IT General Controls Assessment Report
IT General Controls Assessment Report
REPORT
1 Source: www.knowledgeleader.com
Table of Contents
EXECUTIVE SUMMARY.......................................................................................................................................... 3
Background........................................................................................................................................................... 3
Audit Objectives.................................................................................................................................................... 3
Scope of Work....................................................................................................................................................... 3
Significant Findings/Conclusion............................................................................................................................. 3
Capability Maturity Model*..................................................................................................................................... 3
RATING SCALE....................................................................................................................................................... 4
OBSERVATIONS SUMMARY.................................................................................................................................. 5
DETAILED REPORT OBSERVATIONS................................................................................................................... 6
REPORT DISTRIBUTION LIST.............................................................................................................................. 12
Report Addressed To.......................................................................................................................................... 12
Report Copies To................................................................................................................................................ 13
APPENDIX A: PROCESS IMPROVEMENTS......................................................................................................... 14
2 Source: www.knowledgeleader.com
EXECUTIVE SUMMARY
Background
Founded in (Insert Year) by (Insert Name), (Insert Location)-based Company A has become one of the leaders
and innovators in direct sales and marketing. Company A provides home cookware systems, air purification and
water filtration systems, vacuum cleaning systems, juice extraction systems, dinnerware, cutlery and other related
household products designed to enhance the lifestyle of consumers. Products are delivered through a network of
independent distributors and salespeople with Company A facilitating sales through a dedicated consumer
financing program that provides credit to the company’s customers. With primary markets in the (Insert Location)
and (Insert Location), Company A has achieved significant growth and has recently expanded into the markets of
(Insert Location) and (Insert Location).
In (Insert Year), the (Insert Location) department of financial services issued a report regarding concerns related
to consumer lending operations. In response to the report, Company A has committed to strengthening its
operating environment and compliance functions. Further, Company A has dedicated resources to implementing a
robust internal audit function, developing comprehensive policies and procedures, and enhancing its control
environment.
Audit Objectives
Internal audit performed an assessment of the current information technology general control (ITGC) framework at
Company A. The objectives of the engagement were to:
• Obtain an understanding of specific IT processes and controls.
• Assist in developing the process flows, narratives and control matrices and gaining verifications from process
owners.
• Recommend internal control environment improvements, where applicable.
Scope of Work
The scope of the assessment included the logical access, operations management, change management, and
system development lifecycle (SDLC) control areas for the System B and System C applications, as well as
supporting infrastructure.
Significant Findings/Conclusion
Based on the scope of this review and current ITGCs, this audit resulted in an unsatisfactory audit rating. We
identified one critical and several major issues.
Detailed explanations of the observations and action plans are included in the Detailed Report Observations
section of this report.
Company A’s current ITGC environment shows elements of the initial maturity stage as formalized procedures
and policies are not in place companywide, monitoring of activity is lacking, and formal controls are not in place
for several control areas. The ITGC processes also show elements of the repeatable maturity stage as some
processes are established and being followed despite the lack of documentation noted above.
3 Source: www.knowledgeleader.com
Capability Level Capability Description
Continuous Improvement
Optimizing
Controls are continuously improved enterprisewide.
Quantitative
Managed Risks are managed quantitatively enterprisewide;
“Chain of accountability”.
Capabil Qualitative/Quantitative
Defined ityPolicies, processes and standards are defined and institutionalized –
Maturit “Chain of certification”.
y
Intuitive
Repeatable Processes are established and repeating. Reliance on
people continues, and controls documentation is lacking.
AD HOC/CHAOTIC
Initial Control is not a priority. An unstable environment leads to
dependency on heroics.
4 Source: www.knowledgeleader.com
RATING SCALE
Although audit observations were noted and require attention by management, controls
Satisfactory and processes are reasonably designed and operating. Action plans will be tracked
and reported during the standard reporting timelines.
Observation Ratings
Significance Description
This rating represents a significant risk to the business, either in financial reporting
error/exposure, or materially significant risk in financial reporting, compliance, fraud or
Critical
reputation. This includes financial reporting errors or exposures greater than 5% of
annual earnings before interest, taxes, depreciation and amortization (EBITDA).
This rating represents a significant risk to the business or achievement of one or more
business objectives or has an impact on corporate reputation of Company A values. If
quantifiable, this rating represents an error/exposure greater than 2% of annual EBITDA.
Major This rating warrants executive management attention.
Examples include major accounts have not been reconciled in more than six months;
inconsistent measurement of key operating or financial metrics or policies.
This rating represents an elevated risk to the business or has an impact on achieving
business objectives. If quantifiable, this rating represents an error/exposure equal to or
Moderate less than 2% of annual EBITDA. This rating warrants executive management attention.
Examples include monthly reconciliations being performed, but reconciling items not
being addressed in a timely manner.
This rating represents some risk to the business and may improve internal control
Minor business or efficiency. This rating warrants functional or control owner attention. It cannot
have resulted in a financial reporting error.
