02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

26
Pemeriksaan Sistem Pemeriksaan Sistem Informasi dalam Kerangka Informasi dalam Kerangka Information System Information System Governance Governance 1

Transcript of 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Page 1: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Pemeriksaan Sistem Pemeriksaan Sistem Informasi dalam Kerangka Informasi dalam Kerangka Information System Information System GovernanceGovernance

1

Page 2: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Learning ObjectivesLearning Objectives

1. IT Governance: IT Audit role

2. Information System Strategy

3. Policies and Procedures

4. Risk Management

5. IS Management Practices

2

Page 3: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

IT Governance: IT Audit IT Governance: IT Audit roleroleTo provide leading practice

recommendations to senior management to help improve the quality and effectiveness

Ensure compliance with IT governance initiatives implemented within an organization

Ensure a qualitative assessment that subsequently facilitates the qualitative improvement

3

Page 4: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Aspects Related to IT Aspects Related to IT governance Need to be governance Need to be AssessedAssessed Alignment of the IS function with the organization's

mission, vision, values, objectives and strategies

Achievement of performance objectives established by the business (e.g., effectiveness and efficiency) by the IS function

Legal, environmental, information quality, fiduciary, security, and privacy requirements

The control environment of the organization

The inherent risks within the IS environment4

Page 5: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Information System StrategyInformation System Strategy- Strategic Planning - - Strategic Planning - Long-term direction an organization wants to

take in leveraging information technology for improving its business processes

Identifying cost-effective IT solutions in addressing problems and opportunities that confront the organization

Developing action plans for identifying and acquiring needed resources

Ensure that the plans are fully aligned and consistent

5

Page 6: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Information System StrategyInformation System Strategy- Effective IT Strategic - Effective IT Strategic Planning - Planning - Determine whether expansion or improvement

Not just the delivery of new systems and technology

Returns being achieved from investment

Spending on existing IT systems, infrastructure and support services accounts for 85 percent or more of total annual IT spending

To support the business strategies6

Page 7: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Information System StrategyInformation System Strategy- Steering Committee -- Steering Committee - Review the long- and short-range plans of the IS

department to ensure that they are in accordance with the corporate objectives.

Review and approve major acquisitions of hardware and software within the limits approved by the board of directors.

Approve and monitor major projects and the status of IS plans and budgets, establish priorities, approve standards and procedures, and monitor overall IS performance.

7

Page 8: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Information System StrategyInformation System Strategy- Steering Committee -- Steering Committee - Review and approve sourcing strategies for select or all

IS activities,

Review adequacy of resources and allocation of resources in terms of time, personnel and equipment.

Make decisions regarding centralization vs. decentralization and assignment of responsibility.

Support development and implementation of an enterprisewide information security management program.

Report to the board of directors on IS activities.

8

Page 9: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

PoliciesPolicies High-level documents

Corporate philosophy of an organization and the strategic thinking of senior management and business process owners

Clear and concise

Set the tone for the organization as a whole

Top-down and bottom-up approach

Should review all policies periodically

9

Page 10: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

PoliciesPolicies Need to be updated

Must support achievement of business objectives and implementation of IS controls

Must be responsive to the needs of the customers

Policies are a part of the audit process

Test the policies for compliance

10

Page 11: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Policies Policies - Information Security Policy - Information Security Policy -- Communicates a coherent security standard to

users, management and technical staff

The security policy must be approved by senior management, and should be documented and communicated

The adequacy and appropriateness of the security policy could also be an area of review for the IS auditor

Provides management the direction

11

Page 12: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Policies Policies - Information Security Policy - Information Security Policy Document -Document - A definition of information security

A statement of management intent, goals, and principles

Framework for setting control objectives and controls, risk assessment, and risk management

Security policies

General and specific responsibilities for information security management, including reporting information security incidents

References to documentation

12

Page 13: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Policies Policies - Information Security Policy - Information Security Policy Document -Document -

Addressing :◦Statements on confidentiality,

integrity and availability◦Classifications, levels of control◦Information resources◦Parameters and usage of desktop◦Defining and granting access to

users to various IT resources

13

Page 14: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Policies Policies - Review of the Information - Review of the Information Security Policy -Security Policy - Input :

