APPENDIX B
Popular Methodologies, Frameworks, and Guidance

This appendix discusses the following major topics:

• Key controls and frameworks terminology and concepts

• Demystifying the various frameworks available and their value to the CISA

Are you getting ready to develop, document, or test controls? Several methodologies, frameworks, and guides contain detailed information on processes, control objectives, and controls that may assist you in your efforts. This appendix is dedicated to helping you make sense of these available resources and the terminology used within.

The appendix is divided into two main sections. The first section focuses on common terms and concepts, while the second section describes the various methodologies, frameworks, and guides available and provides background information, high points, and a summary of why the resource may be helpful to a CISA-certified individual.

If you are reading this for the first time, it is recommended that you pay close attention to the first section, which provides you with a foundation from which to view the resources. Once familiar with the terminology, skip to the second section and find the resources that most directly apply to you and your objectives. A table is provided at the end of the appendix as guidance for which frameworks may be most relevant to you.

Common Terms and Concepts

This section was created with the intention that it be used for reference when you are working with one of the frameworks discussed in the second section (or another that is not discussed in this book). At some point, you may hear someone refer to one of the frameworks or methodologies described in this appendix or find yourself wondering if a particular framework or methodology may be valuable to you.

When looking for resources, consider the level and type of information you are looking for. Are you looking for information on implementing processes, control objective statements, or detailed guidance on specific controls? Are you developing a set of IT general controls, assessing a process, or writing particular policies? Each of these activities may be covered in complementary resources; however, if you are in a time crunch, it is recommended to first determine what you are looking for. Using the following common terms and concepts, we’re hoping you’ll be on your way to narrowing down the type of information you are on an adventure to find.

Governance

Enterprise governance is defined as the responsibilities and practices followed by executive management and the board of directors to ensure that the enterprise’s strategic goals and objectives are met, risks are managed, and resources are used responsibly. Examples of enterprise governance practices would be that of senior management providing direction and oversight, clearly identifying roles and responsibilities, coordinating initiatives, and enforcing compliance. Integrity, ethical behavior, transparency, and accountability are just a few principles of enterprise governance. Enterprise governance is critical for increasing investor confidence and ensuring compliance and profitability.

IT governance is a vital part of enterprise governance and aims to ensure that IT is meeting strategic goals and managing risks, and that IT investments are generating business value.

IT governance is the foundation for all IT strategic and tactical activities. It helps ensure that strategic goals and objectives are set and measured against; activities, resources, and investments are managed and prioritized; and IT risks are identified and managed.

The IT Governance Institute (ITGI) and ISACA have developed an IT governance framework that focuses on strategic alignment of IT with the business strategy, value delivery of IT, IT resource management, IT performance management, and IT risk management. More information on this can be found online in the ITGI publication Board Briefing on IT Governance: 2nd Edition.

Although governance is the focus of the new Certified in the Governance of Enterprise IT (CGEIT) certification, it is important to understand that it is the foundation of IT and may affect which processes and controls are prioritized or assessed at any given time.

Goals, Objectives, Strategies

Often, the terms “goals” and “objectives” are used synonymously in documentation and planning. Both are used to describe a desired end state, or what an organization intends to achieve; however, strategies are the actions an organization intends to take to realize its goals and ultimately its vision.

One of the most popular terms in the IS world and control and process frameworks is “objective.” Keep in mind that an objective is what the enterprise is trying to achieve. It is always set within a context. For example, the COBIT framework describes several IT processes and related objectives. In addition, the framework describes specific control objectives.

Process objectives and control objectives are different. Process objectives describe what the process intends to achieve, while control objectives describe what the implemented control activities are trying to achieve. It is important to understand that the concept of objectives is widely used and they need to be kept in proper context. Some of the most common process objectives are:

Image Information reliability and integrity, including financial reporting

Image Compliance with regulations

Image Safeguarding assets

Image Cost-efficient use of operations

Image Effective and efficient operations

Detailed definitions of goals and objectives can be found in the Business Motivation Model, which is published by the Business Rules Group. In this publication, goals are seen as general statements that are ongoing, longer-term, and qualitative, whereas objectives are intended to be more specific, shorter-term, time-specific, and quantitative. In the same model, strategies are said to be the activities that are planned to channel efforts towards goals. The model provides an entire framework for developing mission, vision, goal, objective, strategy, tactic, and directive statements, just to name a few, for an organization.

