Sunteți pe pagina 1din 11

Audcis – Chapter 2 that is controlled by the central

computer’s operating system.


Information technology (IT) governance
3. Data Library
 a relatively new subset of corporate  The data library is a room adjacent to
governance that focuses on the the computer center that provides safe
management and assessment of storage for the off-line data files.
strategic IT resources.
Systems Development and Maintenance
Key objectives
The information systems needs of users are
 reduce risk met by two related functions: system
 ensure that investments in IT resources development and systems maintenance.
add value to the corporation Systems Development
IT Governance Controls  responsible for analyzing user needs
1. Organizational structure of the IT function and for designing new systems to satisfy
those needs.
2. Computer center operations
The participants in system development
3. Disaster recovery planning activities
Structure Of The Information Technology Systems professionals
Function
 systems analysts
 The organization of the IT function has  database designers
implications for the nature and
 programmers
effectiveness of internal controls, which,
 design and build the system. Systems
in turn, has implications for the audit.
professionals gather facts about the user’s
problem, analyze the facts, and formulate a
Centralized Data Processing
solution.
 all data processing is performed by one
 The product of their efforts is a new
or more large computers housed at a
information system.
central site that serves users throughout
the organization. End users
Database Administration  those for whom the system is built. They
are the managers who receive reports from
 Centrally organized companies maintain
the system and the operations personnel
their data resources in a central location
who work directly with the system as part of
that is shared by all end users. In this
their daily responsibilities.
shared data arrangement, an
independent group headed by the Stakeholders
database administrator (DBA) is
 accountants
responsible for the security and integrity
of the database.  internal auditors
 external auditors
Data Processing  others who oversee systems
 The data processing group manages the development.
computer resources used to perform the  individuals inside or outside the firm who
day-to-day processing of transactions. have an interest in the system, but are not
end users.
It consists of the following organizational  Once a new system has been designed and
functions: implemented, the systems maintenance
group assumes responsibility for keeping it
1. Data Conversion
current with user needs.
 The data conversion function
transcribes transaction data from hard- Maintenance
copy source documents into computer
input.  refers to making changes to program
2. Computer Operations logic to accommodate shifts in user
 The electronic files produced in data needs over time.
conversion are later processed by the Segregation of Incompatible IT Functions
central computer, which is managed by
the computer operations groups. 1. Separate transaction authorization from
 Accounting applications are usually transaction processing.
executed according to a strict schedule
2. Separate record keeping from asset There are at least two explanations for this
custody. phenomenon.
3. Divide transaction-processing tasks among  Documenting systems is not as
individuals such that short of collusion between interesting as designing, testing, and
two or more individuals fraud would not be implementing them. Systems
possible. professionals much prefer to move on to
an exciting new project rather than
Separating Systems Development from
document one just completed.
Computer Operations
 Job security. When a system is poorly
 Greatest importance. documented, it is difficult to interpret,
 The relationship - extremely formal test, and debug.
 Responsibilities should not be
Program Fraud
commingled.
 Create (and maintain) systems for  When the original programmer of a
users, and should have no involvement system is also assigned maintenance
in entering data, or running applications. responsibility, the potential for fraud is
 Operations staff should run these increased.
systems and have no involvement in  Involves making unauthorized changes
their design. to program modules for the purpose of
 These functions are inherently committing an illegal act.
incompatible, and consolidating them
invites errors and fraud. A Superior Structure for Systems
Development
Separating Database Administration from  The new systems development group is
Other Functions responsible for designing, programming,
DBA function and implementing new systems
projects.
 responsible for a number of critical tasks  Upon successful implementation,
pertaining to database security, responsibility for the system’s ongoing
including creating the database schema maintenance falls to the systems
and user views, assigning database maintenance group.
access authority to users, monitoring
database usage, and planning for future Benefits
expansion.  Documentation standards are improved
because the maintenance group
 Delegating these responsibilities to others requires documentation to perform its
who perform incompatible tasks threatens maintenance duties.
database integrity.  Denying the original programmer future
Separating New Systems Development from access to the program deters program
Maintenance fraud.
 The success of this control depends on the
Systems analysis group existence of other controls that limit,
 Works with the users to produce prevent, and detect unauthorized access to
detailed designs of the new systems. programs (such as source program library
controls).
