Change Management Audit/Assurance Program (Jan...

54

Transcript of Change Management Audit/Assurance Program (Jan...

Page 1: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information
Page 2: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

ISACA®

With more than 86,000 constituents in more than 160 countries, ISACA (www.isaca.org) is a recognized worldwide leader in IT governance, control, security and assurance. Founded in 1969, ISACA sponsors international conferences, publishes the ISACA Journal®, and develops international information systems auditing and control standards. It also administers the globally respected Certified Information Systems Auditor™ (CISA®) designation, earned by more than 60,000 professionals since 1978; the Certified Information Security Manager® (CISM®) designation, earned by more than 10,000 professionals since 2002; and the new Certified in the Governance of Enterprise IT™ (CGEIT™) designation.

DisclaimerISACA has designed and created Change Management Audit/Assurance Program (the “Work”), primarily as an informational resource for audit and assurance professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, audit/assurance professionals should apply their own professional judgment to the specific circumstances presented by the particular systems or IT environment.

Reservation of Rights© 2009 ISACA. All rights reserved. No part of this publication may be used, copied, reproduced, modified, distributed, displayed, stored in a retrieval system or transmitted in any form by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written authorization of ISACA. Reproduction and use of all or portions of this publication are permitted solely for academic, internal and noncommercial use, and consulting/advisory engagements, and must include full attribution of the material’s source. No other right or permission is granted with respect to this work.

ISACA3701 Algonquin Road, Suite 1010Rolling Meadows, IL 60008 USAPhone: +1.847.253.1545Fax: +1.847.253.1443E-mail: [email protected] site: www.isaca.org

© 2009 ISACA. All rights reserved. Page 2

Page 3: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

ISBN 978-1-60420-075-1Change Management Audit/Assurance ProgramPrinted in the United States of America

© 2009 ISACA. All rights reserved. Page 3

Page 4: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

ISACA wishes to recognize:

AuthorNorm Kelson, CISA, CGEIT, CPA, The Kelson Group, USA

Expert ReviewersDinesh O. Bareja, CISA, IndiaRobert B. Brenis, CISA, CGEIT, MCP, PMP, Skoda Minotti, USASandeep Godbole, CISA, CISM, CISSP, Syntel, IndiaJimmy Heschl, CISA, CISM, CGEIT, KPMG, AustriaSamuel Chiedozie Isichei, CISA, CISM, CISSP, Protiviti, USABharath Nallapu, CISA, PMP, Smith, Nallapu & Associates LLP, USAKathy A. Rogers, CISA, USA

ISACA Board of DirectorsLynn Lawton, CISA, FBCS, FCA, FIIA, KPMG LLP, UK, International PresidentGeorge Ataya, CISA, CISM, CGEIT, CISSP, ICT Control SA, Belgium, Vice PresidentHoward Nicholson, CISA, CGEIT, City of Salisbury, Australia, Vice PresidentJose Angel Pena Ibarra, CGEIT, Consultoria en Comunicaciones e Info. SA & CV, Mexico, Vice PresidentRobert E. Stroud, CA Inc., USA, Vice PresidentKenneth L. Vander Wal, CISA, CPA, Ernst & Young LLP (retired), USA, Vice PresidentFrank Yam, CISA, CIA, CCP, CFE, CFSA, FFA, FHKCS, FHKIoD, Focus Strategic Group Inc.,

Hong Kong, Vice PresidentMarios Damianides, CISA, CISM, CA, CPA, Ernst & Young, USA, Past International PresidentEverett C. Johnson Jr., CPA, Deloitte & Touche LLP (retired), USA, Past International President Gregory T. Grocholski, CISA, The Dow Chemical Company, USA, DirectorTony Hayes, Queensland Government, Australia, DirectorJo Stewart-Rattray, CISA, CISM, CSEPS, RSM Bird Cameron, Australia, DirectorAssurance CommitteeGregory T. Grocholski, CISA, The Dow Chemical Company, USA, ChairPippa G. Andrews, CISA, ACA, CIA, Amcor, AustraliaRichard Brisebois, CISA, CGA, Office of the Auditor General of Canada, CanadaSergio Fleginsky, CISA, ICI, UruguayRobert Johnson, CISA, CISM, CISSP, Executive Consultant, USAAnthony P. Noble, CISA, CCP, Viacom Inc., USARobert G. Parker, CISA, CA, CMC, FCA, Deloittte & Touche LLP (retired), CanadaErik Pols, CISA, CISM, Shell International - ITCI, NetherlandsVatsaraman Venkatakrishnan, CISA, CISM, CGEIT, ACA, Emirates Airlines, UAE

© 2009 ISACA. All rights reserved. Page 4

Page 5: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Table of Contents

I. Introduction................................................................................................4II. Using This Document................................................................................................................5III. Controls Maturity Analysis........................................................................................................8IV. Assurance and Control Framework...........................................................................................9V. Executive Summary of Audit/Assurance Focus......................................................................11VI. Audit/Assurance Program........................................................................................................14

1. Planning and Scoping the Audit..........................................................................................142. Understanding Supporting Infrastructure............................................................................163. Identify Change Need..........................................................................................................184. Production Library Management.........................................................................................215. Move to Production..............................................................................................................246. Emergency Changes.............................................................................................................287. Change Management Governance.......................................................................................32

VII. Maturity Assessment................................................................................................................33VIII. Assessment Maturity vs. Target Maturity................................................................................35

I. Introduction

OverviewISACA has developed the IT Assurance FrameworkTM (ITAFTM) as a comprehensive and good-practice-setting model. ITAF provides standards that are designed to be mandatory and are the guiding principles under which the IT audit and assurance profession operates. The guidelines provide information and direction for the practice of IT audit and assurance. The tools and techniques provide methodologies, tools and templates to provide direction in the application of IT audit and assurance processes.

PurposeThe audit/assurance program is a tool and template to be used as a road map for the completion of a specific assurance process. The ISACA Assurance Committee has commissioned audit/assurance programs to be developed for use by IT audit and assurance practitioners. This audit/assurance program is intended to be utilized by IT audit and assurance professionals with the requisite knowledge of the subject matter under review, as described in ITAF, section 2200—General Standards. The audit/assurance programs are part of ITAF, section 4000—IT Assurance Tools and Techniques.

Control FrameworkThe audit/assurance programs have been developed in alignment with the IT Governance Institute (ITGI) framework, Control Objectives for Information and related Technology (COBIT®)—specifically COBIT 4.1—using generally applicable and accepted good practices. They reflect ITAF sections 3400—IT Management Processes, 3600—IT Audit and Assurance Processes, and 3800—IT Audit and Assurance Management.

Many organizations have embraced several frameworks at an enterprise level, including the Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control Framework. The importance of the control framework has been enhanced due to regulatory requirements by the US Securities and Exchange Commission (SEC) as directed by the US Sarbanes-Oxley Act of 2002 and similar legislation in other countries. They seek to integrate control framework elements used by the general audit/assurance team into the IT audit and assurance framework. Since COSO is widely used, it

© 2009 ISACA. All rights reserved. Page 5

Page 6: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

has been selected for inclusion in this audit/assurance program. The reviewer may delete or rename these columns to align with the enterprise’s control framework.