◦ Feedback from interested parties◦ Results of independent reviews◦ Status of preventive, detective and corrective actions◦ Results of previous management reviews◦ Process performance and information security policy

compliance◦ Changes that could affect the organization's approach to

managing information security, including changes to the organizational environment; business circumstances; resource availability; contractual, regulatory and legal conditions; or technical environment

◦ Usage of the consideration of outsourcers or offshore of IT or business functions

◦ Trends related to threats and vulnerabilities◦ Reported information security incidents◦ Recommendations provided by relevant authorities

14

Page 15: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Policies Policies - Review of the Information - Review of the Information Security Policy -Security Policy - Input :

◦ Usage of the consideration of outsourcers or offshore of IT or business functions

◦ Trends related to threats and vulnerabilities◦ Reported information security incidents◦ Recommendations provided by relevant

authorities

Output :◦ Improvement of the organization's approach to

managing information security and its processes◦ Improvement of control objectives and controls◦ Improvement in the allocation of resources

15

Page 16: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

ProceduresProcedures

Detailed steps

Implement the spirit

Clear and concise manner

16

Page 17: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Risk ManagementRisk Management- Definition -- Definition -

The process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business

objectives and deciding what countermeasures (safeguards or

controls), if any, to take in reducing risk to an acceptable level (i.e.,

residual risk), based on the value of the information resource to the

organization.17

Page 18: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Risk ManagementRisk Management- Management’s Action -- Management’s Action - Avoid—e.g., where feasible, choose not to implement

certain activities or processes that would incur risk (i.e., eliminate the risk by eliminating the cause)

Mitigate—e.g., lessen the probability or impact of the risk by defining, implementing, and monitoring appropriate controls

Transfer (deflect, or allocate)—e.g., share risk with partners or transfer via insurance coverage, contractual agreement, or other means

Accept—i.e., formally acknowledge the existence of the risk and monitor it

18

Page 19: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Developing a Risk Management Developing a Risk Management ProgramProgram

Establish the purpose of the risk management program

Assign responsibility for the risk management plan

19

Page 20: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Risk Management ProcessRisk Management Process

The identification and classification of information resources or assets that need protection, such as :◦ Information and data◦ Hardware◦ Software◦ Services◦ Documents◦ Personnel

To assess threats and vulnerabilities associated with the information resource and the likelihood of their occurrence

20

Page 21: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

21

Page 22: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

IS Management PracticeIS Management Practice

Human Resource Management

Sourcing Practices

Third-Party Services

22

Page 23: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Human Resource Human Resource ManagementManagementHiringEmployee handbookPromotion policiesTrainingScheduling and time reportingEmployee performance

evaluationsRequired vacationsTermination policies

23

Page 24: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Sourcing PracticesSourcing Practices Delivery of IS functions can include insourced,

outsourced, and hybrid

Consideration for method of delivering IS function :◦ Is this a core function for the organization?◦ Does this function have specific knowledge, processes

and staff critical to meeting its goals and objectives, and that cannot be replicated externally or in another location?

◦ Can this function be performed by another party or in another location for the same or lower price, with the same or higher quality, and without increasing risk?

◦ Does the organization have experience managing third parties or using remote/offshore locations to execute IS or business functions?

24

Page 25: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Outsourcing Practices and Outsourcing Practices and StrategiesStrategies Reasons for embarking on outsourcing include :

◦ A desire to focus on core activities◦ Pressure on profit margins◦ Increasing competition that demands cost savings◦ Flexibility with respect to both organization and

structure

The services provided by a third party can include :◦ Data entry◦ Design and development of new systems◦ Maintenance of existing applications◦ Conversion of legacy applications to new platforms◦ Operating the help desk or the call center◦ Operations processing

25

Page 26: 02 - Pemeriksaan Sistem Informasi Dalam Kerangka Information System Governance

Outsourcing Practices and Outsourcing Practices and StrategiesStrategiesPossible advantages of outsourcing include : Achieve economies of scale through the deployment of

reusable component software. To be able to devote more time and focus more

effectively and efficiently on a given project than in-house staff.

To have more experience with a wider array of problems, issues and techniques than in-house staff.

The act of developing specifications and contractual agreements using outsourcing services is likely to result in better specifications than if developed only by in-house staff.

As vendors are highly sensitive to time-consuming diversions and changes, feature creep or scope creep is substantially less likely with outsourcing vendors.

26