Processes

Simply stated, processes are used to manage and organize a set of activities, and help ensure that organizational goals are being met.

Each process represents a series of steps or activities that are designed to take input(s) and create some sort of output(s) that deliver a service or product in order to meet specific expectations or desired objectives/goals for a particular group of customer(s). In summary, processes are put into place to guide how an organization does work in order to produce value for customers.

Example Process

An example of a process would be the assessment and management of IT risks.

The process would represent a set of activities and may look like this:

Image Determine the context: Identify -> Assess -> Prioritize -> Respond -> Monitor

Image Inputs: internal and external audit reports, vendor assessments, vulnerability scans

Image Outputs: risk registers, risk reports, mitigation tracking reports

Image Ultimately meets business goal: manage IT-related business risks

Several frameworks describe the various IT processes, interdependencies, inputs, outputs, and metrics, most notably COBIT and ITIL. These frameworks are discussed later in this appendix.

Capability Maturity Models

Initially developed by the Carnegie Mellon Software Engineering Institute as a software evaluation model, capability maturity models (CMMs) are used in several frameworks to determine and describe incremental maturity levels of business process and engineering capabilities.

The maturity of a process or system will be rated on a scale from 0 to 5, with a level of 0 referring to a nonexistent process and a 5 equating to the greatest maturity in capability. The ideal maturity rating differs for each organization.

CMMs can be used to assist organizations with developing process maturity baselines, benchmarking, prioritizing activities, and defining improvement. They can be useful in conjunction with any process framework adopted. An example of a CMM is that which is used in the COBIT framework to describe the maturity of COBIT-identified processes.

Figure B-1 represents how maturity models can be used to show current and future desirable states and for benchmarking against competitors or industry standards.

Table B-1 provides an example of a maturity model and the ratings used to measure those processes outlined in COBIT.

Controls

Controls are the means by which management establishes and measures processes by which organizational objectives are achieved. Controls may be established in order to improve effectiveness, efficiency, integrity of operations, and compliance with laws and regulations.

Frameworks are collections of controls that work together to achieve an entire range of an organization’s objectives. Because many organizations operate similarly, standard frameworks of controls have been established, which can be adopted in whole or in part. These frameworks are discussed later in this appendix.

Image

Figure B-1 Rating scale for process maturity

Image

Table B-1 Example Process Maturity Model

There are many ways in which the frameworks discuss controls:

Image Internal control The aggregate system that is put into place in an organization to provide management with reasonable assurance that objectives are met. It refers to the many control activities in place to meet control and, ultimately business, objectives.

Image Control objectives Control objectives ensure that business objectives are achieved and that undesirable events are prevented or detected and corrected.

Image Control activities/controls These are the specific policies, procedures, and activities in place to meet the control objectives. Controls may be put into place to help prevent or detect and correct undesired events in the organization.

There are two main types of controls: general controls and application controls. General controls support the functioning of the application controls—both are needed for complete and accurate information processing. General controls apply to all systems and the computing environment, while application controls handle application processing.

Some examples of IT general controls:

Image Access controls

Image Change management

Image Security controls

Image Incident management

Image Software development life cycle (SDLC)

Image Source code and versioning controls

Image Disaster recovery and business continuity plans

Image Monitoring and logging

Image Event management

Examples of application controls include:

Image Authentication

Image Authorization

Image Change management

Image Completeness checks

Image Validation checks

Image Input controls

Image Output controls

Image Problem management

Image Identification/access controls

Tips for identifying and documenting controls:

Image When looking at processes, one should identify control points and examine whether they are adequate in preventing or detecting errors and irregularities.

Image Check to see if the control’s strength is commensurate with the level of risk the control is mitigating.

Image The cost of implementing a control should not exceed the expected benefit.

Image Well-designed internal controls can lead to operating efficiencies and sometimes reduction in costs and risks.

Image Effective controls reduce risk, increase the likelihood of value delivery, and improve efficiency because of fewer errors and a consistent management approach.

Image Auditors are responsible for the independent evaluation of internal controls and whether they are adequate.

The Deming Cycle

Dr. W. Edward Deming developed a four-step quality control process known around the world as the Deming Cycle, PDSA (Plan-Do-Study-Act) or PDCA (Plan-Do-Check-Act). The steps in the Deming Cycle are:

Image Plan Establish objectives to align with desired outcomes and predict results

Image Do Execute the plan in a controlled manner

Image Check/Study Check the results on a regular basis and compare with expectations

Image Act Analyze the results and take corrective actions

Many of the frameworks described in this appendix are based on this concept, which supports continuous quality and business process improvement. Each framework will define the set of processes and how they support the different steps. For example, in the project management frameworks, there are specific processes necessary for properly planning, executing, and monitoring a project. Although each of the processes is unique, they collectively contribute to continuous quality and improvement.