IT Governance, Risk and Control IT governance, risk and control are critical in the performance of any assurance management process. Governance of the process under review will be evaluated as part of the policies and management oversight controls. Risk plays an important role in evaluating what to audit and how management approaches and manages risk. Both issues will be evaluated as steps in the audit/assurance program. Controls are the primary evaluation point in the process. The audit/assurance program will identify the control objectives and the steps to determine control design and effectiveness.

Responsibilities of IT Audit and Assurance ProfessionalsIT audit and assurance professionals are expected to customize this document to the environment in which they are performing an assurance process. This document is to be used as a review tool and starting point. It may be modified by the IT audit and assurance professional; it is not intended to be a checklist or questionnaire. It is assumed that the IT audit and assurance professional holds the Certified Information Systems Auditor (CISA) designation, or has the necessary subject matter expertise required to conduct the work and is supervised by a professional with the CISA designation and necessary subject matter expertise to adequately review the work performed.

II. Using This Document

This audit/assurance program was developed to assist the audit and assurance professional in designing and executing a review. Details regarding the format and use of the document follow.

Work Program StepsThe first column of the program describes the steps to be performed. The numbering scheme used provides built-in work paper numbering for ease of cross-reference to the specific work paper for that section. The physical document was designed in Microsoft® Word. The IT audit and assurance professional is encouraged to make modifications to this document to reflect the specific environment under review.

Steps 1 and 2 are part of the fact gathering and pre-fieldwork preparation. Because the pre-fieldwork is essential to a successful and professional review, the steps have been itemized in this plan. The first-level steps, e.g., 1.1, are in bold type and provide the reviewer with a scope or high-level explanation of the purpose for the substeps.

Beginning in step 3, the steps associated with the work program are itemized. To simplify the use of the program, the audit/assurance program describes the audit/assurance objective—the reason for performing the steps in the topic area. The specific controls follow and are shown in blue type. Each review step is listed below the control. These steps may include assessing the control design by walking through a process, interviewing, observing or otherwise verifying the process and the controls that address that process. In many cases, once the control design has been verified, specific tests need to be performed to provide assurance that the process associated with the control is being followed. Test objectives are shown in green type. The specific test process follows the test objective.

The maturity assessment, which is described in more detail later in this document, makes up the last section of the program.

© 2009 ISACA. All rights reserved. Page 6

Page 7: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

The audit/assurance plan wrap-up—those processes associated with the completion and review of work papers, preparation of issues and recommendations, report writing and report clearing—has been excluded from this document, since it is standard for the audit/assurance function and should be identified elsewhere in the enterprise’s standards.

COBIT Cross-referenceThe COBIT cross-reference provides the audit and assurance professional with the ability to refer to the specific COBIT control objective that supports the audit/assurance step. The COBIT control objective should be identified for each audit/assurance step in the section. Multiple cross-references are not uncommon. Processes at lower levels in the work program are too granular to be cross-referenced to COBIT. The audit/assurance program is organized in a manner to facilitate an evaluation through a structure parallel to the development process. COBIT provides in-depth control objectives and suggested control practices at each level. As the professional reviews each control, he/she should refer to COBIT 4.1 or the IT Assurance Guide: Using COBIT for good-practice control guidance.

COSO ComponentsAs noted in the introduction, COSO and similar frameworks have become increasingly popular among audit and assurance professionals. This ties the assurance work to the enterprise’s control framework. While the IT audit/assurance function has COBIT as a framework, operational audit and assurance professionals use the framework established by the enterprise. Since COSO is the most prevalent internal control framework, it has been included in this document and is a bridge to align IT audit/assurance with the rest of the audit/assurance function. Many audit/assurance enterprises include the COSO control components within their report and summarize assurance activities to the audit committee of the board of directors.

For each control, the audit and assurance professional should indicate the COSO component(s) addressed. It is possible, but generally not necessary, to extend this analysis to the specific audit step level.

The original COSO internal control framework contained five components. In 2004, COSO was revised as the Enterprise Risk Management (ERM) Integrated Framework and extended to eight components. The primary difference between the two frameworks is the additional focus on ERM and integration into the business decision model. ERM is in the process of being adopted by large enterprises. The two frameworks are compared in figure 1.

Figure 1—Comparison of COSO Internal Control and ERM Integrated FrameworksInternal Control Framework ERM Integrated Framework

Control Environment: The control environment sets the tone of an organization, influencing the control consciousness of its people. It is the foundation for all other components of internal control, providing discipline and structure. Control environment factors include the integrity, ethical values, management’s operating style, delegation of authority systems, as well as the processes for managing and developing people in the organization.

Internal Environment: The internal environment encompasses the tone of an organization, and sets the basis for how risk is viewed and addressed by an entity’s people, including risk management philosophy and risk appetite, integrity and ethical values, and the environment in which they operate.

Objective Setting: Objectives must exist before management can identify potential events affecting their achievement. Enterprise risk management ensures that management has in place a process to set objectives and that the chosen objectives support and align with the entity’s mission and are consistent with its risk appetite.Event Identification: Internal and external events affecting achievement of an entity’s objectives must be identified, distinguishing between risks and opportunities. Opportunities are channeled back to management’s strategy or objective-setting processes.

© 2009 ISACA. All rights reserved. Page 7

Page 8: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Figure 1—Comparison of COSO Internal Control and ERM Integrated FrameworksInternal Control Framework ERM Integrated Framework

Risk Assessment: Every entity faces a variety of risks from external and internal sources that must be assessed. A precondition to risk assessment is establishment of objectives, and thus risk assessment is the identification and analysis of relevant risks to achievement of assigned objectives. Risk assessment is a prerequisite for determining how the risks should be managed.

Risk Assessment: Risks are analyzed, considering the likelihood and impact, as a basis for determining how they could be managed. Risk areas are assessed on an inherent and residual basis.

Risk Response: Management selects risk responses–avoiding, accepting, reducing or sharing risk—developing a set of actions to align risks with the entity’s risk tolerances and risk appetite.

Control Activities: Control activities are the policies and procedures that help ensure management directives are carried out. They help ensure that necessary actions are taken to address risks to achievement of the entity's objectives. Control activities occur throughout the organization, at all levels and in all functions. They include a range of activities as diverse as approvals, authorizations, verifications, reconciliations, reviews of operating performance, security of assets and segregation of duties.

Control Activities: Policies and procedures are established and implemented to help ensure the risk responses are effectively carried out.

Information and Communication: Information systems play a key role in internal control systems as they produce reports, including operational, financial and compliance-related information that make it possible to run and control the business. In a broader sense, effective communication must ensure information flows down, across and up the organization. Effective communication should also be ensured with external parties, such as customers, suppliers, regulators and shareholders.

Information and Communication: Relevant information is identified, captured and communicated in a form and time frame that enable people to carry out their responsibilities. Effective communication also occurs in a broader sense, flowing down, across and up the entity.

Monitoring: Internal control systems need to be monitored—a process that assesses the quality of the system’s performance over time. This is accomplished through ongoing monitoring activities or separate evaluations. Internal control deficiencies detected through these monitoring activities should be reported upstream and corrective actions should be taken to ensure continuous improvement of the system.

Monitoring: The entirety of enterprise risk management is monitored and modifications made as necessary. Monitoring is accomplished through ongoing management activities, separate evaluations or both..

Information for figure 1 was obtained from the COSO web site www.coso.org/aboutus.htm.

