top of page

Day 21 (15 Nov 2022)

Writer: Foo Yoong HouFoo Yoong Hou

Since yesterday I have completed to label the document given by client and today I would like to begin the audit work. I opened a blank working paper, the purpose of working paper is to document our evaluation of the design and implementation and the testing of the operating effectivenes of IT general controls. First of all, I fulfilled the IT environment part by briefly describe the introduction of company which including its name, subsidiary, founding year, company structure and etc. The audit can be generally categorized into five main areas which are access to programs and data, program changes, program development, computer operations and lastly IT general controls summary. I started it with the first section, access to programs and data. The objective of it is to determine whether there is adequate controls for access to programs and data have been established to reduce the risk of unauthorized or inappropriate access to the relevant information systems related to financial reporting. The controls involve information security policy, configuration of access rules, access administration, identification and authentication, monitoring of user access and super users. The first document used is all the information system policies given by client, we then noticed that except for one organization wide IT policy, other policies do not have proper review and approval, I remark this on the the audit working to be a deficiency. The following things I am looking at are the user access matrix to check whether the user access is segregated according to its responsibilities or not. Then the forms that company used for the purpose to create, modify and delete user ID, what we need to take note for the form is to check whether it has the proper signature from requestor and superior or not. After that, I moved on to check the screenshot of password policy, the purpose is to check how strong the password it is, we will be looking at the areas of password age, password length, account lockout duration, account lockout threshold. I noticed that one of the area did not comply with our given best practice, I then remarked it as another deficiency. The last two section for first area is related to the monitoring of user access to check whether there is procedure to review the user access right while the last area is on super users, which is to see is there review being conducted to check the super user audit trail.

 

Main things that have learnt


I performed audit for the first area, access to programs and data which including information security awareness, password control, user access right and super user monitoring.

 

Comment/idea/opinion

N/A





 
 
 

Recent Posts

See All

Day 121 (14 Apr 2023)

Today is my last day as an intern, and my focus is on the sales matching test. My senior has asked me to teach the new joiners how to...

Day 120 (13 Apr 2023)

Today I focusing on helping my seniors with their CAATs, which are the purchase and sales match tests. As tomorrow is my last day as an...

Day 119 (12 Apr 2023)

Today, I faced an issue when one of the auditors inquired about the variances stated in the JV test report of our CAATs report. Upon...

Comentarios


THANKS FOR YOUR VISIT

bottom of page