Projects

As a CISA, it is likely that you will be exposed to projects. Projects are organized activities intended to bring about a new process or system, or a change to a process or system. Projects are generally thought of as unique, one-time, nonrepeated efforts. Examples of projects include:

Image Design and development of a new software application

Image A migration from Windows to Linux

Image Development of a new accounts payable process

Most of the time, formal project management techniques will be implemented in conjunction with software or system acquisition and implementation processes.

A few things to keep in mind about projects and project management:

Image Projects are a means to organize activities that are not addressed within normal operational limits. Often, projects are used as a means to achieve an organization’s strategic plans.

Image Project management consists of a set of processes.

Image Projects are similar to operations in that they are performed by people, constrained by resources, planned, executed, and controlled.

Image Operations are ongoing, while projects are temporary and unique.

Image Project and operational objectives are different. Once project objectives are met, the project is considered complete. Operational objectives are ongoing and are in place to sustain business activities and goals. Once operational objectives are met, new ones are adopted and things keep moving forward.

Image Controls exist in projects. Examples include comparing actual with planned budgets and time, analysis of variances, assessment of trends to effect process improvements, evaluation of alternatives, and recommendation of corrective actions.

There are frameworks to assist you, should you be responsible for planning or managing a project. In addition, the information provided within these frameworks may help should you be responsible for auditing the software delivery life cycle or assessing any related project documentation.

Frameworks, Methodologies, and Guidance

Determining appropriate processes and controls can be daunting. This is where frameworks, methodologies, and guidance can become valuable. Many internationally recognized organizations have already conducted the research and documented their conclusions, resulting in the publication of several high-quality frameworks and methodologies. Before re-creating the wheel, consider utilizing these existing resources as a basis for your process and control discussions, audits, or project planning. Many of the documents available today are quite comprehensive, and can save you a great deal of time and heartache. They often outline key processes and controls that can be implemented to meet specific business goals and objectives.

The following sections identify the most renowned and respected resources with regard to managing IT governance, controls, processes, and projects. The background and high points of each resource will be described, as well as how each may be useful for a CISA-certified individual.

Keep in mind that the following resources are merely structures of ideas formulated to solve or address complex issues, or outline possible courses of action to represent a preferred and reliable approach to an idea. They are not intended to be the sole source for your efforts.

COSO Internal Control Integrated Framework

Authored in 1992 by Coopers & Lybrand (now PricewaterhouseCoopers) for the Committee of Sponsoring Organizations of the Treadway Commission (COSO), the COSO Internal Control Integrated Framework is by far one of the most fundamental frameworks available to an IS auditor. The framework defines internal controls and provides guidance for assessing and improving internal control systems. The term “internal controls” stems from senior management’s need to “control” and be “in control.”

Formed in 1985, COSO is a private-sector group in the United States sponsored by the American Institute of Certified Public Accountants (AICPA), American Accounting Association (AAA), Financial Executives International (FEI), The Institute of Internal Auditors (IIA), and The Institute of Management Accountants (IMA).

It is highly recommended that those who are CISA-certified take the time to become familiar with this framework. It is the basis of internal control descriptions and is fundamental to successfully understanding, assessing, and making improvements to an internal control environment.

Highlights

The COSO framework is composed of four volumes, the framework volume being the most widely used, which contains these sections:

Image Executive summary

Image Framework

Image Reporting to external parties

Image Evaluation tools

The framework focuses on one main concept and five interrelated internal control components. This concept and components comprise what many call the COSO “pyramid” (Figure B-2) and the COSO “cube” (Figure B-3).

The COSO pyramid consists of four elements:

Image Monitoring At the top of the pyramid

Image Control environment At the base of the pyramid

Image Risk assessment and control Stacked in the middle of the pyramid

Image Information and communication On the edges

The COSO cube consists of three dimensions:

Image Objectives

Image Components

Image Business units/areas

Image

Figure B-2 The COSO pyramid

Image

Figure B-3 The COSO cube

The main concept of the COSO framework is that internal control is a process, affected by people, designed to provide reasonable assurance that the entity is meeting its objectives.