The original COSO internal control framework addresses the needs of the IT audit and assurance professional: control environment, risk assessment, control activities, information and communication, and monitoring. As such, ISACA has elected to utilize the five-component model for these audit/ assurance programs. As more enterprises implement the ERM model, the additional three columns can be added, if relevant. When completing the COSO component columns, consider the definitions of the components as described in figure 1.

Reference/HyperlinkGood practices require the audit and assurance professional to create a work paper for each line item, which describes the work performed, issues identified and conclusions. The reference/hyperlink is to be used to cross-reference the audit/assurance step to the work paper that supports it. The numbering system of this document provides a ready numbering scheme for the work papers. If desired, a link to the work paper can be pasted into this column.

Issue Cross-referenceThis column can be used to flag a finding/issue that the IT audit and assurance professional wants to further investigate or establish as a potential finding. The potential findings should be documented in a work paper that indicates the disposition of the findings (formally reported, reported as a memo or verbal finding, or waived).

CommentsThe comments column can be used to indicate the waiving of a step or other notations. It is not to be used in place of a work paper describing the work performed.

© 2009 ISACA. All rights reserved. Page 8

Page 9: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

III. Controls Maturity Analysis

One of the consistent requests of stakeholders who have undergone IT audit/assurance reviews is a desire to understand how their performance compares to good practices. Audit and assurance professionals must provide an objective basis for the review conclusions. Maturity modeling for management and control over IT processes is based on a method of evaluating the organization, so it can be rated from a maturity level of nonexistent (0) to optimized (5). This approach is derived from the maturity model that the Software Engineering Institute (SEI) of Carnegie Mellon University defined for the maturity of software development.

The IT Assurance Guide Using COBIT, Appendix VII—Maturity Model for Internal Control, in figure 2, provides a generic maturity model showing the status of the internal control environment and the establishment of internal controls in an enterprise. It shows how the management of internal control, and an awareness of the need to establish better internal controls, typically develops from an ad hoc to an optimized level. The model provides a high-level guide to help COBIT users appreciate what is required for effective internal controls in IT and to help position their enterprise on the maturity scale.

Figure 2—Maturity Model for Internal ControlMaturity Level Status of the Internal Control Environment Establishment of Internal Controls0 Non-existent There is no recognition of the need for internal control.

Control is not part of the organization’s culture or mission. There is a high risk of control deficiencies and incidents.

There is no intent to assess the need for internal control. Incidents are dealt with as they arise.

1 Initial/ad hoc There is some recognition of the need for internal control. The approach to risk and control requirements is ad hoc and disorganized, without communication or monitoring. Deficiencies are not identified. Employees are not aware of their responsibilities.

There is no awareness of the need for assessment of what is needed in terms of IT controls. When performed, it is only on an ad hoc basis, at a high level and in reaction to significant incidents. Assessment addresses only the actual incident.

2 Repeatable but Intuitive

Controls are in place but are not documented. Their operation is dependent on the knowledge and motivation of individuals. Effectiveness is not adequately evaluated. Many control weaknesses exist and are not adequately addressed; the impact can be severe. Management actions to resolve control issues are not prioritized or consistent. Employees may not be aware of their responsibilities.

Assessment of control needs occurs only when needed for selected IT processes to determine the current level of control maturity, the target level that should be reached and the gaps that exist. An informal workshop approach, involving IT managers and the team involved in the process, is used to define an adequate approach to controls for the process and to motivate an agreed-upon action plan.

3 Defined Controls are in place and adequately documented. Operating effectiveness is evaluated on a periodic basis and there is an average number of issues. However, the evaluation process is not documented. While management is able to deal predictably with most control issues, some control weaknesses persist and impacts could still be severe. Employees are aware of their responsibilities for control.

Critical IT processes are identified based on value and risk drivers. A detailed analysis is performed to identify control requirements and the root cause of gaps and to develop improvement opportunities. In addition to facilitated workshops, tools are used and interviews are performed to support the analysis and ensure that an IT process owner owns and drives the assessment and improvement process.

4 Managed and Measurable

There is an effective internal control and risk management environment. A formal, documented evaluation of controls occurs frequently. Many controls are automated and regularly reviewed. Management is likely to detect most control issues, but not all issues are routinely identified. There is consistent follow-up to address identified control weaknesses. A limited, tactical use of technology is applied to automate controls.

IT process criticality is regularly defined with full support and agreement from the relevant business process owners. Assessment of control requirements is based on policy and the actual maturity of these processes, following a thorough and measured analysis involving key stakeholders. Accountability for these assessments is clear and enforced. Improvement strategies are supported by business cases. Performance in achieving the desired outcomes is consistently monitored. External control reviews are organized occasionally.

5 Optimized An enterprisewide risk and control program provides continuous and effective control and risk issues resolution. Internal control and risk management are integrated with enterprise practices, supported with automated real-time monitoring with full accountability for control monitoring, risk management and compliance enforcement. Control evaluation is continuous, based on self-assessments and gap and root cause analyses. Employees are proactively involved in control improvements.

Business changes consider the criticality of IT processes and cover any need to reassess process control capability. IT process owners regularly perform self-assessments to confirm that controls are at the right level of maturity to meet business needs and they consider maturity attributes to find ways to make controls more efficient and effective. The organization benchmarks to external best practices and seeks external advice on internal control effectiveness. For critical processes, independent reviews take place to provide assurance that the controls are at the desired level of maturity and working as planned.

© 2009 ISACA. All rights reserved. Page 9

Page 10: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

The maturity model evaluation is one of the final steps in the evaluation process. The IT audit and assurance professional can address the key controls within the scope of the work program and formulate an objective assessment of the maturity levels of the control practices. The maturity assessment can be a part of the audit/assurance report, and used as a metric from year to year to document progression in the enhancement of controls. However, it must be noted that the perception of the maturity level may vary between the process/IT asset owner and the auditor. Therefore, an auditor should obtain the concerned stakeholder’s concurrence before submitting the final report to management.

At the conclusion of the review, once all findings and recommendations are completed, the professional assesses the current state of the COBIT control framework and assigns it a maturity level using the six-level scale. Some practitioners utilize decimals (x.25, x.5, x.75) to indicate gradations in the maturity model. As a further reference, COBIT provides a definition of the maturity designations by control objective. While this approach is not mandatory, the process is provided as a separate section at the end of the audit/assurance program for those enterprises that wish to implement it. It is suggested that a maturity assessment be made at the COBIT control level. To provide further value to the client/customer, the professional can also obtain maturity targets from the client/customer. Using the assessed and target maturity levels, the professional can create an effective graphic presentation that describes the achievement or gaps between the actual and targeted maturity goals. A graphic is provided on the last page of this document (section VII), based on sample assessments.

IV. Assurance and Control Framework

ISACA IT Assurance Framework and StandardsChange management is included in ITAF. ITAF section 3630—Auditing IT General Controls—refers to the management of software in production and the promotion of software from a test environment into production.

ISACA has long recognized the specialized nature of IT assurance and strives to advance globally applicable standards. Guidelines and procedures provide detailed guidance on how to follow those standards. IS Auditing Standard S15 IT Controls, IS Auditing Guidelines G23 System Development Life Cycle (SDLC) Review Reviews and G38 Access Controls, and IS Auditing Procedure P10 Business Application Change Control are relevant to this audit/assurance program.

ISACA Controls FrameworkCOBIT is an IT governance framework and supporting tool set that allows managers to bridge the gap among control requirements, technical issues and business risks. COBIT enables clear policy development and good practice for IT control throughout enterprises.

