Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

AI2.3 - Application Control and Auditability

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective AI2.3 - Application Control and Auditability is contained within Process Popup Acquire and Maintain Application Software.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

 
This Topic Has:
11 Members
0 Online
4304 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


Application Control and Auditability

Implement business controls, where appropriate, into automated application controls such that processing is accurate, complete, timely, authorised and auditable.

View value and Risk Drivers  help

Hide value and Risk Drivers help


Value Drivers

  • Consistent application controls established
  • Ensured data integrity
  • Transaction data history able to be validated and reconstructed, if needed
  Risk Drivers
  • Costly compensating controls
  • Data integrity issues
  • Gaps between application controls and actual threats and risks
  • Processing results and data repositories failing to meet compliance requirements

View Control Practices  help

Hide Control Practices  help

  1. Define all automated application controls (authorisation, input, processing and output) based on business process control requirements provided in the requirements documentation.
  2. Define how business processes will need to be adjusted to use the automated control functions provided in purchased/packaged application software.
  3. Confirm the design specifications for all automated application controls with IT technical authorities and business process owners, and obtain their approval and sign-off.
  4. Confirm that the design includes automated controls within the application that support general control objectives (such as security, data integrity and audit trails), including access control mechanisms and database integrity controls. Confirm that the design has received sign-off from relevant technical design authorities and approval of the business process owner.
  5. Assess design specifications of automated application and general controls against internal audit, control, and risk management standards and objectives. Consider the effect of compensating controls outside the application software realm.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 260 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 1143 days ago
Downloads
Posted by ISACA 1153 days ago
Downloads
Posted by ISACA 2228 days ago
Books
Posted by ISACA 113 days ago

Events & Online Learning: 27 total

Journal Articles: 500 total

Volume 6, 2015
by Ed Gelbstein, Ph.D.
An auditor will sooner or later be faced with two kinds of conflicts: conflict of interest and interpersonal conflict.
Volume 3, 2107
by Jayakumar Sundaram, CISA, ISO 27001 LA
The SoA is a continuously updated and controlled document that provides an overview of information security implementation.
Volume 6, 2106
by Venkatasubramanian Ramakrishnan, CISM, CRISC, CHFI
Bayesian networks can capture the complex interdependencies among risk factors and can effectively combine data with expert judgment.
Volume 3, 2017
by Indrajit Atluri, CRISC, CISM, CEH, CISSP, CSSLP, HCISPP, ITILv3
The resolve to address IoT device security at various levels—hardware and software, government and enterprise, consumers and services—is widespread.
Volume 3, 2017
by Vasant Raval, DBA, CISA, ACMA, and Rajesh Sharma, Ph.D., ITIL-F, Six Sigma Black Belt
Success does not teach much, if anything; it is the failure that provides lessons to do better in the future.
Volume 3, 2017
by ISACA Member and Certification Holder Compliance
An up-to-date listing of the current IT Audit and Assurance Standards, Guidelines, and Tools and Techniques

Wikis: 2 total

Blog Posts: 257 total

Seguro que todos hemos oído en los últimos meses noticiassobre ataques cibernéticos y el impacto que los mismos han tenido en diferentesindustrias y empresas. El último de ellos denominado “WannaCry” ha sidoconsiderado como uno de los mayores ataques info...
Posted By : Rene372 | 0 comments
Have you ever taken a moment to think about what you would do should yourmobile phone become lost or stolen? What if your Personal Identifiable Information(PII) or Sensitive Personal Information (SPI) were sold and used along with yourmobile number? Would...
Posted By : Robert658 | 1 comments
Background At early 2017, Govtech released an article which summarized the top cybersecurity prediction for 2017 from several organizations and companies. If we look back at 2016, cybersecurity attacks are evolved along with the rise of cloud computin...
Posted By : proferyk | 0 comments
Lately I have received a number of questions and concerns around NIST 800-171 so I wanted to write a quick brief on what you need to know.What is NIST 800-171?This is a special publication released by the National Institute of Standards and Technology (NI...
Posted By : Justin238 | 1 comments
The Regulation (EU) N°910/2014 on electronic identification and trust services for electronic transactions in the internal market (eIDAS Regulation) was adopted by the European Union on 23 July 2014 and entered into force on 17.09.2014.The rules on trust ...
Posted By : Julian075 | 0 comments
Ransomware is a form of malware and is engineered to infect your personal computer and restrict access in some way, while demanding payment or ransom  to remove the restriction. First identified in 1989  under the name of PC Cyborg, today there are over 2...
Posted By : Robert658 | 1 comments