Image Process A process is not one event, but a series of activities that are integrated in an organization.

Image Affected by people People across the organization establish objectives and ensure that controls are in place. At the same time, internal controls affect people’s actions.

Image Reasonable assurance Internal control can only provide reasonable, not absolute, assurance that the organization is meeting its objectives. This is due to limitations such as human judgment and error, potential for controls to be circumvented through collusion, or controls being overridden by management.

Image Objectives Internal control helps organizations meet the following objectives, all of which are separate but may overlap:

Image Effectiveness and efficiency of operations: Performance, profitability goals, safeguarding assets

Image Reliability of financial reporting: Prepare reliable financial reports while preventing financial misstatements

Image Compliance with applicable laws and regulations

In addition, the framework describes the five interrelated components of internal control: control environment, risk assessment, control activities, information and communication, and monitoring.

Image Control environment This is the foundation of how the business operates, where individuals know that they are to conduct activities and carry out control responsibilities. A solid control environment is exhibited by integrity and ethical values, commitment to competence, dedicated board and audit committees, management’s philosophy and operating style, the organizational structure, assignment of authority and responsibility, and human resources policies and practices.

Image Risk assessment The organization should establish mechanisms to identify, assess, and manage the risks to objectives. This component is evident through the establishment of entity-wide and activity-level objectives, risks identified, and how well the organization manages change.

Image Control activities Control policies and procedures are in place to ensure that the actions and controls needed to ensure objectives are met and that mitigating activities are carried out. Examples of control activities include approvals, authorizations, security of assets, segregation of duties, top-level reviews, information processing, physical controls, and performance indicators. Success in this area is when control activities are linked to meeting objectives and are deemed necessary in order to mitigate risks in meeting the objectives.

Image Information and communication Information pertaining to control activities should flow through the organization. This enables management to know if its objectives are being met, and should be in a form and timeframe to ensure that people can carry out responses. Information and communication can be considered successful when they are flowing up to management and down to employees in sufficient detail and in a timely manner, established communication channels exist internally and with external parties, and management is open and receptive to suggestions.

Image Monitoring The process should be monitored and modified as necessary through ongoing monitoring activities, separate evaluations, or a combination of both. Control deficiencies should be reported upstream, with important issues being communicated to the board or senior management. Management needs information in order to ensure that the internal control system is effective, whether new risks have developed, and determine if internal controls are still relevant. Monitoring is considered successful when it is ongoing and built into operations, separate evaluations are conducted, and deficiencies are reported on an open and timely basis.

When is an internal control system effective? When you’ve assessed and concluded that the five components are functioning successfully and the organization’s objectives are being met:

Image The board of directors and management understand operational objectives and that they are being achieved.

Image Financial reporting is prepared reliably.

Image Laws and regulations are being complied with.

Making Sense of the COSO “Cube” and the COSO “Pyramid”

Each organization has three main types of objectives that span across all divisions and groups. In order to ensure that these objectives are met, the five interrelated internal control components must be in place. There must be a solid control environment, with risk assessments to confirm that adequate control activities are in place to mitigate risk and that risks to objectives are properly managed. In addition, information regarding risk, activities, and deficiencies should be reported through the organization and in a timely manner and responded to. Evaluation and monitoring of activities to ensure that objectives are met should be done on a continual basis, with corrective actions being taken when necessary.

COSO Value for the CISA

COSO is the basis for the majority of all internal control discussions and process and control frameworks. Whether you are educating others on internal controls, as outlined in the Professional Code of Ethics, or evaluating or testing internal control effectiveness, COSO provides a foundation with which the CISA should be familiar. COSO is a great source for definitions and explanations. Due to the enterprise basis by which COSO has been developed, it is highly recommended that it serve as the foundation, and other frameworks, such as COBIT, ISO 27001, and ITIL, build upon this knowledge.

For more information on the COSO products, or for purchase, please visit www. coso.org.

Other COSO products include 2004 Enterprise Risk Management, and guidance for implementing the monitoring component of internal control systems was published in 2009.

COBIT

The Control Objectives for Information and related Technology (COBIT) framework was created in 1992 by the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI). In 1996, the first edition of COBIT was released to the public. Version 4.1 was released in May 2007 and is, at the time of this writing, the most current version available. COBIT aligns with and meets COSO internal control requirements.