Programming group
Distributed data processing (DDP)
 codes the programs according to these
design specifications. Under this  An alternative to the centralized model
approach  Involves reorganizing the central IT
 the programmer who codes the original function into small IT units that are
programs also maintains the system placed under the control of end users.
during the maintenance phase of the
systems development life cycle  The IT units may be distributed according
to business function, geographic location,
Control Problems or both.
Inadequate Documentation Risks Associated with DDP
 Poor-quality systems documentation is a Inefficient Use of Resources
chronic IT problem and a significant
challenge for many organizations DDP can expose and organization to three
seeking SOX compliance. types of risks associated with inefficient use of
organizational resources
 the risk of mismanagement of hardware and software, and evaluating
organization-wide IT resources by end performance may be unevenly applied
users. or even nonexistent.
 DDP can increase the risk of operational  Opponents of DDP argue that the risks
inefficiencies because of redundant associated with the design and
tasks being performed within the end- operation of a DDP system are made
user committee. tolerable only if such standards are
 DDP environment poses a risk of consistently applied.
incompatible hardware and software Advantages of DDP
among end-user functions.
Cost Reductions.
Destruction of Audit Trails
 Powerful and inexpensive
Audit trail microcomputers and minicomputers that
 provides the linkage between a can perform specialized functions have
company’s financial activities changed the economics of data
(transactions) and the financial processing dramatically.
statements that report on those  In addition, the unit cost of data storage,
activities. which was once the justification for
 Auditors use the audit trail to trace consolidating data in a central location,
selected financial transactions from the is no longer a prime consideration.
source documents that captured the  Moreover, the move to DDP has
events, through the journals, subsidiary reduced costs in two other areas: (1)
ledgers, and general ledger accounts data can be edited and entered by the
that recorded the events, and ultimately end user, thus eliminating the
to the financial statement themselves. centralized task of data preparation; and
 The audit trail is critical to the auditor’s (2) application complexity can be
attest service. reduced, which in turn reduces systems
development and maintenance costs.
Inadequate Segregation of Duties
Improved Cost Control Responsibility
 Achieving an adequate segregation of
duties may not be possible in some  End-user managers carry the
distributed environments. The responsibility for the financial success of
distribution of the IT services to users their operations.
may result in the creation of small  This responsibility requires that they be
independent units that do not permit the properly empowered with the authority
desired separation of incompatible to make decisions about resources that
functions. influence their overall success.
 When managers are precluded from
Hiring Qualified Professionals making the decisions necessary to
 End-user managers may lack the IT achieve their goals, their performance
knowledge to evaluate the technical can be negatively influenced.
credentials and relevant experience of  A less aggressive and less effective
candidates applying for IT professional management may evolve.
positions.  Proponents of DDP contend that the
 If the organizational unit into which a benefits of improved management attitudes
new employee is entering is small, the more than outweigh any additional costs
opportunity for personal growth, incurred from distributing these resources.
continuing education, and promotion  They argue that if IT capability is indeed
may be limited. critical to the success of a business
 Managers may experience difficulty operation, then management must be given
attracting highly qualified personnel. control over these resources.
 The risk of programming errors and Improved User Satisfaction
system failures increases directly with
the level of employee incompetence.  Perhaps the most often cited benefit of
DDP is improved user satisfaction. DDP
Lack of Standards proponents claim that distributing
 Because of the distribution of system to end users improves three
responsibility in the DDP environment, areas of need that too often go
standards for developing and unsatisfied in the centralized model:
documenting systems, choosing (1) users desire to control the resources that
programming languages, acquiring influence their profitability
(2) users want systems professionals software and hardware and avoid many
(analysts, programmers, and computer problems discussed earlier.
operators) to be responsive to their specific
User Services.
situation
A valuable feature of the corporate group is its
(3) users want to become more actively
user services function. This activity provides
involved in developing and implementing their
technical help to users during the installation of
own systems.
new software and in troubleshooting hardware
Backup Flexibility and software problems. The creation of an
electronic bulletin board for users is an
 The final argument in favor of DDP is
excellent way to distribute information about
the ability to back up computing facilities
common problems and allows the sharing of
to protect against potential disasters
user-developed programs with others in the
such as fires, floods, sabotage, and
organization. In addition, a chat room could be
earthquakes.
established to provide threaded discussions,
 The only way to back up a central
frequently asked questions (FAQs), and
computer site against such disasters is
intranet support. The corporate IT function
to provide a second computer facility.
could also provide a help desk, where users
 The distributed model offers
can call and get a quick response to questions
organizational flexibility for providing
and problems.
backup.
