Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

AI2.3 - Application Control and Auditability

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective AI2.3 - Application Control and Auditability is contained within Process Popup Acquire and Maintain Application Software.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

 
This Topic Has:
14 Members
0 Online
4606 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


Application Control and Auditability

Implement business controls, where appropriate, into automated application controls such that processing is accurate, complete, timely, authorised and auditable.

View value and Risk Drivers  help

Hide value and Risk Drivers help


Value Drivers

  • Consistent application controls established
  • Ensured data integrity
  • Transaction data history able to be validated and reconstructed, if needed
  Risk Drivers
  • Costly compensating controls
  • Data integrity issues
  • Gaps between application controls and actual threats and risks
  • Processing results and data repositories failing to meet compliance requirements

View Control Practices  help

Hide Control Practices  help

  1. Define all automated application controls (authorisation, input, processing and output) based on business process control requirements provided in the requirements documentation.
  2. Define how business processes will need to be adjusted to use the automated control functions provided in purchased/packaged application software.
  3. Confirm the design specifications for all automated application controls with IT technical authorities and business process owners, and obtain their approval and sign-off.
  4. Confirm that the design includes automated controls within the application that support general control objectives (such as security, data integrity and audit trails), including access control mechanisms and database integrity controls. Confirm that the design has received sign-off from relevant technical design authorities and approval of the business process owner.
  5. Assess design specifications of automated application and general controls against internal audit, control, and risk management standards and objectives. Consider the effect of compensating controls outside the application software realm.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 245 total

Must be a Topic member to contribute
View All »
Downloads
Posted by FarmService 1564 days ago
Downloads
Posted by ISACA 1574 days ago
Downloads
Posted by FarmService 2649 days ago
Books
Posted by ISACA 185 days ago

Events & Online Learning: 17 total

16 Mar 2015
ISACA International Event
Orlando, FL, USA
15 Jun 2015
ISACA International Event
Ciudad de México, Mexico
1 Aug 2016
ISACA International Event
Chicago, IL, USA

Journal Articles: 500 total

Volume 6, 2015
by Ed Gelbstein, Ph.D.
An auditor will sooner or later be faced with two kinds of conflicts: conflict of interest and interpersonal conflict.
Volume 5, 2107
by Marianne Bradford, Ph.D., and Dave Henderson, Ph.D.
Although generalized audit software (GAS) has been shown to significantly improve the efficiency and effectiveness of audits, many auditors do not use this technology.
Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 4, 2018
by Robert E. Davis, DBA, CISA, CICA
How organizational representatives communicate about technological innovation is often a significant factor in the success or failure of innovation management.
Volume 4, 2018
by Steven J. Ross, CISA, CISSP, MBCP
I submit that changing the definition of work necessitates a corresponding redefinition of security over the information with which we work.

Wikis: 2 total

Blog Posts: 311 total

19 Jul 2018
An die deutschsprachige Community: Der Teletrust hat seine Handreichung zum "Stand der Technik" 2018 aktualisiert und im Vergleich zur Vorgängerversion noch einmal deutlich anwendungsfreundlicher Gestaltet. Gerade für Unternehmen in Deutschland welche ...
Posted By : Thomas797 | 0 comments
Just like CISSP , I think ISACA should  provide an associate member to passing the examination.  Untill you don't gain 5 year practical experience , you cant write CISA.  I still want to add that verifiable experience should not restrict one passer to sho...
Posted By : MUHAMMAD WASEEM RAJA | 0 comments
Various ERP softwares are in use currently to manage the businesses processes of the organization.  SAP, Oracle eBiz suite, Microsoft Dynamics etc. are the main players in this field at present.Many organizations, no matter their size, often fails to cont...
Posted By : SUJITH057 | 0 comments
2 Jul 2018
GDPR https://www.eugdpr.org/
Posted By : Lev Batishchev | 0 comments
17 Jun 2018
We are happy to announce that  on Feb//2018  the ISACA awareness session  was held in Baghdad.This the first time to speak about ISACA Value in Iraq.Professional from government and private sector were excited to hear about ISACA value and they started to...
Posted By : Ali099 | 2 comments
As end users have increased their usage of mobile devices, the number and sophistication of attacks are also increasing.  While I will focus on protecting your smartphones, you should keep in mind that many of the items discussed apply to your iPa...
Posted By : Robert658 | 4 comments