COBIT was developed in order to assist companies in maximizing the benefits derived through the strategic use of IT. Broad yet detailed, the COBIT framework was designed for use by managers, auditors, and IT personnel, and contains IT governance guidance. The framework aligns IT goals with general business goals; contains a comprehensive list of IT processes; and links related control objectives, metrics, and roles and responsibilities for carrying out process activities.

COBIT Highlights

The COBIT framework is composed of six elements, covered in multiple documents:

Image Executive summary

Image Governance and control framework

Image Control objectives

Image Management guidelines

Image Implementation guide

Image IT assurance guide

The framework is complex and requires dedicated individuals to implement and compile the elements. It is composed of 34 processes in four domains, with 318 control objectives. The framework is based upon the notion of strong IT governance, stressing alignment to business strategy and goals.

As with many frameworks, COBIT is based on the Deming Cycle, with 34 IT processes falling into the following four domains:

Image Planning and organization Processes in this domain are dedicated to ensuring that IT goals are strategically aligned with the business strategy and goals.

Image Acquisition and implementation Processes for acquiring software, personnel, and external resources are covered in this domain, along with those processes needed to implement them.

Image Delivery and support Operational managers can focus on these processes for delivering and supporting the resources utilized, including people, infrastructure, software, and third-party services.

Image Monitor Processes ensure that the outcome is delivered and measured against initial expectations and that deviations are investigated and result in corrective actions.

Figure B-4 provides an overview of the COBIT framework. Note how the 34 process categories coincide with a cycle similar to that of the Deming Cycle.

Image

Figure B-4 The COBIT framework

Each process is outlined in the framework and details the associated process objectives, control objectives, roles and responsibilities charts, metrics, and process maturity levels.

COBIT Value for the CISA

The COBIT framework is ideal for those looking for a comprehensive framework to outline how IT goals and processes align with business goals, what processes IT should consider implementing, and related control objectives.

COBIT nicely ties general business goals to IT goals with the use of a balanced scorecard. This allows one to see which IT processes are key in supporting specific IT goals and, ultimately, business goals.

For personnel who are implementing or evaluating a process, the COBIT framework provides an overview of general processes utilized to manage IT. Each process in COBIT includes key activities, control objectives, and metrics that should be in place.

COBIT is one of the most comprehensive and widely used frameworks available, which equates to the development of additional research and documentation being available. ITG has developed an extensive line of documentation, including that which would be of interest to the security professional: COBIT Security Baseline and control mappings of ISO 27001 and NIST to COBIT. See the ISACA web site for more details on COBIT documentation.

GTAG

Global Technology Audit Guide (GTAG) represents a series of documents developed by the Institute of Internal Auditors (IIA) to help organizations with their IT control framework and audit practices. The guides are developed to assist with describing the importance of IT controls as part of the internal controls environment, establishing the roles and responsibilities required for ensuring controls are in place and assessed, and addressing the risks inherent in using and managing IT. The first GTAG guide was published in 2005.

Several groups aid in the development of the guides, including an advanced technology committee and other professional organizations (i.e., ACIPA, FEI, ISSA, Sans Institute, and Carnegie Mellon SEI).

The GTAG guides are geared toward chief audit executives and other executives that need a high-level overview of the latest technology issues and how they affect the organization, the associated risks, and necessary IT controls.

GTAG Highlights

Several GTAG guides have been published and are available through the IIA:

Image GTAG-1 Information Technology Controls

Image GTAG-2 Change and Patch Management Controls

Image GTAG-3 Continuous Auditing

Image GTAG-4 Management of IT Auditing

Image GTAG-5 Managing and Auditing Privacy Risks

Image GTAG-6 Managing and Auditing IT Vulnerabilities

Image GTAG-7 Information Technology Outsourcing

Image GTAG-8 Auditing Application Controls

Image GTAG-9 Identity and Access Management

Image GTAG-10 Business Continuity Management

Image GTAG-11 Developing the IT Audit Plan

GTAG Value for the CISA

Although primarily targeting the chief audit executive, IS auditors can utilize GTAG documents to learn more about controls and for assistance with describing IT risk and controls in executive terms.

GTAG can be downloaded free of charge from the IIA’s web site at www.theiia.org. Hard copies can also be purchased should you choose to add the publications to your library.

GAIT

The Guide to the Assessment of IT Risk (GAIT) was developed by the Institute of Internal Auditors to assist with IT general control risk assessment and scoping for Sarbanes-Oxley Section 404 (SOX 404). The GAIT series provides guidance on assessing risk to the financial statements and key controls that could be implemented within the business and IT, including IT general controls (IT GC) and automated controls.

