Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

AI2.3 - Application Control and Auditability

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective AI2.3 - Application Control and Auditability is contained within Process Popup Acquire and Maintain Application Software.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

 
This Topic Has:
12 Members
0 Online
4394 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


Application Control and Auditability

Implement business controls, where appropriate, into automated application controls such that processing is accurate, complete, timely, authorised and auditable.

View value and Risk Drivers  help

Hide value and Risk Drivers help


Value Drivers

  • Consistent application controls established
  • Ensured data integrity
  • Transaction data history able to be validated and reconstructed, if needed
  Risk Drivers
  • Costly compensating controls
  • Data integrity issues
  • Gaps between application controls and actual threats and risks
  • Processing results and data repositories failing to meet compliance requirements

View Control Practices  help

Hide Control Practices  help

  1. Define all automated application controls (authorisation, input, processing and output) based on business process control requirements provided in the requirements documentation.
  2. Define how business processes will need to be adjusted to use the automated control functions provided in purchased/packaged application software.
  3. Confirm the design specifications for all automated application controls with IT technical authorities and business process owners, and obtain their approval and sign-off.
  4. Confirm that the design includes automated controls within the application that support general control objectives (such as security, data integrity and audit trails), including access control mechanisms and database integrity controls. Confirm that the design has received sign-off from relevant technical design authorities and approval of the business process owner.
  5. Assess design specifications of automated application and general controls against internal audit, control, and risk management standards and objectives. Consider the effect of compensating controls outside the application software realm.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 255 total

Must be a Topic member to contribute
View All »
Downloads
Posted by FarmService 1262 days ago
Downloads
Posted by ISACA 1272 days ago
Downloads
Posted by FarmService 2347 days ago
Books
Posted by ISACA 74 days ago

Events & Online Learning: 32 total

Journal Articles: 500 total

Volume 6, 2015
by Ed Gelbstein, Ph.D.
An auditor will sooner or later be faced with two kinds of conflicts: conflict of interest and interpersonal conflict.
Volume 5, 2107
by Marianne Bradford, Ph.D., and Dave Henderson, Ph.D.
Although generalized audit software (GAS) has been shown to significantly improve the efficiency and effectiveness of audits, many auditors do not use this technology.
Volume 5, 2107
by Adeniyi Akanni, Ph. D., CISA, CRISC, ISO 27001 LA, ITIL
Using mobile devices to complete commercial transactions is a newer scientific advancement in the information and communication technology (ICT) sphere.
Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 5, 2017
by Steven J. Ross, CISA, CISSP, MBCP
This is the dawn of the multi-modal era; data center staff must adjust or be left behind. And so must security professionals.

Wikis: 2 total

Blog Posts: 267 total

With the advancement of technology, many people are engaged on Internet to perform their day to day online activities. One out ofthree people are now planning to conduct and promote their business throughonline, so it has become as a fastest way of commun...
Posted By : Chiranjibi492 | 0 comments
In todays emerging technology the protection of Information is critical. Protection of information means not only the confidential data that the business is stand on but each user who use, modify and share within is keenly important. The definition of con...
Posted By : SHAMU2015 | 0 comments
Equifax data breach impacts 143 million consumers in the US.  Compromising names, addresses, DOB, SSN, and even driver's license numbers.  Go to the link provided below for official information on how to check to see if you've been impacted and to enroll ...
Posted By : James948 | 0 comments
ProposalI will come straight to the point, every country is now connected to the Internet Of The Thing available to public to access to their personal data, order stuffs, book tickets, book hotel, open bank account, view personal account and play around o...
Posted By : SHAMU2015 | 0 comments
24 Aug 2017
The Mobile Maritime Hub 2009-2050 is an strategic plan that started in 2009, in Vilanova i La Geltrú, a coastal town, to promote maritime, nautical, fishing and scientific activities in a seaside region, by a properly use of the technological tools exist...
Posted By : ramoncod | 0 comments
Few days ago the person behind the Hacking Team hack revealed how he did it in pastebin - (the original in Spanish) https://pastebin.com/raw/GPSHF04A I was very keen to understand how good you need to be to hack back one of the most (in)famous hacki...
Posted By : TiagoRosado | 0 comments