed technical specifications for a system that meets the user's needs.
Documentation is both a control and evidence of control, and it is critical to the system's long-term success.
To meet the governance-related expectations of management under SOX, an organization's internal audit department needs to be independent, objective, and technically qualified.
The internal auditor can play an important role in the control of systems development activities.
All program modules must be thoroughly tested before they are implemented.
Prior to system implementation, the individual modules of the system need to be formally and rigorously tested as a whole.
The test should be composed of user personnel, systems professionals, and internal auditors.
The auditor's objectives are to ensure that:
Systems development activities are applied consistently and in accordance with management's policies to all systems development projects;
The system as originally implemented was free from material errors and fraud;
The system was judged necessary and justified at various checkpoints throughout the SDLC; and
System documentation is sufficiently accurate and complete to facilitate audit and maintenance activities.
The auditor should select a sample of completed projects and review the documentation for evidence of compliance with stated systems development policies.
Upon implementation, the information system enters the maintenance phase of the SDLC.
SPLMS controls four critical functions:
Storing programs on the SPL;
Retrieving programs for maintenance purposes;
Deleting obsolete programs from the library; and
Documenting program changes to provide an audit trail of the changes.
An important feature of SPL management software is the creation of reports that enhance management control and support the audit function.
The SPLMS assigns a version number automatically to each program stored on the SPL.
The auditor's objectives are to determine that:
Maintenance procedures protect applications from unauthorized changes;
Applications are free from material errors; and
Program libraries are protected from unauthorized access.
To establish that program changes were authorized, the auditor should examine the audit trail of program changes for a sample of applications that have undergone maintenance.
The permanent file of the application should contain program change authorization documents that correspond to the current version number of the production application.
The program maintenance authorization should indicate the nature of the change requested and the date of the change.
The auditor can perform three types of tests of controls:
Reconcile the source code;
Review the test results; and
Retest the program
to determine that programs ate free from material errors.
Each application's permanent file should contain the current program listing and listings of all changes made to the application. These documents describe in detail the application's maintenance history.
Every program change should be thoroughly tested before being implemented.
The auditor can retest the application to confirm its integrity.
The existence of a secure program library is central to preventing errors and program fraud.
The auditor can select a sample of programmers and review their access authority.
To test the programmer's access privileges, the auditor may violate the authorization rules in an attempt to access unauthorized libraries.
In addition to general IT controls, SOX requires management and auditors to consider application controls relevant to financial reporting. These controls fall into three broad categories: input controls, processing controls, and output controls.
Access tests verify that individuals, programmed procedures, or messages attempting to access a system are authentic and valid.
Validity tests ensure that the system, processes only data values that conform to specified tolerances.
Accuracy tests ensure that mathematical calculations are accurate and posted to the correct accounts.
Completeness tests identify missing data within a single record and entire records missing from a batch.
Redundancy tests determine that an application processes each record only once.
Audit trail tests ensure that the application creates an adequate audit trail.
This fraud affects large numbers of victims, but each in a minimal way.
Salami Fraud
The __ (also called auditing around the computer) does not require the auditor to create test files or to obtain a detailed knowledge of the application's internal logic.
Black box approach
Through-the-computer employs computer-assisted audit tools and techniques and requires an in-depth understanding of the internal logic of the application under review.
5 Key features of CAATTs:
The test data method;
Base case system evaluation;
Tracing;
Integrated test facility; and
Parallel Simulation.
To employ the test data method approach, the auditor requires detailed and current systems documentation.
Test data should consist of a complete set of valid and invalid transactions.
Base case system evaluation is a variant of the test data approach. BSCE tests are conducted with a set of test transactions containing all possible transaction types.