Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Application Controls

Welcome to the Application Controls topic!

Collaborate, contribute, consume and create knowledge around the design, implementation, and testing of application controls used within or between various IT systems.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
492 Members
0 Online
9242 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 22 total

Must be a Topic member to contribute
View All »
Almost every time I try to log in MyISACA web site, on first attempt I receive this error: "There was an error trying to authenticate the user." Second attempt is always successful (same username and password both times). Browser is Mozilla Firefox....
Dragan Pleskonjic | 11/9/2017 4:25:12 PM | COMMENTS(0)
Hi!Could anyone send me the App Control document? the page is not available. I would really apreciate that
Itzell720 | 10/9/2017 12:23:24 PM | COMMENTS(1)
Dear all, In the context of the Global Data Protection Regulation, to initiate the inventory phase does someone have ideas/suggestions on which application controls should be important (primary) to assess?  I had a refresh in the following management guid...
LJA-BE | 6/14/2017 5:10:53 PM | COMMENTS(0)
Good day Does anyone have an audit program for standard application controls that one can amend to suite the application under review? I was only able to find procedures from COBIT 4.1 and am hoping for an updated checklist of some sorts. Any tips on audi...
Sonja078 | 4/3/2017 9:42:42 AM | COMMENTS(3)
The topic area here is application controls, and I wanted to throw out some examples of what can be considered an application control.  Here's a partial list, noting that each application can easily have unique controls that won't be included here.  If ...
Richard Fowler | 4/1/2017 1:15:41 PM | COMMENTS(16)
In case anyone has not seen the SANS CIS Critical Security Controls poster and related information, I just wanted to share this resource: https://www.sans.org/critical-security-controls/controls. Enjoy!
Angela712 | 12/7/2015 10:56:20 AM | COMMENTS(0)

Documents & Publications: 6 total

Must be a Topic member to contribute
A very good overview published in ISACA's Journal back in 2002, and still relevent today.
Posted by Richard Fowler 2223 days ago
Books
Implement a systematic approach to security in mobile application development with help from this practical guide that also features case studies, code examples and best practices.
Posted by ISACA 2357 days ago
The IIA has a series of documents called Global Technology Audit Guides ("GTAG"). Although ISACA and the IIA are related organizations, some documents are still for members only. I hope I can still share this overview, however.
Posted by Richard Fowler 2482 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 8 total

Volume 5, 2015
by Jason Woods, William Brown, Harry Howe | Reviewed by A. Krista Kivisild, CISA, CA, CPA
How can security professionals evaluate the magnitude of risk and communicate it appropriately to businesses so that they can factor this into their decision making?
Volume 3, 2015
by Andrew Evers
Cloud services deliver many kinds of automation to companies every day. The use of process automation as a cloud-based service is an important next step for IT innovation
Volume 5, 2014
by Biswajit Mohapatra, Vinay Parisa and Joydipto Banerjee
The convergence of social, mobile, analytics and cloud (SMAC) has created a significant change in the value that enterprise applications can provide to business.
Volume 3, 2013
by Dan Bogdanov, Ph.D., and Aivo Kalu, Ph.D., CISA
A cloud is a remote-access platform; thus, technical controls that remotely enforce a particular security policy are especially efficient.
Volume 3, 2013
by Tommie Singleton, CISA, CGEIT, CPA
Every time an IT auditor engages in an IT audit/assurance project, at least one person reviews the work.
Volume 1, 2013
by Pascal A. Bizarro, Ph.D., CISA, Andy Garcia, Ph.D., CPA and Jacob Nix
Risk exists with the implementation of personal mobile devices in business, but with risk comes reward.

Wikis: 2 total

Blog Posts: 8 total

Let us have positive inspirational slogans for every situation. Last week I started the project meeting like this: I don't know you are all so good at tuning the website. The performance is now is wonderful. I could witness reduction of stress, anxiety an...
Posted By : Jayakumar Sundaram | 1 comments
The perception of time passing is a funny thing. It only seems like yesterday that I was still a child and the summer holiday seemed to last a lifetime. And now, here I am somewhat surprised that my complement of fingers and toes are no longer enough to c...
Posted By : martin.oneal | 0 comments
A recent publication in a local newspaper, indicated that an employee was charged with fraud with regards to claims of insurance payments that were lodged with the company were paid out to people who were not entitled to receive such payments. What potent...
Posted By : Paulina.PNI | 2 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments
Typically application access to a SQL Server database is via one of two methods.  Either all users access the same database using a single (proxy) user which is defined in an initialisation (.INI) file, registry etc. Or the users access the database ...
Posted By : Ian Cooke | 2 comments
Security is one of the major concerns which hold enterprises from embracing the cloud. But some think that this is manageable and as such have started adopting cloud based SaaS applications. Cloud based Enterprise solutions like Sales Force, Service Now, ...
Posted By : Kannan | 0 comments