Utilizing COBIT as the control framework on which IT audit/assurance activities are based aligns IT audit/assurance with good practices as developed by the enterprise.

The COBIT Acquire and Implement (AI) domain addresses good practices for systems development and maintenance. AI6 Manage changes specifically addresses change management:

All changes, including emergency maintenance and patches, relating to infrastructure and applications within the production environment are formally managed in a controlled manner. Changes (including those to procedures, processes, system and service parameters) are logged, assessed and authorised prior to implementation and reviewed against planned outcomes following implementation. This assures mitigation of the risks of negatively impacting the stability or integrity of the production.

© 2009 ISACA. All rights reserved. Page 10

Page 11: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

AI6 Manage changes provides the following guidance: AI6.1 Change standards and procedures

– Control objective—Set up formal change management procedures to handle in a standardized manner all requests (including maintenance and patches) for changes to applications, procedures, processes, system and service parameters, and the underlying platforms.

– Value drivers:- An agreed-upon standardized approach for managing changes in an efficient and effective

manner- Changes reviewed and approved in a consistent and coordinated way- Formally defined expectations and performance measurements

– Risk drivers:- Inappropriate resource allocation- No tracking of changes- Insufficient control over emergency changes- Increased likelihood of unauthorized changes being introduced to key business systems- Failure to comply with compliance requirements- Unauthorized changes- Reduced system availability

AI6.2 Impact assessment, prioritization and authorization– Control objective—Assess all requests for change in a structured way to determine the impact

on the operational system and its functionality. Ensure that changes are categorized, prioritized and authorized.

– Value drivers:- An agreed-upon and standardized approach for assessing impacts in an efficient and effective

manner- Formally defined change impact expectations based on business risk and performance

measurement- Consistent change procedure

– Risk drivers:- Unintended side effects- Adverse effects on capacity and performance of the infrastructure- Lack of priority management of changes

AI6.3 Emergency changes– Control objective—Establish a process for defining, raising, testing, documenting, assessing

and authorizing emergency changes that do not follow the established change process.– Value drivers:

- An agreed-upon and standardized approach for managing changes in an efficient and effective manner

- Formally defined emergency change expectations and performance measurement- Consistent procedure for emergency changes

– Risk drivers:- Inability to respond effectively to emergency change needs- Additional access authorization not terminated properly- Unauthorized changes applied, resulting in compromised security and unauthorized access to

corporate information AI6.4 Change status tracking and reporting

– Control objective—Establish a tracking and reporting system to document rejected changes, communicate the status of approved and in-process changes, and complete changes. Make certain that approved changes are implemented as planned.

– Value drivers:

© 2009 ISACA. All rights reserved. Page 11

Page 12: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

- An agreed-upon and standardized approach for managing changes in an efficient and effective manner

- Formally defined expectations and performance measurement- Consistent change procedure

– Risk drivers:- Insufficient allocation of resources- Changes not recorded and tracked- Undetected unauthorized changes to the production environment

AI6.5 Change closure and documentation– Control objective—Whenever changes are implemented, update the associated system and user

documentation and procedures accordingly.– Value drivers:

- An agreed-upon and standardized approach for documenting changes- Formally defined expectations- Consistent change and documentation procedures

– Risk drivers:- Increased dependence on key individuals- Configuration documentation failing to reflect the current system configuration- Lack of documentation of business processes- Failure of updates for hardware and software changes

V. Executive Summary of Audit/Assurance Focus

Change Management IntroductionChange management is the process that ensures that system software (operating systems and supporting applications), application software and configuration files are introduced into production in an orderly and controlled manner.

Change management relies upon several other processes, including those for: Systems development methodology (SDM)—The SDM manages applications development and

applications programming to ensure appropriate design, testing, programming oversight and user acceptance. It is also used to manage systems software management and configuration. The specific applications and systems software processes may differ, but they should subscribe to similar controls.

Systems request process—This process is normally a part of the SDM, and is the formal request for change services.

Incident management—This process addresses problem tickets initiated by computer operations (processing errors or program failures), help desk (user-identified processing problems) or other stakeholders. Incidents or problem tickets should be considered unusual occurrences requiring monitoring and follow-up.

Information security issues—These issues are generated by information security, operations, help desk or end users.

Software library controls—The software libraries are the repositories of the applications programs (source code), configuration files, executable programs (computer executable code), report generators, etc. Access to these repositories must be restricted to authorized individuals and must be monitored for unauthorized access.

Software distribution controls—In a distributed infrastructure, software executable programs must be distributed to the down-line computer systems.

The definitive control over change management is the promotion to production or move to production process. Once a program has been tested and approved for migration or promotion to the production

© 2009 ISACA. All rights reserved. Page 12

Page 13: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

environment, the program is subject to final approvals and moved to protected production source and executable libraries. The documentation of the change is the change control document, often referred to as a “move to production ticket” or “promotion to production ticket.” This documentation is the final approval for the entry into production.

Business Impact and RiskSystems and application software process enterprise data. The enterprise relies on the integrity of these subsystems to operate their applications and to be in alignment with the business’s goals, objectives and instructions. Good-practice change management provides business management with the assurance that only authorized and tested changes to business processes and the supporting infrastructure are implemented.

Change management is an essential component of the IT operational infrastructure. Failure to implement good-practice change management may result in: Unauthorized business process changes being introduced into the operations Financial statements being materially misstated Unintended side effects Inconsistent processing results Changes not being recorded and tracked Emergency changes being implemented without adequate oversight, resulting in the introduction of

erroneous processes, unauthorized business processes and inefficiencies Lack of priority management of changes Inability to respond effectively to emergency change needs Additional access authorization not being terminated properly Unauthorized changes being applied, resulting in compromised security and unauthorized access to

corporate information Failure to comply with compliance requirements Changes not being adequately prioritized or aggregated, resulting in lost productivity, late

implementation of required changes, or redundancy Adverse effects on capacity and performance of the infrastructure System or application failure, resulting in lack of availability Reduced system availability Security intrusions Insufficient allocation of resources

Objective and ScopeObjective—Perform a review of the change management process to provide management with assurance that the process is controlled, monitored and is compliance with good practices.

Scope—The review will focus on the program change management processes. It will rely on the system’s development methodology to provide a design, development and testing methodology, and the system’s request and incident management processes to provide input to the change management system. All processes affecting these functions prior to the system’s request or incident/problem ticket entering the change management process are outside the scope of this review.

Minimum Audit SkillsThe IT audit and assurance professional must have an understanding of the good-practice change management processes. Professionals holding CISA certification should have these skills. Technical skills necessary to perform some audit steps may require specific understanding of operating systems environments in use, the library management systems and computer-assisted audit techniques (CAATs).

© 2009 ISACA. All rights reserved. Page 13

Page 14: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

VI. Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

1. PLANNING AND SCOPING THE AUDIT

1.1 Define audit/assurance objectives.The audit/assurance objectives are high level and describe the overall audit goals.

ME2.1

1.1.1 Review the audit/assurance objectives in the introduction to this audit/assurance program.

1.1.2 Modify the audit/assurance objectives to align with the audit/assurance universe, annual plan and charter.

1.2 Define boundaries of review.The review must have a defined scope. The reviewer must understand the operating environment and prepare a proposed scope, subject to a later risk assessment.