GAIT Highlights

The methodology provides guidance on identifying risks and related controls needed to protect financially significant applications and related processes and data.

Currently, three practice guides are available:

Image The GAIT Methodology—use a risk-based approach to scope IT GCs

Image GAIT for IT General Controls Deficiency Assessment

Image GAIT for Business and IT Risk

GAIT does not specify key controls, but does describe the IT GC processes and control objectives that should be addressed.

It is based on four principles:

Image A top-down, risk-based approach should be used to identify significant accounts and key controls needed to mitigate risk.

Image Risks that are identified in IT GC processes are those that affect critical IT functionality in financially significant applications and related data.

Image When assessing IT GC process risk, risks that exist within multiple IT layers from the database to the application and network need to be identified.

Image Risks identified in IT GC processes are mitigated through the achievement of control objectives, not specific controls.

GAIT Value for the CISA

If you are asked to scope and identify key IT general controls for SOX 404 compliance or general prevention of financial reporting misstatements, GAIT can help you determine which control objectives and controls are key through the use of a risk assessment.

ISF Standard of Good Practice

The Standard of Good Practice was first published in 1996 by the Information Security Forum (ISF). The ISF is a nonprofit organization dedicated to the development of information security good practices. Like ISACA, ISF is a paid membership organization with chapters throughout the world. The Standard was last updated in February 2007 and is available at www.isfsecuritystandard.com.

ISF Highlights

The Standard of Good Practice contains guidance on security principles, control objectives, and controls in the following areas:

Image Enterprise security management

Image Critical business applications

Image Computer installations

Image Networks

Image Systems development

Image End-user environment

Although the document is primarily divided into these main areas, there are reference tables so that specific control areas that may be present in more than one area can easily be found.

Standard of Good Practice Value for the CISA

The Standard of Good Practice document can provide you with information security control objective statements and describes the controls that should be in place. If you are looking for specific controls, such as access controls or controls around firewalls or e-mails, a reference section can help point you to the proper section within each area.

ISO/IEC 27001 and 27002

Organizations faced with privacy and information security concerns may decide that they need to implement a formal information security management system (ISMS) to ensure that information security is managed, risks are assessed, and appropriate controls are put in place to mitigate risk to information security. Published in October 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and based on British Standard (BS) 7799 Part 2, ISO/IEC 27001 is a standard that organizations can use for developing, implementing, controlling, and improving an ISMS. ISO/IEC 27001 provides the general framework for the ISMS, while ISO/IEC 27002, formally known as ISO 17799, provides a more detailed list of control objectives and recommended controls. The controls presented within the document act as a guide for those who are responsible for initiating, implementing, or maintaining information security management systems.

Organizations may choose to be certified as compliant with ISO/IEC 27001 by an accredited certification body. Similar to other ISO management system certifications, there is a three-stage audit process.

In addition to the Standard of Good Practice guide, there is an entire series of ISO/IEC 27000 documents, including a glossary, ISMS auditing guidelines for the management system and controls, implementation guide, and guides on IT network security and application security, to name a few.

ISO/IEC 27001/27002 Highlights

The concept of ISMS centers on the preservation of:

Image Confidentiality Ensuring that information is accessible only to those authorized to have access

Image Integrity Safeguarding the accuracy and completeness of information and processing methods

Image Availability Ensuring that authorized users have access to information and associated assets when required

The standard contains an introductory section and a description of the risk management framework needed around information security controls. Each organization is expected to perform an information security risk assessment process to determine which regulatory requirements must be satisfied before selecting appropriate controls.

The 11 main domains in ISO 27001 and 27002 are:

Image Security policy

Image Organization of information security

Image Asset management

Image Human resources security

Image Physical and environmental security

Image Communications and operations management

Image Access control

Image Information systems acquisition, development, and maintenance

Image Information security incident management

Image Business continuity management

Image Compliance

Control objectives and controls for each section are listed in the standards and code of practice. ISO 27001 focuses on the implementation of controls throughout the Deming Cycle, while ISO 27002 lists the good practice controls an organization can implement.

ISO/IEC 27001 and 27002 Value for the CISA

Those involved with implementing or assessing information security controls or the management of information security risk may find it helpful to look more closely into these standards. ISO standards documents can be purchased for a reasonable price from the International Standards Organization at www.iso.org.

