Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

PO8.6 - Quality Measurement, Monitoring and Review

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective PO8.6 - Quality Measurement, Monitoring and Review is contained within Process Popup Manage Quality.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

This Topic Has:
5 Members
0 Online
4086 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

Quality Measurement, Monitoring and Review

Define, plan and implement measurements to monitor continuing compliance to the QMS, as well as the value the QMS provides. Measurement, monitoring and recording of information should be used by the process owner to take appropriate corrective and preventive actions.

View value and Risk Drivers  help

Hide value and Risk Drivers help

Value Drivers

  • Staff members aware of quality performance
  • Consistent reporting
  • Quality reporting integrated into and facilitating the organisation’s QMS
  • Measurable and tangible value of the QMS
  • Feedback concerning compliance with and usefulness of the QMS
  Risk Drivers
  • Lack of clear and consistent quality objectives
  • Preventive and corrective actions unidentified
  • Inconsistent quality reporting
  • Reports failing to contribute to the enterprise’s QMS
  • Lack of clarified objectives
  • Inconsistent quality reporting
  • Failure of the QMS to enhance the organisation’s objectives
  • QMS not taken seriously or complied with by the organisation
  • Weaknesses and strengths within the QMS not recognised
  • Non-compliance not identified
  • Projects at risk to be over time and budget and delivered with poor quality

View Control Practices  help

Hide Control Practices  help

  1. Define and maintain quantifiable, goal-driven quality metrics (or measurements) aligned to overall quality objectives covering the quality of individual projects and services.
  2. Ensure that management and process owners regularly review QMS performance against defined quality metrics.
  3. Analyse overall quality performance results to determine:
    • The extent of compliance with the QMS
    • Trends indicating quality strengths and weaknesses
    • The effectiveness of the QMS in identifying quality problems
    • Efficiency in timely identification of faults
    • Management commitment to ongoing QMS performance and improvement

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 87 total

Must be a Topic member to contribute
View All »
Posted by FarmService 1410 days ago
Posted by ISACA 1420 days ago
Posted by FarmService 2495 days ago
Posted by ISACA 499 days ago
Posted by ISACA 713 days ago

Events & Online Learning: 17 total

Journal Articles: 250 total

Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 1, 2018
by Steven J. Ross, CISA, CISSP, MBCP
Managing availability in a multi-modal environment requires a great deal of attention to details, which are being defined by the multi-modal pioneers of our day.
Volume 1, 2018
by Aditya K. Sood, Ph.D., and Rehan Jalil
With the robust requirements listed by upcoming regulations, such as GDPR, the importance of a cloud app security solution cannot be ignored.
Volume 1, 2018
by Adeniyi Akanni, Ph. D., CISA, CRISC, ITIL
This article describes a six-stage cycle of implementing big data in commercial banks, points out the major challenges in implementation and provides a suggested solution.
Volume 1, 2018
by Sandy Fadale, CRISC, CISM, CGEIT
Get to know your network.

Wikis: 2 total

Blog Posts: 169 total

My personal thoughts after listening to C-level executives at the CxO Roundtable Series sponsored by Intel, IBM, HyTrust & ReedSmith. For an invite, please reach out to me. Data Protection under the GDPR For past few months, I’ve been helping to org...
Posted By : Thomas152 | 0 comments
There are some math models for business that MBAs are taught. Just like assembling burgers for fast food or call wait queue management in a call center, vulnerability patching is a time based business opportunity. Leadership can be expected to use this ...
Posted By : Don Turnblade | 0 comments
I predict that on 1 July 2018, I will be calmly eating a barbecue sandwich, talking with friends and possibly, I will burn a copy of the RFC2246: TLS version 1.0 standard for entertainment value.  Those will less effective Vendor, Network, Systems, Applic...
Posted By : Don Turnblade | 0 comments
Posted By : TafadzwaPadare | 1 comments
2 Feb 2018
We are happy to announce that  on Feb//2018  the ISACA awareness session  was held in Baghdad.This the first time to speak about ISACA Value in Iraq.Professional from government and private sector were excited to hear about ISACA value and they started to...
Posted By : Ali099 | 0 comments
Greetings, is there any member currently studying for their CISA examination so that we can join hands and work together?
Posted By : TafadzwaPadare | 0 comments