1.2.1 Perform a high-level walkthrough of the change management functions within the enterprise.

1.2.1.1 Determine what change management functions operate within the enterprise.

1.2.1.2 Determine the applications and/or operating environments serviced by the identified change management systems.

1.2.2 Establish initial boundaries of the audit/assurance review.

1.2.2.1 Where multiple change management systems exist, identify proposed change management systems to be within scope.

1.2.2.2 Identify limitations and/or constraints affecting the audit of specific systems.

1.2.2.3 Determine if integrity systems exist to provide assurance that changes made to the systems are reconciled to authorized change tickets from the change management systems.

© 2009 ISACA. All rights reserved. Page 14

Page 15: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

1.3 Define assurance.The review requires two sources of standards. The corporate standards, as defined in policy and procedure documentation, establish the corporate expectations. At minimum, corporate standards should be implemented. The second source, a good-practice reference, establishes industry standards. Enhancements should be proposed to address gaps between the two.

1.3.1 Obtain company change management standards, if they exist.

1.3.2 Determine if COBIT or the IT Infrastructure Library (ITIL) or both will be used as a good-practice reference.

1.4 Identify and document risks.The risk assessment is necessary to evaluate where audit resources should be focused. In most enterprises, audit resources are not available for all processes. The risk-based approach ensures utilization of audit resources in the most effective manner.

1.4.1 For the applications and systems identified as potentially being in scope:

1.4.1.1 Identify the change control risks associated with the applications and operating environment.

1.4.1.2 Assess the business risk of each operating environment, based on the applications serviced.

1.4.2 Based on the risk assessment, identify changes to the scope.

1.4.3 Discuss the risks with IT, the business and operational audit management, and adjust the risk assessment.

1.4.4 Based on the risk assessment, revise the scope.

1.5 Define the change process.The initial audit approach is based on the reviewer’s understanding of the operating

© 2009 ISACA. All rights reserved. Page 15

Page 16: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

environment and associated risks. As further research and analysis are performed, changes to the scope and approach will result.

1.5.1 Identify the senior IT assurance resource responsible for the review.

1.5.2 Establish the process for suggesting and implementing changes to the audit/assurance program, and note the authorizations required.

1.6 Define assignment success.The success factors need to be identified. Communication among the IT audit/assurance team, other assurance teams and the enterprise is essential.

1.6.1 Identify the drivers for a successful review (this should exist in the assurance function’s standards and procedures).

1.6.2 Communicate success attributes to the process owner or stakeholder, and obtain agreement.

1.7 Define audit/assurance resources required.The resources required are defined in the introduction to this audit/assurance program.

1.7.1 Determine audit/assurance skills necessary for review.

1.7.2 Estimate the total resources (hours) and time frame (start and end dates) required for review.

1.8 Define deliverables.The deliverable is not limited to the final report. Communication between the audit/assurance teams and the process owner is essential to assignment success.

1.8.1 Determine the interim deliverables, including initial findings, status reports, draft reports, due dates for responses and the final report.

1.9 CommunicationsThe audit/assurance process is clearly communicated to the customer/client.

© 2009 ISACA. All rights reserved. Page 16

Page 17: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

1.9.1 Conduct an opening conference to discuss the review objectives with the executive responsible for operating systems and infrastructure.

2. UNDERSTANDING SUPPORTING INFRASTRUCTURE

2.1 Incident management systemThe incident management system (often referred to as the problem tracking system) feeds the change management system with requests resulting from system interruptions or user-discovered issues.

DS10.4 X X X

2.1.1 If an audit of the incident management system has been performed previously, obtain the work papers from that audit.

2.1.1.1 Review the previous findings and gain an understanding of the incident management system and control issues that may affect the change management process.

2.1.2 If a prior audit has not been performed or the environment has changed significantly, obtain an understanding of the feeds from the incident management system.

2.1.2.1 Determine if the feed is automated, directly interfacing with the change management system.

2.1.2.2 Based on the review, determine if further investigation is required or if the scope of change management will assume validity of the incident/problem ticket.

2.2 Program library managementThe program library management process controls access to and documentation of the program source code and configuration files.

AI3.2 AI7.8 DS5.7

X X

2.2.1 If prior assurance work has included a review of the program library management system, obtain and review the work papers and follow up on the findings.

© 2009 ISACA. All rights reserved. Page 17

Page 18: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

2.2.2 If no prior assurance work has been performed, obtain documentation and descriptions of the various program library management systems in use within the scope of the application/system software included in the audit.

2.3 Executable library securityThe executable libraries include the compiled versions of the programs. This code is used by the computer to process the data. The executable library will have similar controls as the program library; however, it will have the added requirement that the program and executable libraries must be synchronized (the program stored in the program library must, when compiled, generate the same executable as the program stored in the executable library).

AI3.2 AI7.8 DS5.7

X X

2.3.1 Obtain the documentation describing how executable programs are stored on the systems within the scope (operating systems store the programs differently).

2.3.2 If an outside vendor provides patches or executable programs to the enterprise without providing the source, determine the distribution process for these programs.

2.4 Distributed executable distribution systemSimilar to the executable library, in a distributed operating environment, the programs are compiled centrally, but the executables are distributed to the various processing locations.

AI3.2 AI7.8 DS5.7

X

2.4.1 Obtain the documentation describing how distributed systems receive the executable programs from the central programming location.

2.5 Systems development methodologyThis methodology addresses the planning, design, development and testing of new and updated software. Since systems requests resulting from the systems development methodology are within scope, it is necessary to obtain an understanding of the request process.

PO8.3 X X X X X

2.5.1 Obtain the documentation for the systems development process, including systems requests, evaluation of the project, risk assessment, resource allocation, testing and program quality assurance.

2.5.2 Obtain the documentation for change management relating to configuration management, including change requests, evaluation of the effect of the change on production systems, risk assessment, resource allocation, testing and system quality

© 2009 ISACA. All rights reserved. Page 18

Page 19: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

assurance.

3. IDENTIFY CHANGE NEEDAudit/assurance objective: Only changes that are authorized, evaluated and prioritized and the resources required should enter the change process.

3.1 Control: Management classifies, reviews and approves change requests. This control ensures that management has considered and approved the changes in the queue.

3.1.1 Obtain the enterprise’s standards, procedures and guidelines for identifying, classifying and approving change requests.

3.1.1.1 Information should be obtained by interviews, observation and reviewing documentation.

3.1.1.1.1 Determine if a process exists to classify change requests as an infrastructure or application change.

3.1.1.1.2 Determine if a process exists to perform a risk assessment focused on the impact of the change on other systems or applications.

3.1.1.1.3 Determine if there is a process to perform an impact analysis on changes to determine the effect the change would have on the business process’s integrity and availability.

3.1.1.1.4 Determine if there is a process for performing an analysis of any compliance issues that would be affected by the change request.

3.1.1.1.5 Determine if a resource budget is assigned to each change request.

3.1.1.1.6 Determine if a list exists of appropriate change requesters for each application.

3.1.1.1.7 Verify that the appropriate approvers within IT operations, IT systems development and the business owner have approved the change and their approval is documented.

© 2009 ISACA. All rights reserved. Page 19

Page 20: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

3.1.1.1.8 Determine if the change requests are subject to prioritization.

3.1.1.1.8.1 If prioritization is performed, determine if appropriate members of management regularly authorize the priority.