ITIL

In the 1980s, when the British government determined that the level of IT service quality provided to them was insufficient, it was clear that an IT control framework was needed. The Central Computer and Telecommunications Agency (CCTA), now the Office of Government Commerce (OGC), developed the Information Technology Infrastructure Library (ITIL, pronounced EYE-till), which began guiding organizations on the efficient and financially responsible use of IT resources within public and private entities worldwide.

ITIL consists of a collection of books that contain guidelines for different aspects of good practice around IT service management (ITSM) and aligning IT services to business needs. The subjects of the books are referred to as sets; currently there are five. The sets are further divided into disciplines, with each focusing on a specific subject. When all volumes are combined, ITIL presents a comprehensive view of proper provisioning and management of IT services.

ITIL Highlights

ITIL v3 is a high-level, user-focused framework that defines a common language for IT service management processes. The framework describes the IT service organization that delivers agreed-upon services and maintains the infrastructure on which the services are delivered. One of the critical components of ITIL is that the services and maintenance must be aligned and realigned according to business needs. In order to do this, the framework closely aligns its five volumes with the Deming Cycle.

Image Service Strategy Focuses on determining potential market opportunities with regard to delivering IT services, with sections dedicated to service portfolio management and financial management.

Image Service Design Determines how to design proposed services with adequate processes and resources to support them. Availability management, capacity management, continuity management, and security management are key areas of service design.

Image Service Transition Describes the implementation of the design and creation or modification of the IT services. Key areas identified are change management, release management, configuration management, and service knowledge management.

Image Service Operation Provides guidance on the activities needed to operate IT services and maintain them according to service-level agreements. This volume focuses on the key areas of incident management, problem management, event management, and request fulfillment.

Image Continual Service Improvement Focuses on how to ensure that the IT services delivered to the business are continually improved through service reporting, service measurement, and service-level management.

In summary, ITIL outlines the general IT processes needed to manage IT; the resources, outputs, and inputs utilized; and the controls that must be implemented to ensure business goals are met (i.e., policies, budgets).

ITIL Value for the CISA

Whether documenting, implementing, or assessing processes, the IS auditor can utilize the volumes for additional information on specific IT processes, such as change management or incident management. The framework outlines recommended controls to ensure that IT services are delivered as promised.

The volumes of ITIL v3 can be purchased online from the OGC at www.ogc.gov.uk.

PMBOK

A Guide to the Project Management Body of Knowledge (PMBOK) is a guide on project management fundamentals and practices. The guide is published by the Project Management Institute (PMI). It began as a white paper in 1987 and was published as a guide in 1996. The fourth edition was released in December 2008.

Not only is PMBOK a guide, it is an internationally recognized standard. Those with an interest in obtaining certification in this area may want to look into becoming certified as a Project Management Professional (PMP) through the PMI.

PMBOK Highlights

The PMBOK Guide describes the many processes that are often used in managing projects. It consists of three main sections:

Image Section 1: The Project Management Framework Describes key terms and provides an overview of the basic structure of project management, including the project life cycle.

Image Section 2: The Standard for Project Management of a Project Describes the 44 processes that are used by project teams. These processes fall into five groups, which are consistent with the plan-do-check-act activities as seen in the Deming Cycle:

Image Initiating process group Defines the project/phase and gathers authorization.

Image Planning process group Defines objectives and course of actions required to meet objectives and scope

Image Executing process group The processes in this group correspond to carrying out the project management plan

Image Monitoring and controlling process group Regularly monitor progress and identify variances from the plan; take corrective actions

Image Closing process group Concludes that all objectives are met and the service, product, or result is accepted by the customer/sponsor. End of the project.

Image Section 3: The Project Management Knowledge Areas Outlines the nine knowledge areas that are needed for an effective project management program and the processes involved, as well as inputs, outputs, tools, and techniques for each. Each process belongs to a process group and is associated with a knowledge area. This section represents the bulk of the guide and details how the 44 processes interrelate. The nine knowledge areas are:

Image Project integration management

Image Project scope management

Image Project time management

Image Project cost management

Image Project quality management

Image Project human resource management

Image Project communications management

Image Project risk management

Image Project procurement management

PMBOK Value for the CISA

As an IS auditor, you may be asked to take a closer look at the process for introducing new applications or systems to your organization. Many times, new applications and systems are delivered via a system/software/solution delivery life cycle and coupled with project management. Solutions are scoped and assessed, projects ensue, and there is a great deal of activity and documentation throughout the process. Project management methodologies and frameworks can help one make sense of this madness.