In many organizations user services staff teach
Controlling the DDP Environment
technical courses for end users as well as for
DDP carries a certain leading-edge prestige computer services personnel. This raises the
value that, during an analysis of its pros and level of user awareness and promotes the
cons, may overwhelm important considerations continued education of technical personnel.
of economic benefit and operational feasibility.
Standard-Setting Body.
Many DDP initiatives have proven to be
The relatively poor control environment
ineffective, and even counterproductive,
imposed by the DDP model can be improved
because decision makers saw in these
by establishing some central guidance. The
systems virtues that were more symbolic than
corporate group can contribute to this goal by
real. Before taking an irreversible step,
establishing and distributing to user areas
decision makers must assess the true merits of
appropriate standards for systems
DDP for their organization. Nevertheless,
development, programming, and
careful planning and implementation of controls
documentation.
can mitigate some of the DDP risks previously
discussed. Personnel Review.
Implement a Corporate IT Function The corporate group is often better equipped
than users to evaluate the technical credentials
The completely centralized model and the
of prospective systems professionals. Although
distributed model represent extreme positions
the systems professional will actually be part of
on a continuum of structural alternatives. The
the end-user group, the involvement of the
needs of most firms fall somewhere between
corporate group in employment decisions can
these end points. Often, the control problems
render a valuable service to the organization.
previously described can be addressed by
implementing a corporate IT function Audit Objective
Central Testing of Commercial Software and The auditor’s objective is to verify that the
Hardware. structure of the IT function is such that
individuals in incompatible areas are
A centralized corporate IT group is better
segregated in accordance with the level of
equipped than are end users to evaluate the
potential risk and in a manner that promotes a
merits of competing commercial software and
working environment. This is an environment in
hardware products under consideration. A
which formal, rather than casual, relationships
central, technically astute group such as this
need to exist between incompatible tasks.
can evaluate systems features, controls, and
compatibility with industry and organizational Audit Procedures
standards. Test results can then be distributed
The following audit procedures would apply to
to user areas as standards for guiding
an organization with a centralized IT function:
acquisition decisions. This allows the
organization to effectively centralize the  Review relevant documentation,
acquisition, testing, and implementation of including the current organizational
chart, mission statement, and job
descriptions for key functions, to Construction
determine if individuals or groups are
Ideally, a computer center should be located in
performing incompatible functions.
a single-story building of solid construction with
 Review systems documentation and
controlled access (discussed next). Utility
maintenance records for a sample of
(power and telephone) lines should be
applications.
underground. The building windows should not
 Verify that maintenance programmers
open and an air filtration system should be in
assigned to specific projects are not
place that is capable of extracting pollens,
also the original design programmers.
dust, and dust mites.
 Verify that computer operators do not
have access to the operational details of Access
a system’s internal logic. Systems
Access to the computer center should be
documentation, such as systems
limited to the operators and other employees
flowcharts, logic flowcharts, and
who work there. Physical controls, such as
program code listings, should not be
locked doors, should be employed to limit
part of the operation’s documentation
access to the center. Access should be
set.
controlled by a keypad or swipe card, though
 Through observation, determine that fire monitored by closed-circuit cameras and
segregation policy is being followed in video recording systems. Computer centers
practice. should also use sign-in logs for programmers
 Review operations room access logs to and analysts who need access to correct
determine whether programmers enter program errors. The computer center should
the facility for reasons other than system maintain accurate records of all such traffic.
failures.
Air Conditioning
The following audit procedures would apply to
an organization with a distributed IT function: Computers function best in an air-conditioned
environment, and providing adequate air
 Review the current organizational chart, conditioning is often a requirement of the
mission statement, and job descriptions vendor’s warranty. Computers operate best in
for key functions to determine if a temperature range of 70 to 75 degrees
individuals or groups are performing Fahrenheit and a relative humidity of 50
incompatible duties. percent. Logic errors can occur in computer
 Verify that corporate policies and hardware when temperatures depart
standards for systems design, significantly from this optimal range. Also, the
documentation, and hardware and risk of circuit damage from static electricity is
software acquisition are published and increased when humidity drops. In contrast,
provided to distributed IT units. high humidity can cause molds to grow and
 Verify that compensating controls, such paper products (such as source documents) to
as supervision and management swell and jam equipment.