3.1.2 Test objective: To verify compliance with the review and prioritization process

3.1.2.1 Using the move ticket, obtain a population of requested changes.

3.1.2.1.1 When making the selection, select representative samples resulting from emergency requests, systems requests and problem tickets.

3.1.2.1.2 Stratify the selection of tickets to include a greater sample of higher-risk application/software changes, but also include a lesser number of medium- and low-risk changes.

3.1.2.1.3 For each selected ticket:

3.1.2.1.3.1 Trace the move request to the originating request (systems request, problem ticket or emergency request [if different]).

3.1.2.1.3.2 Determine if each ticket was classified as an infrastructure or application change.

3.1.2.1.3.3 Determine if there was a risk assessment performed for impact on other systems or applications.

3.1.2.1.3.4 Determine if an impact analysis was performed to determine the effect the change would have on the enterprise.

3.1.2.1.3.5 Determine if there was an analysis of any compliance issues that would be affected by the change request.

© 2009 ISACA. All rights reserved. Page 20

Page 21: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

3.1.2.1.3.6 Determine if a resource budget had been assigned to the change request.

3.1.2.1.3.7 Determine if the appropriate approvers within IT operations, IT systems development and the business owner documented their approval of the change.

3.1.2.1.3.8 Determine if the change request had been subject to prioritization.

3.1.2.1.3.8.1 If prioritization had been granted, determine if appropriate management had authorized the priority.

4. PRODUCTION LIBRARY MANAGEMENTAudit/assurance objective: Production libraries should be secure, allowing only authorized personnel to access the production libraries. Management must provide oversight of access to libraries, good-practice separation of duties, and synchronization of source and executable libraries.

4.1 Production source library controlsThe production source libraries contain the source language and configuration for the production programs. Access needs to be limited and monitoring processes need to be in place to effectively oversee change activities affecting the source libraries.

4.2 Control: Access to production source is limited on a need-to-know basis. Programmers are limited to READ access; only change management staff members are assigned WRITE access (except for emergency changes, described in Step 6).

AI3.2 AI7.8 DS5.7

X X

4.2.1 Through interviews, observation and review of documentation, determine the controls limiting access to the production source libraries.

4.2.1.1 Determine if there is a separation-of-duties table identifying the access levels and to whom they are assigned.

4.2.1.2 Verify that ID access logs, including date and time stamps, are maintained © 2009 ISACA. All rights reserved. Page 21

Page 22: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

and reviewed on a regular basis.

4.2.1.3 Determine if access control lists are reviewed and updated regularly.

4.2.1.4 Test objective: To verify that access to the production source libraries is provided on a need-to-know basis

4.2.1.4.1 Obtain the access control list for production source library.

4.2.1.4.2 Review the list and identify any personnel not in the change management with WRITE access to the library.

4.2.1.4.3 Obtain the access log and identify unauthorized or suspect access to production library.

4.2.1.4.4 Verify documented management review of the access control list and unusual activity logs. Ensure periodic review.

4.3 Control: Production source libraries maintain version control, which provides a history of all modifications and the ability to roll back the source to a previous version if the new version is not functioning properly.

AI3.2 AI7.8 DS5.7

X X

4.3.1 Through interviews, observation and review of documentation, determine how version control operates and if it can be overridden.

4.3.2 Through interviews, observation and review of documentation, determine if the functionality exists to roll back an update program to its previous version.

4.4 Production executable library controlsThe production executable libraries contain the computer code to process the programs. Access needs to be limited and monitoring processes need to be in place to effectively oversee change activities affecting the executable libraries.

4.5 Control: Access to production executable libraries is limited to a need-to-know basis. Programmers are limited to READ access; only change management staff members are assigned WRITE access (except for emergency changes described in Step 6).

AI3.2 AI7.8 DS5.7

X X

4.5.1 Through interviews, observation and review of documentation, determine the © 2009 ISACA. All rights reserved. Page 22

Page 23: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

controls limiting access to the production executable libraries.

4.5.1.1 Determine if there is a separation-of-duties table identifying the access levels and to whom they are assigned.

4.5.1.2 Determine if ID access logs, including date and time stamps, are maintained and reviewed on a regular basis.

4.5.1.3 Determine if access control lists are reviewed and updated regularly.

4.5.1.4 Test objective: To verify that access to the production executable libraries is provided on a need-to-know basis

4.5.1.4.1 Based on risk, select the production executable libraries to be tested.

4.5.1.4.2 Obtain the access control list for production executable libraries.

4.5.1.4.2.1 Review the list and identify any personnel not in the change management with WRITE access to the libraries.

4.5.1.4.2.2 Obtain the access log and identify unauthorized or suspect access to production libraries.

4.5.1.4.2.3 Verify documented management review of the access control list and unusual activity logs.

4.6 Control: Production executable libraries maintain version control, which provides a history of all modifications and the ability to roll back the executable to a previous version if the new version is not functioning properly.

AI7.5 DS9.1 X X

4.6.1 Through interviews, observation and review of documentation, determine how version control operates and if version control can be overridden.

4.6.2 Through interviews, observation and review of documentation, determine if the functionality exists to roll back an update program to its previous version.

4.7 Control: Changes to the production executable libraries of distributed systems utilize a scheduled transmission and acknowledgment process to ensure accurate, complete and

AI7.8 X X

© 2009 ISACA. All rights reserved. Page 23

Page 24: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

timely transmission of changes.

4.7.1 Through interviews, observation and review of documentation, determine what control techniques are utilized to ensure complete and accurate transmission of program changes.

4.7.2 Test objective: To verify the accuracy of distribution of executables to remote processors

4.7.2.1 Select a sample of executables.

4.7.2.2 Determine the size, date and time of the executables to be distributed as they reside in the master executable library.

4.7.2.3 For the selected executable, determine the date and time transmitted and the size of the file at the distributed computer.

4.7.2.4 Evaluate the timeliness and completeness of the distribution.

5. MOVE TO PRODUCTIONAudit/assurance objective: The move to the production process should be controlled and documented. Access should be limited to authorized change management personnel. Only authorized changes should have been made to production programs, and the move process should ensure synchronization of the source and executable libraries.

5.1 Control: Program changes require sign-off by the appropriate stakeholders prior to being moved into production.

AI6.2AI6.5 X X X

5.1.1 Determine if the sign-off process, prior to a change moving into production, includes the following:

5.1.1.1 The programming function indicates completion of testing, quality assurance and documentation.

5.1.1.2 Users indicate satisfactory acceptance test, approval and knowledge of implementation date.

© 2009 ISACA. All rights reserved. Page 24

Page 25: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

5.1.1.3 IT operations indicates acceptance of documentation, scheduling changes, backup changes, run-time changes, etc.

5.1.1.4 Information security indicates acceptance of information security changes.

5.1.1.5 Documentation (user, IT operations, backup/recovery business continuity plan) is approved.

5.1.1.6 Test objective: To verify the sign-off process to ensure that all sign-offs were completed before the move to production and the appropriate personnel approved the move

5.1.1.6.1 Obtain a sample of routine move-to-production tickets for applications and software changes in scope.

5.1.1.6.2 For each move ticket, verify timely approvals by:

5.1.1.6.2.1 The programming function indicates completion of testing, quality assurance and documentation.

5.1.1.6.2.2 Users indicate satisfactory acceptance test, approval and knowledge of implementation date.

5.1.1.6.2.3 IT operations indicates acceptance of documentation, scheduling changes, backup changes, run-time changes, etc.