In addition, project management skills can be valuable for an IS auditor. Being well versed in project management can help ensure that your IS audit work remains in scope and on budget and that you are planning your time adequately. For example, you will want to ensure that you are giving yourself enough time for audit planning, documentation, and taking into account complex interview schedules.

PMBOK can be purchased from booksellers worldwide or from www.pmi.org.

PRINCE2

PRojects IN Controlled Environments (PRINCE) is a structured project management standard covering project management fundamentals. The original standard was developed in 1989 by the UK’s Office of Government Commerce (OGC) specifically for IT project management. In 1996, PRINCE2 was released, the focus reaching beyond IT to general project management. In addition to becoming the de facto standard for project management in the UK, the standard has been adopted by organizations worldwide. As with ITIL, an individual may pass an exam to become accredited.

PRINCE2 Highlights

PRINCE2 consists of one main manual: Managing Successful Projects with PRINCE2. It is similar to PMBOK in that it consists of processes and components, but is different in that it fully describes the methodology and implementation techniques. The main concept behind PRINCE2 is that projects should have an organized and controlled start, middle, and end. Although it is not as comprehensive as PMBOK, PRINCE2 supplements general project management knowledge by specifically describing how to manage projects in a controlled and organized manner.

PRINCE2 is a process-driven framework and integrates well with other processes and practices, such as Agile Scrum. The framework details 45 processes categorized in eight process groups. The process groups lead one through the project life cycle, similar to the Deming Cycle:

Image Starting up a project

Image Planning

Image Initiating a project

Image Directing a project

Image Controlling a stage

Image Managing product delivery

Image Managing stage boundaries

Image Closing a project

Key inputs, outputs, goals, and activities are defined for each process. In addition, a maturity model is available to measure project management capability maturity. Another bonus is that the entire framework can be tailored for each project, as every process has guidance on how to scale it for small or large projects. This results in a flexible, scalable, and fully described framework.

Similar to PMBOK knowledge areas, PRINCE2 details eight “components” that are deemed critical for project success:

Image Business case

Image Organization

Image Plans

Image Controls

Image Management of risk

Image Quality in a project environment

Image Configuration management

Image Change control

PRINCE2 offers three different techniques for managing projects:

Image Product-based planning

Image Quality review

Image Change control

PRINCE2 Value for the CISA

An IS auditor may be asked to take a closer look at the process for introducing new applications or systems to your organization, including the software/system/solution delivery cycle and associated project management methodology and documentation. In addition, project management skills can be valuable for an IS auditor.

Similar to PMBOK, PRINCE2 will provide you with general guidance on project management processes and controls. PRINCE2 is complementary to PMBOK in that it helps shape and direct the use of PMBOK through the introduction of certain techniques. PMBOK will lay a more comprehensive foundation, whereas PRINCE2 will help describe how to start managing projects and put the pieces together.

Summary of Frameworks

Table B-2 contains a summary of the frameworks discussed in this appendix. The table indicates whether the framework is available for a fee, the primary focus of the framework, and best uses for the framework.

Pointers for Successful Use of Frameworks

Image Take time to learn the fundamentals of governance, controls, and processes. Become familiar with COSO, COBIT, and fundamental GTAG documents.

Image Not one single framework is the “right” framework.

Image There has been a great deal of research on governance, controls, and frameworks. Start here—don’t reinvent the wheel.

Image Use frameworks for guidance and tailor them to your unique organization.

Image

Table B-2 Summary of Frameworks

Summary

Image Goals and objectives define what the organization is trying to achieve.

Image Governance is what organizations put in place to identify and ensure achievement of goals, objectives, and strategies.

Image A process is a set of activities that is put in place to maximize effectiveness and efficiency of operations. Organizations can manage operations through processes.

Image Maturity models are often used to measure the maturity of process capabilities.

Image The Deming Cycle focuses on continuous improvement through the implementation of a range of processes that address planning, execution, monitoring, and taking corrective actions.

Image Control objectives are developed to ensure that business objectives are achieved.

Image Control activities support control objectives and can be implemented within processes.

Image Projects are temporary, unique, and have specific objectives and controls implemented.

In this appendix, we focused on processes and internal controls, and learned about the various frameworks, methodologies, and guides available as resources. Now that we have examined the available resources, it’s time to put all of this to use. For an overview of conducting professional audits, see Appendix A.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.162.216