monitoring, are employed when
segregation of incompatible duties is Fire Suppression
economically infeasible. Fire is the most serious threat to a firm’s
 Review systems documentation to verify computer equipment. Many companies that
that applications, procedures, and suffer computer center fires go out of business
databases are designed and functioning because of the loss of critical records, such as
in accordance with corporate standards. accounts receivable. The implementation of an
THE COMPUTER CENTER effective fire suppression system requires
consultation with specialists. However, some of
Physical Location the major features of such a system include the
following:
The physical location of the computer center
directly affects the risk of destruction to a 1. Automatic and manual alarms should be
natural or man-made disaster. To the extent placed in strategic locations around the
possible, the computer center should be away installation. These alarms should be connected
from human-made and natural hazards, such to permanently staffed fire-fighting stations.
as processing plants, gas and water mains,
airports, high-crime areas, flood plains, and 2. There must be an automatic fire
geological faults. The center should be away extinguishing system that dispenses the
from normal traffic, such as the top floor of a appropriate type of suppressant for the
building or in a separate, self-contained location.2 For example, spraying water and
building. Locating a computer in the basement certain chemicals on a computer can do as
building increases its risk to floods. much damage as the fire.
3. Manual fire extinguishers should be placed Tests of Physical Construction.
at strategic locations.
The auditor should obtain architectural plans to
4. The building should be of sound construction determine that the computer center is solidly
to withstand water damage caused by fire built of fireproof material. There should be
suppression equipment. adequate drainage under the raised floor to
allow water to flow away in the event of water
5. Fire exits should be clearly marked and
damage from a fire in an upper floor or from
illuminated during a fire.
some other source. In addition, the auditor
Fault Tolerance should assess the physical location of the
computer center. The facility should be located
Fault tolerance is the ability of the system to in an area that minimizes its exposure to fire,
continue operation when part of the system civil unrest, and other hazards.
fails because of hardware failure, application
program error, or operator error. Implementing Tests of the Fire Detection System.
fault tolerance control ensures that no single
The auditor should establish that fire detection
point of potential system failure exists. Total
and suppression equipment, both manual and
failure can occur only if multiple components
automatic, are in place and tested regularly.
fail.
The fire-detection system should detect smoke,
1. Redundant arrays of independent disks heat, and combustible fumes. The evidence
(RAID). Raid involves using parallel disks that may be obtained by reviewing official fire
contain redundant elements of data and marshal records of tests, which are stored at
applications. If one disk fails, the lost data are the computer center.
automatically reconstructed from the redundant
Tests of Access Control.
components stored on the other disks.
The auditor must establish that routine access
2. Uninterruptible power supplies.
to the computer center is restricted to
Commercially provided electrical power
authorized employees. Details about visitor
presents several problems that can disrupt the
access (by programmers and others), such as
computer center operations, including total
arrival and departure times, purpose, and
power failures, brownouts, power fluctuations,
frequency of access, can be obtained by
and frequency variations. The equipment used
reviewing the access log. To establish the
to control these problems includes voltage
veracity of this document, the auditor may
regulators, surge protectors, generators, and
covertly observe the process by which access
backup batteries. In the event of a power
is permitted, or review videotapes from
outage, these devices provide backup power
cameras at the access point, if they are being
for a reasonable period to allow commercial
used.
power service restoration.
Tests of Raid.
In the event of an extended power outage, the
backup power will allow the computer system Most systems that employ RAID provide a
to shut down in a controlled manner and graphical mapping of their redundant disk
prevent data loss and corruption that would storage. From this mapping, the auditor should
otherwise result from an uncontrolled system determine if the level of RAID in place is
crash. adequate for the organization, given the level
of business risk associated with disk failure. If
Audit Objectives
the organization is not employing RAID, the
The auditor’s objective is to evaluate the potential for a single point of system failure
controls governing computer center security. exists. The auditor should review with the
system administrator alternative procedures for
Specifically, the auditor must verify that: recovering from a disk failure.
• Physical security controls are adequate to Tests of the Uninterruptible Power Supply.
reasonably protect the organization from
physical exposures The computer center should perform periodic
tests of the backup power supply to ensure that
• Insurance coverage on equipment is it has sufficient capacity to run the computer
adequate to compensate the organization for and air conditioning. These are extremely
the destruction of, or damage to, its computer important tests, and their results should be
center formally recorded. As a firm’s computer
Audit Procedures systems develop, and its dependency
increases, backup power needs are likely to
The following are tests of physical security grow proportionally. Indeed, without such tests,
controls. an organization may be unaware that it has
outgrown its backup capacity until it is too late.
