Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Audit Guidelines

Welcome to the Audit Guidelines topic!

Collaborate, contribute, consume and create knowledge around topics such as Audit charter, independence (organisational and professional), engagement planning, Risk Assessment, sampling, reporting and follow-up activities.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
886 Members
1 Online
12589 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 28 total

Must be a Topic member to contribute
View All »
This may have been asked a million times before, but .... any suggestions on resources mapping out the model process for establishing an Internal IT Audit function ? This use case is a start uo financial services sector org, but it's general principles an...
Christopher689 | 7/23/2015 1:56:47 PM | COMMENTS(3)
Hi Everyone, ISACA Ireland are now starting to plan for the 2015 conference and are keen to encourage knowledge center members to submit a speaker proposal for consideration.  I hope no one minds me posting the below details of the call for papers and loo...
Neil_Curran | 6/17/2015 3:42:08 AM | COMMENTS(2)
Hi, can an IT auditor participate in establishing the audit trail policy. Our IT department is working on the design of audit trail and retention rules related to the different database requests (Insert, remove, update, select). What is the role of an IT ...
Hanane989 | 6/11/2015 10:03:07 AM | COMMENTS(1)
Hi,how can one audit an information system that is not on production and of which I don't know if it's ever been?Has anybody an idea where to start from? Thanks
agcolella | 6/8/2015 6:04:40 AM | COMMENTS(5)
I want to know how an IT auditor identifies fake SSL certificates during IT Audit?
Folakemi730 | 5/14/2015 6:03:08 AM | COMMENTS(2)
Group, I need some insight from some seasoned internal (IT) auditors. Although I'm not new to IT or IT security, I am fairly new with IT auditing. I've been tasked with starting to carry out a series of IT audits of some of our critical healthcare EHR sys...
Carl097 | 4/19/2015 3:32:20 PM | COMMENTS(13)

Documents & Publications: 72 total

Must be a Topic member to contribute
View All »
Ways to address and resolve SOD conflicts for SOX compliance are presented in an easily implementable format. - By Bala Kaundinya, Risk Advisory Manager from Ernst & Young
Posted by Bala_Krishnan_CISA_CIPP 51 days ago
Posted by ISACA 136 days ago
Posted by ISACA 138 days ago
Posted by ISACA 174 days ago
Posted by ISACA 209 days ago

Events & Online Learning: 7 total

14 Oct 2013
ISACA International Event
Boston, MA, USA
11 Aug 2014
ISACA International Event
Seattle, WA, USA
17 Aug 2015
ISACA International Event
Phoenix, Arizona, US
2015 GRC Conference - August 17-19, Phoenix, AZ. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 130 total

Volume 4, 2015
by Ed Gelbstein, Ph.D.
Having been audited many times over the years, it would have been of great help if the auditors had taken the time to brief us on what they were going to do, why and how this would be done, and what our role in the process would be.
Volume 4, 2015
by Muhammad Mushfiqur Rahman, CISA, CEH, CHFI, CCNA, ISO 27001 LA, ITIL V3, MCITP, MCP, MCSE, MCTS, OCP, SCSA
Server auditing is an important task to ensure platform-level security in an IT infrastructure and to ensure the proper configuration of Linux server security.
Volume 2, 2015
by Ed Gelbstein, Ph.D.
Everybody wants an audit to be successful. Given that success may mean different things to the parties involved, due attention needs to be given to their criteria.
Volume 1, 2015
by ISACA Member and Certification Holder Compliance
An up-to-date listing of the current IT Audit and Assurance Standards, Guidelines, and Tools and Techniques
Volume 1, 2015
by David Henderson, Steven D. Sheetz and Linda Wallace
The potential of software metrics to increase control of the software development process naturally makes the appropriate use of software metrics a concern for IS auditors.
Volume 6, 2014
by ISACA Member and Certification Holder Compliance
An up-to-date listing of the current IT Audit and Assurance Standards, Guidelines, and Tools and Techniques

Wikis: 2 total

Blog Posts: 2 total

Must be a Topic member to view blog posts
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
13 Nov 2014
Posted By : masarker | 4 comments