5.1.1.6.2.4 Information security indicates acceptance of information security changes.

5.1.1.6.2.5 Documentation indicates satisfactory reviews by users, IT operations, backup/recovery business continuity plan.

5.2 Control: Change management software is used to control the change process. AI6.1 X X

© 2009 ISACA. All rights reserved. Page 25

Page 26: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

5.2.1 Through interviews, observation and review of documentation, determine the automated change management process.

5.2.1.1 Walk through the process of entering a move ticket, approving the ticket, compiling the program and moving it into production.

5.2.1.2 Determine the controls to identify and authenticate the approver’s authority to move a program into production.

5.2.1.3 Determine the available logs and reports generated by the change management system to trace and research program moves into production.

5.2.1.4 Determine if there are “back doors” that allow bypassing of the change management software system.

5.2.1.5 Determine if logs and reports generated by the change management system are reviewed by management and if such reviews are formally documented.

5.2.2 Test objective: To verify that the change management software and user controls are effective

5.2.2.1 Based on the reviewer’s understanding of the automated move process, identify control points to test (consider automated authorization, monitoring, logging capabilities, independent recompilation of programs, etc.).

5.2.2.2 Select several change tickets.

5.2.2.3 Focusing on the control points identified in step 5.2.2.1, follow the selected change tickets through the process, verifying compliance with identified controls.

5.3 Control: Manual controls throughout the program move process prevent unauthorized moves to production.

AI3.2AI7.8DS5.7

X X

© 2009 ISACA. All rights reserved. Page 26

Page 27: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

5.3.1 Document the process of moving the program from the test to the production environment.

5.3.2 Document the process of independently recompiling the programs by someone other than the programmer, and placing the programs in a production library.

5.3.3 Where there is a lack of separation of duties, document alternative controls (program source and executable compares, log date and time verification, etc.) used to ensure the integrity of the program move-to-production process.

5.3.4 Test objective: To verify the effectiveness of the manual change management process

5.3.4.1 Identify key control points in the program change process (notification of program ready for move to production, transfer of program from test to production library, compilation of source, comparison of compilation and executable dates, etc.).

5.3.4.2 Select a statistically valid sample size (at least 25 randomly selected moves to production).

5.3.4.3 Trace the move to production against good practices and enterprise standards. Focus on the documented evidence of management review.

5.4 Control: Management reviews program changes to ensure that only authorized changes from the move ticket, systems request or incident log are included in the modification.

AI6.1AI6.5 X X

5.4.1 Determine whether a comparison of source code before and after the modification is included in the documentation.

5.4.2 Determine how management reviews the changes to ensure that only authorized changes have been implemented.

5.4.3 Test objective: To verify the process of comparing authorized changes to completed changes.

© 2009 ISACA. All rights reserved. Page 27

Page 28: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

5.4.3.1 Select a sample (including emergency requests) from a population of move tickets.

5.4.3.2 Obtain the change request supporting the move ticket.

5.4.3.3 Based on the change request, obtain an understanding of the changes required.

5.4.3.4 Run a source code comparison of the previous and current programs to identify the code changes.

5.4.3.5 Perform a “reasonableness” test, ensuring that the changes requested in the systems request are the same changes implemented.

5.5 Control: The production source and executable libraries are synchronized, all executable library entries are supported by a move ticket, and appropriate logging is available to monitor and provide the ability to trace moves initiated by a move ticket to a library update.

AI6.5DS9.2 X X

5.5.1 Determine how the compile process generates the date and time stamp of compilation.

5.5.2 Determine that the executable library documents the date and time of update.

5.5.3 Determine the process that ensures that all executables in the library have move tickets.

5.5.4 Test objective: To verify that the production source and executable libraries are synchronized

5.5.4.1 Select a sample (including emergency requests) from a population of move tickets.

5.5.4.2 Verify that the source compilation date and time agrees with the date and time of the executable.

5.5.4.3 Select a few programs from the move log and recompile the programs using the production compilation process, but saving the executable to a

© 2009 ISACA. All rights reserved. Page 28

Page 29: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

storage area controlled by the reviewer. Compare the executable generated by the reviewer to the executable stored in the production executable library, and identify differences.

5.5.5 Test objective: To verify that all executables have move-to-production tickets

5.5.5.1 Select several executable programs/modules from the production executable library. Trace the executable to a move ticket.

6. EMERGENCY CHANGESAudit/assurance objective: Emergency changes should be controlled, documented and initiated only in true emergencies.

6.1 Control: Changes using the emergency change procedure are initiated only for changes where time is of the essence.

AI6.3 X X X

6.1.1 Through interviews, observation and review of documentation, determine if there is a definition for an emergency change.

6.1.2 Test objective: To verify that only necessary changes are made using the emergency change procedure

6.1.2.1 Select a representative sample of emergency changes.

6.1.2.2 Using the definition of an emergency change, review the emergency changes to determine if the changes were, in fact, emergencies.

6.2 Control: Emergency changes are adequately tested before being placed into production.

AI6.3 X X

6.2.1 Through interviews, observation and review of documentation, determine the process used to review testing procedures before an emergency change is accepted into production.

6.2.2 Determine if a list of authorized requesters for emergency changes exists.

© 2009 ISACA. All rights reserved. Page 29

Page 30: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

6.2.3 Test objective: To verify that emergency change authorization was approved prior to the introduction of the change into the production environment

6.2.3.1 Select emergency changes from several sources.

6.2.3.1.1 Review the existence of test results and management review.

6.3 Control: Emergency changes are authorized by an appropriate member of management before being placed into production.

AI6.3 X X X

6.3.1 Through interviews, observation and review of documentation, determine the process used to authorize emergency moves to production. Differentiate between minor and major enhancements, operating system, configuration files and source programs.

6.3.2 Test objective: To verify that change authorizations were documented prior to the introduction of the change into the production environment

6.3.2.1 Select a representative sample of emergency changes.

6.3.2.2 Determine if the move into production was properly authorized.

6.4 Control: Special processes are in place to allow one-time execution of emergency changes while keeping the integrity of the production libraries.

AI6.3 X X

6.4.1 Determine if the emergency changes are executed from a temporary or test library, or copied into the protected production library.

6.4.1.1 If programs are copied into the production libraries, identify the controls to protect the libraries from unauthorized updates by the analyst/programmer initiating the changes.

6.4.1.1.1 Determine if one-time passwords are utilized to protect libraries.

6.4.1.1.1.1 If one-time passwords are utilized, evaluate the © 2009 ISACA. All rights reserved. Page 30

Page 31: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

effectiveness of the one-time password controls to ensure that the passwords are not reused and the individual utilizing the password can be identified easily.

6.4.1.1.2 If the controls to protect the production libraries do not include one-time passwords, document and evaluate the effectiveness of the other controls.

6.4.2 Test objective: To verify the effectiveness of the change control process that ensures the integrity of the production libraries and application data.

6.4.2.1 Select a sample of emergency moves to production.

6.4.2.1.1 Determine if the program was run from an interim library or the production library.

6.4.2.1.2 If the production library was used, determine if a one-time password was retrieved.

6.4.2.1.3 Determine if the one-time password was disabled.

6.5 Control: Emergency changes are subject to the same quality assurance as normal changes.

AI6.3 X X

6.5.1 Through interviews, observation and review of documentation, determine the process for reviewing emergency changes.