Tests for Insurance Coverage. Recovering from a disaster depends on timely
corrective action. Delays in performing
The auditor should annually review the
essential tasks prolongs the recovery period
organization’s insurance coverage on its
and diminishes the prospects for a successful
computer hardware, software, and physical
recovery. To avoid serious omissions or
facility. The auditor should verify that all new
duplication of effort during implementation of
acquisitions are listed on the policy and that
the contingency plan, task responsibility must
obsolete equipment and software have been
be clearly defined and communicated to the
deleted. The insurance policy should reflect
personnel involved.
management’s needs in terms of extent of
coverage. The team members should be experts in their
areas and have assigned tasks. Following a
DISASTER RECOVERY PLANNING
disaster, team members will delegate subtasks
Types of Disasters to their subordinates.

Natural disaster such as hurricanes, wide- It should be noted that traditional control
spread flooding, and earthquakes are the most concerns do not apply in this setting. The
potentially devastating of the three from a environment created by the disaster may make
societal perspective because they can it necessary to violate control principles such
simultaneously impact many organizations as segregation of duties, access controls, and
within the affected geographic area. supervision.

Human-made disasters, such as sabotage or Providing Second-Site Backup


errors, can be just as destructive to an
A necessary ingredient in a DRP is that it
individual organization, but tend to be limited in
provides for duplicate data processing facilities
their scope of impact.
following a disaster. Among the options
System failures such as power outages or a available the most common are mutual aid
hard-drive failure are generally less severe, but pact; empty shell or cold site; recovery
are the most likely to occur. disaster recovery operations center or hot site; and internally
plan (DRP). provided backup. Each of these is discussed in
the following sections.
This is a comprehensive statement of all
actions to be taken before, during, and after Mutual Aid Pact. A mutual aid pact is an
any type of disaster. Although the details of agreement between two or more organizations
each plan are unique to the needs of the (with compatible computer facilities) to aid
organization, all workable plans possess four each other with their data processing needs in
common features: the event of a disaster. In such an event, the
host company must disrupt its processing
1. Identify critical applications schedule to process the critical transactions of
2. Create a disaster recovery team the disaster-stricken company.

3. Provide site backup In effect, the host company itself must go into
an emergency operation mode and cut back on
4. Specify backup and off-site storage the processing of its lower-priority applications
procedures to accommodate the sudden increase in
Identify Critical Applications demand for its IT resources.

The first essential element of a DRP is to The popularity of these reciprocal agreements
identify the firm’s critical applications and is driven by economics; they are relatively cost-
associated data files. Recovery efforts must free to implement. In fact, mutual aid pacts
concentrate on restoring those applications work better in theory than in practice. In the
that are critical to the short-term survival of the event of a disaster, the stricken company has
organization. Obviously, over the long term, all no guarantee that the partner company will live
applications must be restored to pre-disaster up to its promise of assistance. To rely on such
business activity levels. The DRP, however, is an arrangement for substantive relief during a
a short-term document that should not attempt disaster requires a level of faith and untested
to restore the organization’s data processing trust that is uncharacteristic of sophisticated
facility to full capacity immediately following the management and its auditors.
disaster. To do so would divert resources away Empty Shell. The empty shell or cold site plan
from critical areas and delay recovery. The is an arrangement wherein the company buys
plan should therefore focus on short-term or leases a building that will serve as a data
survival, which is at risk in any disaster center. In the event of a disaster, the shell is
scenario. available and ready to receive whatever
Creating a Disaster Recovery Team hardware the temporary user needs to run
essential systems. This approach, however, Backup Data Files. The state-of-the-art in
has a fundamental weakness. Recovery database backup is the remote mirrored site,
depends on the timely availability of the which provides complete data currency. Not all
necessary computer hardware to restore the organizations are willing or able to invest in
data processing function. Management must such backup resources. As a minimum,
obtain assurances through contracts with however, databases should be copied daily to
hardware vendors that, in the event of a high-capacity, high-speed media, such as tape
disaster, the vendor will give the company’s or CDs/DVDs and secured offsite.
needs priority. An unanticipated hardware
In the event of a disruption, reconstruction of
supply problem at this critical juncture could be
the database is achieved by updating the most
a fatal blow.
current backed-up version with subsequent
Recovery Operations Center. A recovery transaction data. Likewise, master files and
operations center (ROC) or hot site is a fully transaction files should be protected.
equipped backup data center that many
Backup Documentation. The system
companies share. In addition to hardware and
documentation for critical applications should
backup facilities, ROC service providers offer a
be backed up and stored off-site along with the
range of technical services to their clients, who
applications. System documentation can
pay an annual fee for access rights. In the
constitute a significant amount of material and
event of a major disaster, a subscriber can
the backup process is complicated further by
occupy the premises and, within a few hours,
frequent application changes (see Chapter 5).
resume processing critical applications.
