AUDCIS - 2022 - Mod5 - Tools and Techniques in IT Audit
AUDCIS - 2022 - Mod5 - Tools and Techniques in IT Audit
Techniques
Used in
Auditing IT
AUDCIS Module 5
Learning Objectives
1 2 3 4 5 6
Define auditor Describe techniques Explain what Describe the various Differentiate between Describe computer
productivity tools and used to document Computer-Assisted CAATs used for “Auditing Around the forensics and sources
describe how they application systems, Audit Techniques reviewing applications, Computer” and to evaluate computer
assist the audit such as flowcharting, (CAATs) are and particularly, the audit “Auditing Through the forensic tools and
process. and how these describe the role they command language Computer.” techniques.
techniques are play in the (ACL) audit software.
developed to assist the performance of audit
audit process. work.
Tools and techniques used in IT audits
Audit productivity tools—software that helps auditors reduce the amount of time spent on
administrative tasks by automating the audit function and integrating information gathered as
part of the audit process.
• Sources and source document(s), by title and identification number, with copies of the forms attached
• Point of origin for each source document
• Each operating unit or office through which data are processed
• Destination of each copy of the source document(s)
• Actions taken by each unit or office in which the data are processed (e.g., prepared, recorded, posted,
filed, etc.)
• Controls over the transfer of source documents between units or offices to assure that no documents are
lost, added, or changed (e.g., verifications, approvals, record counts, control totals, arithmetic totals of
important data, etc.)
• Recipients of computer outputs
Defining Data Elements
• The audit staff should determine how effective data processing is by identifying
problem areas, such as the ones below, in the processing cycle:
• Redundant processing of data or other forms of duplication
• Bottleneck points that delay or congest processing
• Points in the operating cycle at which clerks do not have enough time to review output
reports and make corrections
Evaluating the Accuracy, Completeness, and
Usefulness of Reports
• The audit staff should review key or major outputs (e.g., edit listings, error
listings, control of hour listings, etc.) of the financial application system and
determine if the outputs are accurate, complete, and useful as intended.
• The auditor should confirm the accuracy, completeness, and usefulness of the
generated reports by interviewing appropriate users.
Computer-Assisted Audit Techniques
(CAATs)
• Review applications to gain an understanding of the controls in place to ensure the accuracy
and completeness of the information generated.
• When adequate application controls are identified, the IT auditor performs tests to verify their
design and effectiveness.
• When controls are not adequate, IT auditors perform extensive testing to verify the integrity of
the data. To perform tests of applications and data, the auditor may use CAATs.
Common CAATs
• The auditor can use the computer to select items of interest, such as material
items, unusual items, or statistical samples of items by, for instance, stipulating
specific criteria for the selection of sample items, or by stating relative criteria
and let the computer do the selection.
Audit Mathematics
• Some of the key controls that minimize the risks in spreadsheet development and use include:
• Understanding the requirements before building the spreadsheet
• Source of data. Assurances that data being used are valid, reliable, and can be authenticated to originating
source
• Design review. Reviews performed by peers or system professionals.
• Formulas, macro commands, and any changes to the spreadsheet should be documented externally and
within the spreadsheet
• Verification of logic. Reasonableness checks and comparisons with known outputs
• Extent of training. Formal training in spreadsheet design, testing, and implementation
• Extent of audit. Informal design reviews or formal audit procedures
• Support commitment. Ongoing application maintenance and support from IT personnel
CAATs for Auditing Application Controls
Database Controls
• Controls that auditors commonly expect to identify (and ultimately assess) within
client or organization-prepared databases include:
• Referential integrity. Prevent deleting key values from related tables
• Transaction integrity. Restore value of unsuccessful transactions
• Entity integrity. Create unique record identification
• Value constraints. Limit values to a selected range
• Concurrent update protection. Prevent data contention
• Backup and recovery protection. Ability to back up critical information and applications and
restore to continue
• Testing protection. Perform tests at the systems, application, and unit level
CAATs for Operational Reviews
• Integrated test facilities are built-in test environments within a system. This
approach is used primarily with large-scale, online systems serving multiple
locations within the company or organization. The test facility is composed of a
fictitious company or branch, set up in the application and file structure to
accept or process test transactions as though it was an actual operating entity.
Throughout the financial period, auditors can submit transactions to test the
system.
Test Data
• Parallel simulation involves the separate maintenance of two presumably identical sets of
programs. The original set of programs is the production copy used in the application under
examination. The second set could be a copy secured by auditors at the same time that the
original version was placed into production. As changes or modifications are made to the
production programs, the auditors make the same updates to their copies. If no unauthorized
alteration has taken place, using the same inputs, comparing the results from each set of
programs should yield the same results. Another way is for the auditor to develop pseudocode
using higher-level languages (Vbasic, SQL, JAVA, etc.) from the base documentation following
the process logic and requirements. For audit purposes, both software applications (test versus
actual) would utilize same inputs and generate independent results that can be compared to
validate the internal processing steps.
Embedded Audit Module