5 Source: www.knowledgeleader.com
6 Source: www.knowledgeleader.com
7 Source: www.knowledgeleader.com
8 Source: www.knowledgeleader.com
9 Source: www.knowledgeleader.com
10 Source: www.knowledgeleader.com
11 Source: www.knowledgeleader.com
12 Source: www.knowledgeleader.com
13 Source: www.knowledgeleader.com
14 Source: www.knowledgeleader.com
15 Source: www.knowledgeleader.com
16 Source: www.knowledgeleader.com
17 Source: www.knowledgeleader.com
18 Source: www.knowledgeleader.com
19 Source: www.knowledgeleader.com
20 Source: www.knowledgeleader.com
OBSERVATIONS SUMMARY
Post-implementation reviews
E. SDLC X Minor
are lacking.
21 Source: www.knowledgeleader.com
DETAILED REPORT OBSERVATIONS
Agreed-Upon
Observations
Action Plans
22 Source: www.knowledgeleader.com
Agreed-Upon
Observations
Action Plans
Company A utilizes the third-party provider, Company B and the hosting Action Plan –
services for the System B and System C applications are collocated in the
Action Plan
Minor same data center. The System B database is stored on the SQL01-USHYC
Owner –
server and the System C database is stored on the SQL02-USHYC server.
Both SQL02-USHYC and SQL01-USHYC servers are hosted by Company Target Date –
B, located in a (Insert Location)-based data center. Company B issues a
SSAE 16/SOC 1 report. To-date, Company A has not obtained or reviewed
Company B’s SOC 1 report to identify any control issues which may impact
Company A’s IT security and data center operations. There may be issues
identified within Company B’s SOC 1 report which could necessitate
Company A developing designing and implementing compensating controls
to mitigate identified risks or issues or impact Company A’s ongoing reliance
on Company B for hosting services.
Gap Reference(s):
IT.MO.03
Recommendation(s):
Internal audit suggests that management obtain and review the SSAE 16
(SOC 1) results for all key IT third-party providers annually to confirm the
adequacy of the service provider's control environment. As part of this
process, management should determine whether all relevant user control
considerations are designed and operating effectively. Evidence of this
review should be documented and retained.
For smaller third-party providers that don’t issue a SSAE 16 (SOC 1) report,
internal audit suggest that Company A management meets with
management of the IT third-party provider to understand what kind of
controls they have in place. Company A management should determine if
they feel comfortable with the controls in place at the IT third-party providers
and document their findings.
Internal audit also recommends that this process be incorporated into the
broader vendor/third party management efforts and policies.
B. Logical Access
23 Source: www.knowledgeleader.com
Agreed-Upon
Observations
Action Plans
Recommendation(s):
internal audit suggests that management systematically enforce password
expiration for all active directory user accounts to ensure that passwords are
changed every 90 days.
24 Source: www.knowledgeleader.com
Agreed-Upon
Observations
Action Plans
C. Manage Operations
25 Source: www.knowledgeleader.com
Agreed-Upon
Observations
Action Plans
26 Source: www.knowledgeleader.com
Agreed-Upon
Observations
Action Plans
D. Change Management
27 Source: www.knowledgeleader.com
Agreed-Upon
Observations
Action Plans
management process, which could impact the data integrity, reliability and
availability of critical data and in scope systems.
Gap Reference(s):
IT.CM.05, IT.CM.06, IT.CM.07
Recommendation(s):
Internal audit suggests that management implement segregation of duties
between access to develop and migrate changes for the System B and
System C applications. In order to mitigate the risk of inappropriate and/or
not adequately tested changes being developed and migrated to production,
management should also implement a monitoring control to review migrated
changes for appropriateness. Access to custom application code should be
reviewed and restricted to only those users that require access for their job
responsibilities. All other uses should have their access removed.
E. SDLC
For each finding, internal audit will identify a custodian and target date to facilitate resolution. It is management’s
responsibility to ensure that all action plans are carried out and all findings are adequately addressed.
Management will provide internal audit with a status update on or before the target date and be prepared to
support satisfaction of the action steps upon their completion.
28 Source: www.knowledgeleader.com
REPORT DISTRIBUTION LIST
Report Addressed To
(Insert Name), IT/Operations and Infrastructure Manager
Report Copies To
(Insert Name), General Counsel and Chief Compliance Officer
29 Source: www.knowledgeleader.com
APPENDIX A: PROCESS IMPROVEMENTS
Logical Access
PI.LA.01 Profiles for Active Directory, System B and System C are mirrored based on existing users, which
may result in users inadvertently being assigned excessive access. Access requests should specify
which roles are requested.
PI. LA.03 When access is removed due to a termination or a transfer, the help desk should document which
access has been removed within the help desk ticket.
Manage Operations
PI.MO.01 Documentation related to the root cause and resolution of backup/job failures should be retained.
PI.MO.02 A formal process to test backup media on an annual basis should be implemented. Backup
restores are currently performed on an as-needed basis.
30 Source: www.knowledgeleader.com