Documentation backup may, however, be
Internally Provided Backup. Larger simplified and made more efficient through the
organizations with multiple data processing use of Computer Aided Software Engineering
centers often prefer the self-reliance that (CASE) documentation tools. The DRP should
creating internal excess capacity provides. This also include a provision backing up end-user
permits firms to develop standardized manuals because the individuals processing
hardware and software configurations, which transactions under disaster conditions may not
ensure functional compatibility among their be usual staff who are familiar with the system.
data processing centers and minimize cutover
Backup Supplies and Source Documents. The
problems in the event of a disaster.
organization should create backup inventories
Backup and Off-Site Storage Procedures of supplies and source documents used in
processing critical transactions.
All data files, applications, documentation, and
supplies needed to perform critical functions Examples of critical supplies are check stocks,
should be automatically backed up and stored invoices, purchase orders, and any other
at a secure off-site location. Data processing special-purpose forms that cannot be obtained
personnel should routinely perform backup and immediately. The DRP should specify the types
storage procedures to obtain and secure these and quantities needed of these special items.
critical resources. Because these are such routine elements of
the daily operations, they are often overlooked
Operating System Backup. If the company
by disaster contingency planners.
uses a cold site or other method of site backup
that does not include a compatible operating At this point, it is worth noting that a copy of the
system (O/S), procedures for obtaining a current DRP document should also be stored
current version of the operating system need to off-site at a secure location.
be clearly specified. The data librarian, if one
Testing the DRP. The most neglected aspect
exists, would be a key person to involve in
of contingency planning is testing the DRP.
performing this task in addition to the
Nevertheless, DRP tests are important and
applications and data backups procedures
should be performed periodically.
discussed next.
Tests measure the preparedness of personnel
Application Backup. Based on results obtained
and identify omissions or bottlenecks in the
in the critical applications step discussed
plan.
previously, the DRP should include procedures
to create copies of current versions of critical A test is most useful when the simulation of a
applications. In the case of commercial disruption is a surprise. When the mock
software, this involves purchasing backup disaster is announced, the status of all
copies of the latest software upgrades used by processing affected by it should be
the organization. For in-house developed documented.
applications, backup procedures should be an
integral step in the systems development and This approach provides a benchmark for
program change process. subsequent performance assessments.
The plan should be carried through as far as is the number of ROC members and their
economically feasible. Ideally, that would geographic dispersion. A widespread disaster
include the use of backup facilities and may create a demand that cannot be satisfied
supplies. by the ROC facility.
The progress of the plan should be noted at Critical Application List. The auditor should
key points throughout the test period. review the list of critical applications to ensure
that it is complete. Missing applications can
At the conclusion of the test, the results can
result in failure to recover. The same is true,
then be analyzed and a DRP performance
however, for restoring unnecessary
report prepared. The degree of performance
applications. To include applications on the
achieved provides input for decisions to modify
critical list that are not needed to achieve short-
the DRP or schedule additional tests. The
term survival can misdirect resources and
organization’s management should seek
distract attention from the primary objective
measures of performance in each of the
during the recovery period.
following areas: (1) the effectiveness of DRP
team personnel and their knowledge levels; (2) Software Backup. The auditor should verify
the degree of conversion success (i.e., the that copies of critical applications and
number of lost records); (3) an estimate of operating systems are stored off-site. The
financial loss due to lost records or facilities; auditor should also verify that the applications
and (4) the effectiveness of program, data, and stored off-site are current by comparing their
documentation backup and recovery version numbers with those of the actual
procedures. applications in use. Application version
numbers is explained in detail in Chapter 5.
Audit Objective
Data Backup. The auditor should verify that
The auditor should verify that management’s
critical data files are backed up in accordance
disaster recovery plan is adequate and feasible
with the DRP. Specific data backup procedures
for dealing with a catastrophe that could
for both flat files and relational databases are
deprive the organization of its computing
discussed in detail in Chapter 4.
resources.