6.5.1.1 Determine what controls are in place to ensure that the data processed used the updated program.

6.5.1.1.1 For high-risk applications, it may be necessary to perform a comparison of the data to ensure that essential fields have not been changed.

6.5.2 Through interviews, observation and review of documentation, determine after-the-© 2009 ISACA. All rights reserved. Page 31

Page 32: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

fact quality assurance procedures, recompilation procedures, etc., to align the emergency change with standard move-to-production procedures.

6.5.2.1 Test objective: To verify the effectiveness of the change management quality assurance process and appropriate authorization

6.5.2.1.1 Select a sample of emergency moves to production.

6.5.2.1.2 Review the sign-off process to ensure that all signoffs were completed within a reasonable period after the move to production and that the appropriate personnel approved the move.

6.5.2.1.2.1 The programming function indicates completion of testing, quality assurance and documentation.

6.5.2.1.2.2 Users indicate satisfactory user acceptance test, approval and knowledge of implementation date.

6.5.2.1.2.3 IT operations indicates acceptance of documentation, scheduling changes, backup changes, run-time changes, etc.

6.5.2.1.2.4 Information security indicates acceptance of information security changes.

6.5.2.1.2.5 Documentation indicates satisfactory reviews by users, IT operations, backup/recovery business continuity plan.

6.5.2.1.3 Review the move to production and compile logs to determine if the emergency program move was subject to recompilation and was copied into the appropriate libraries.

7. CHANGE MANAGEMENT GOVERNANCEControl objective: The change management process is subject to management oversight to ensure the consistent and timely processing of changes.

© 2009 ISACA. All rights reserved. Page 32

Page 33: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

Audit/Assurance Program StepCOBIT Cross-

reference

COSO

Reference

Hyper-link

IssueCross-

referenceComments

Con

trol

Envi

ronm

ent

Ris

k A

sses

smen

t

Con

trol A

ctiv

ities

Info

rmat

ion

and

Com

mun

icat

ion

Mon

itorin

g

7.1 Control: Management receives timely reports, summarizing change management activities, key performance indicators and escalation of issues requiring management attention.

AI6.4 X X X X

7.1.1 Identify the reports that management receives, and the frequency and scope of the reports.

7.1.2 Determine if service level agreements (SLAs) are in use. If so, verify that the reports summarize SLA attainment and/or deficiency.

7.1.3 Determine the escalation process for change management processes operating outside of normal conditions.

7.1.4 Test objective: To verify the effectiveness of management’s monitoring and resolution of change management issues

7.1.4.1 Select several periods.

7.1.4.2 Review management reports, minutes of management meetings and resolution plans to document management’s oversight of change management activities.

7.1.4.3 Verify compliance with escalation procedures and the attainment of SLAs.

7.1.4.4 Determine the circumstances and resolution of escalated situations.

7.2 Control: A management steering committee is responsible for and reviews change management issues.

AI6.4ME1 X X X X X

7.2.1 Determine the management committee responsible for change management.

7.2.2 Determine if change management stakeholders are members of the steering committee.

7.2.3 Determine if the scope of the committee includes review of staffing levels, performance indicators, etc., to ensure a stable operational team.

© 2009 ISACA. All rights reserved. Page 33

Page 34: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

VII. Maturity Assessment

The maturity assessment is an opportunity for the reviewer to assess the maturity of the processes reviewed. Based on the results of audit/assurance review, and the reviewer’s observations, assign a maturity level to each of the following COBIT control practices.

COBIT Control Practice Assessed Maturity

Target Maturity

ReferenceHyper-

linkComments

AI6.1 Change Standards and Procedures 1. Develop, document and promulgate a change management framework that specifies the policies and

processes, including:• Roles and responsibilities• Classification and prioritization of all changes based on business risk• Assessment of impact• Authorization and approval of all changes by the business process owners and IT• Tracking and status of changes• Impact on data integrity (e.g., all changes to data files being made under system and application control

rather than by direct user intervention)2. Establish and maintain version control over all changes.3. Implement roles and responsibilities that involve business process owners and appropriate technical IT

functions. Ensure appropriate segregation of duties.4. Establish appropriate record management practices and audit trails to record key steps in the change

management process. Ensure timely closure of changes. Elevate and report to management changes that are not closed in a timely fashion.

5. Consider the impact of contracted services providers (e.g., of infrastructure, application development and shared services) on the change management process. Consider integration of organizational change management processes with change management processes of service providers. Consider the impact of the organizational change management process on contractual terms and SLAs.

AI6.2 Impact Assessment, Prioritization and Authorization1. Develop a process to allow business process owners and IT to request changes to infrastructure, systems

or applications. Develop controls to ensure that all such changes arise only through the change request management process.

2. Categorize all requested changes (e.g., infrastructure, operating systems, networks, application systems, purchased/packaged application software).

3. Prioritize all requested changes. Ensure that the change management process identifies both the business and technical needs for the change. Consider legal, regulatory and contractual reasons for the requested change.

4. Assess all requests in a structured fashion. Ensure that the assessment process addresses impact analysis on infrastructure, systems and applications. Consider security, legal, contractual and compliance

© 2009 ISACA. All rights reserved. Page 34

Page 35: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

COBIT Control Practice Assessed Maturity

Target Maturity

ReferenceHyper-

linkComments

implications of the requested change. Consider also interdependencies among changes. Involve business process owners in the assessment process, as appropriate.

5. Ensure that each change is formally approved by business process owners and IT technical stakeholders, as appropriate.

AI6.3 Emergency Changes1. Ensure that a documented process exists within the overall change management process to declare,

assess, authorize and record an emergency change.2. Ensure that emergency changes are processed in accordance with the emergency change element of the

formal change management process.3. Ensure that all emergency access arrangements for changes are appropriately authorized, documented

and revoked after the change has been applied.4. Conduct a post-implementation review of all emergency changes, involving all concerned parties. The

review should consider implications for aspects such as further application system maintenance, impact on development and test environments, application software development quality, documentation and manuals, and data integrity.

AI6.4 Change Status Tracking and Reporting1. Establish a process to allow requestors and stakeholders to track the status of requests throughout the

various stages of the change management process.2. Categorize change requests in the tracking process (e.g., rejected, approved but not yet initiated,

approved and in process, and closed).3. Implement change status reports with performance metrics to enable management review and monitoring

of both the detailed status of changes and the overall state (e.g., aged analysis of change requests). Ensure that status reports form an audit trail so changes can subsequently be tracked from inception to eventual disposition.

4. Monitor open changes to ensure that all approved changes are closed in a timely fashion, depending on priority.

AI6.5 Change Closure and Documentation1. Ensure that documentation—including operational procedures, configuration information, application

documentation, help screens and training materials—follows the same change management procedure and is considered to be an integral part of the change.

2. Consider an appropriate retention period for change documentation and pre- and post-change system and user documentation.

3. Update business processes for changes in hardware or software to ensure that new or improved functionality is used.

4. Subject documentation to the same level of testing as the actual change.

© 2009 ISACA. All rights reserved. Page 35

Page 36: Change Management Audit/Assurance Program (Jan 2009)vindigni.com/George_and_Honey_Vindignis_Home_Page/…  · Web viewIt also administers the globally respected Certified Information

Change Management Audit/Assurance Program

VIII. Assessment Maturity vs. Target Maturity

© 2009 ISACA. All rights reserved. Page 36