Backup Supplies, Documents, and
Audit Procedures
Documentation. The system documentation,
In verifying that management’s DRP is a supplies, and source documents needed to
realistic solution for dealing with a catastrophe, process critical transactions should be backed
the following tests may be performed. up and stored off-site. The auditor should verify
that the types and quantities of items specified
Site Backup. The auditor should evaluate the in the DRP such as check stock, invoices,
adequacy of the backup site arrangement. purchase orders, and any special purpose
System incompatibility and human nature both forms exist in a secure location.
greatly reduce the effectiveness of the mutual Disaster Recovery Team. The DRP should
aid pact. Auditors should be skeptical of such clearly list the names, addresses, and
arrangements for two reasons. emergency telephone numbers of the disaster
First, the sophistication of the computer system recovery team members. The auditor should
may make it difficult to find a potential partner verify that members of the team are current
with a compatible configuration. Second, most employees and are aware of their assigned
firms do not have the necessary excess responsibilities. On one occasion, while
capacity to support a disaster-stricken partner reviewing a firm’s DRP, the author discovered
while also processing their own work. When it that a team leader listed in the plan had been
comes to the crunch, the management of the deceased for nine months.
firm untouched by disaster will likely have little OUTSOURCING THE IT FUNCTION
appetite for the sacrifices that must be made to
honor the agreement. The costs, risks, and responsibilities
associated with maintaining an effective
More viable but expensive options are the corporate
empty shell and recovery operation center.
IT function are significant. Many executives
These too must be examined carefully. If the have therefore opted to outsource their IT
client organization is using the empty shell functions to third-party vendors who take over
method, then the auditor needs to verify the responsibility for the management of IT assets
existence of valid contracts with hardware and staff and for delivery of IT services, such
vendors that guarantee delivery of needed as data entry, data center operations,
computer hardware with minimum delay after
the disaster. If the client is a member of a applications development, applications
ROC, the auditor should be concerned about maintenance, and network management. Often
cited benefits of IT outsourcing include Often this comes down to a matter of definition
improved core business performance, and interpretation. For example, most CEOs
improved would define their IT function as a non–core
commodity, unless they are in the business of
IT performance (because of the vendor’s
developing and selling IT applications.
expertise), and reduced IT costs. By moving IT
facilities offshore to low labor-cost areas and/or Consequently, a belief that all IT can, and
through economies of scale (by combining the should, be managed by large service
work of several clients), the vendor can organizations tends to prevail. Such
perform the outsourced function more cheaply misperception reflects, in part, both lack of
than the client firm could have otherwise. The executive education and dissemination of faulty
resulting cost savings are then passed to the information regarding the virtues and
client organization. Furthermore, many IT limitations of IT outsourcing.
outsourcing arrangements involve the sale of
Risks Inherent to IT Outsourcing
the client firm’s IT assets—both human and
machine—to the vendor, which the client firm Large-scale IT outsourcing events are risky
then leases back. This transaction results in a endeavors, partly because of the sheer size of
significant one-time cash infusion to the firm. these financial deals, but also because of their
nature. The level of risk is related to the degree
The logic underlying IT outsourcing follows
of asset specificity of the outsourced function.
from core competency theory, which argues
The following sections outline some well-
that an organization should focus exclusively
documented issues.
on its core business competencies, while
allowing outsourcing vendors to efficiently Failure to Perform
manage the non–core areas such as the IT
functions. This premise, however, ignores an Once a client firm has outsourced specific IT
important distinction between commodity and assets, its performance becomes linked to the
specific IT assets. vendor’s performance. The negative
implications of such dependency are illustrated
Commodity IT assets are not unique to a in the financial problems that have plagued the
particular organization and are thus easily huge outsourcing vendor Electronic Data
acquired in the marketplace. These include Systems Corp. (EDS). In a cost-cutting effort,
such things as network management, systems EDS terminated seven thousand employees,
operations, server maintenance, and help-desk which impacted its ability to serve other clients.
functions. Specific IT assets, in contrast, are Following an 11-year low in share prices, EDS
unique to the organization and support its stockholders filed a class-action lawsuit against
strategic objectives. Because of their the company. Clearly, vendors experiencing
idiosyncratic nature, specific assets have little such serious financial and legal problems
value outside their current use. Such assets threaten the viability of their clients also.
may be tangible (computer equipment),
Vendor Exploitation
intellectual (computer programs), or human.
Examples of specific assets include systems Large-scale IT outsourcing involves
development, application maintenance, data transferring to a vendor “specific assets,” such
warehousing, and highly skilled employees as the design, development, and maintenance
trained to use organization specific software. of unique business applications that are critical
Transaction Cost Economics (TCE) theory is in to an organization’s survival. Specific assets,
conflict with the core competency school by while valuable to the client, are of little value to
suggesting that firms should retain certain the vendor beyond the immediate contract with
specific non–core IT assets inhouse. the client. Indeed, they may well be valueless
should the client organization go out of
Because of their esoteric nature, specific business. Because the vendor assumes risk by
assets cannot be easily replaced once they are acquiring the assets and can achieve no
given up in an outsourcing arrangement. economies of scale by employing them
Therefore, if the organization should decide to elsewhere, the client organization will pay a
cancel its outsourcing contract with the vendor, premium to transfer such functions to a third
it may not be able to return to its pre-outsource party. Further, once the client firm has divested
state. On the other hand, TCE theory supports itself of such specific assets it becomes
the outsourcing of commodity assets, which dependent on the vendor. The vendor may
are easily replaced or obtained from alternative exploit this dependency by raising service rates
vendors. to an exorbitant level. As the client’s IT needs
develop over time beyond the original contract
Naturally, a CEO’s perception of what
terms, it runs the risk that new or incremental
constitutes a commodity IT assets plays an
services will be negotiated at a premium. This
important role in IT outsourcing decisions.
dependency may threaten the client’s long-
term flexibility, agility, and competitiveness and outsourcing is inconsistent with the client’s
result in even greater vendor dependency. pursuit of strategic advantage in the
marketplace.
Outsourcing Costs Exceed Benefits
Audit Implications of IT Outsourcing
IT outsourcing has been criticized on the
grounds that unexpected costs arise and the Management may outsource its organization’s
full extent of expected benefits are not realized. IT functions, but it cannot outsource its
One survey revealed that 47 percent of 66 management responsibilities under SOX for
firms surveyed reported that the costs of IT ensuring adequate IT internal controls. The
outsourcing exceeded outsourcing benefits. PCAOB specifically states in its Auditing
Standard No. 2, “The use of a service
One reason for this is that outsourcing clients
organization does not reduce management’s
often fail to anticipate the costs of vendor
responsibility to maintain effective internal
selection, contracting, and the transitioning of
control over financial reporting. Rather, user
IT operations to the vendors.
management should evaluate controls at the
Reduced Security service organization, as well as related controls
at the user company, when making its
Information outsourced to offshore IT vendors assessment about internal control over
raises unique and serious questions regarding financial reporting.”
internal control and the protection of sensitive
personal data. When corporate financial Service provider auditors issue two types of
systems are developed and hosted overseas, SAS 70 reports. An SAS 70 Type I report is the
and program code is developed through less rigorous of the two and comments only on
interfaces with the host company’s network, the suitability of the controls’ design. An SAS
U.S. corporations are at risk of losing control of 70 Type II report goes further and assesses
their information. To a large degree U.S. firms whether the controls are operating effectively
are reliant on the outsourcing vendor’s security based on tests conducted by the vendor
measures, data-access policies, and the organization’s auditor. The vast majority of
privacy laws of the host country. SAS 70 reports issued are Type II. Because
Section 404 requires the explicit testing of
Loss of Strategic Advantage controls, SAS 70 Type I reports are of little
IT outsourcing may affect incongruence value in a post-SOX world.
between a firm’s IT strategic planning and its
business planning functions. Organizations that
use IT strategically must align business
strategy and IT strategy or run the risk of
decreased business performance. To promote
such alignment, firms need IT managers and
chief information officers (CIOs) who have a
strong working knowledge of the organization’s
business. A survey of 213 IT managers in the
financial services industry confirmed that a
firm’s IT leadership needs to be closely aligned
with the firm’s competitive strategy. Indeed,
some argue that the business competence of
CIOs is more important than their IT
competence in facilitating strategic
congruence.
To accomplish such alignment necessitates a
close working relationship between corporate
management and IT management in the
concurrent development of business and IT
strategies. This, however, is difficult to
accomplish when IT planning is geographically
redeployed offshore or even domestically.
Further, because the financial justification for
IT outsourcing depends upon the vendor
achieving economies of scale, the vendor is
naturally driven to toward seeking common
solutions that may be used by many clients
rather than creating unique solutions for each
of them. This fundamental underpinning of IT

S-ar putea să vă placă și