Return to Home PageISACA Logo at top of page
  • Credentialing
  • Membership
  • Enterprise
  • PARTNERSHIPS
  • Training & Events
  • Resources
  • Join
    • PROFESSIONAL JOIN
    • RECENT GRAD JOIN
    • STUDENT JOIN
  • About Us
    • ABOUT US HOME
    • WHO WE ARE
    • NEWSROOM
    • PARTICIPATE & VOLUNTEER
    • LEADERSHIP & GOVERNANCE
    • ADVOCACY
    • ISACA FOUNDATION
    • CONTACT US
    • CODE OF PROFESSIONAL ETHICS
  • CAREERS
    • Career Journey
    • Career Center
    • Careers at ISACA
  • SUPPORT
  • Store
    Total
    View Cart Checkout

    No items have been added to your cart yet

    Browse Search
  • Cart (0)
  • Sign In
  • MEMBERSHIP
  • CERTIFICATIONS
  • CERTIFICATES
  • CPE CERTIFICATES
  • Engage
  • LEARNING ACCESS
  • RESOURCES
  • ORDER HISTORY
  • Redeemable Products
  • Sign Out
  • Sign In
  • Create an Account
  • CERTIFICATIONS
    • CISA—Certified Information Systems Auditor
    • CISM—Certified Information Security Manager
    • CRISC—Certified in Risk and Information Systems Control
    • CDPSE—Certified Data Privacy Solutions Engineer
    • CCOA—Certified Cybersecurity Operations Analyst
    • AAIA—Advanced in AI Audit
    • AAISM—Advanced in AI Security Management
    • CGEIT—Certified in the Governance of Enterprise IT
    • CET—Certified in Emerging Technology Certification
    • ITCA—Information Technology Certified Associate
    • CSX-P—CSX Cybersecurity Practitioner Certification
  • CERTIFICATES
    • CCAK—Certificate in Cloud Auditing Knowledge
    • COBIT
      • COBIT 2019 Foundation
      • COBIT 2019 Design & Implementation
      • Implementing the NIST Cybersecurity Framework using COBIT 2019
      • COBIT 5 Certificates
    • Cybersecurity Audit
    • Cybersecurity Fundamentals
    • Digital Trust Ecosystem Framework Foundation Certificate
    • Emerging Technology
      • AI Fundamentals
      • Blockchain Fundamentals
      • Cloud Fundamentals
      • IoT Fundamentals
    • Information Technology
      • Computing Fundamentals
      • Data Science Fundamentals
      • Networks and Infrastructure Fundamentals
      • Software Development Fundamentals
    • IT Audit Fundamentals
    • IT Risk Fundamentals
  • WHICH CERTIFICATION IS RIGHT FOR YOU?
  • VERIFY A CERTIFICATION
  • DIGITAL BADGES
  • RENEW OR MAINTAIN A CERTIFICATION
  • Career Journey
  • Which Exam Prep is Right for You?
  • TRAIN YOUR WAY WITH OFFICIAL ISACA EXAM PREP
  • BUILD YOUR TEAM'S PERFORMANCE WITH CUSTOMIZED TRAINING
  • BECOME A MEMBER
    • Browse Chapters
    • Find Your Membership Type
    • Member Benefits
  • ENGAGE ONLINE COMMUNITY
  • GET INVOLVED
    • Advocacy
    • Author an Article
    • Chapter Events Calendar
    • ISACA Awards
    • SheLeadsTech
    • Speak at Conferences
    • Volunteer
  • MAXIMIZE YOUR MEMBERSHIP
    • Career Center
    • Discounts & Savings
    • Free CPE
    • Free Resource Previews
    • Member-Exclusive Leadership Series
    • Mentorship
  • Personalize Your Experience
  • UPDATE YOUR PROFILE
  • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
    • CMMI Performance Solutions
    • CMMI Cybermaturity Platform
    • Voluntary Improvement Program
  • TEAM TRAINING
    • Skills & Credentials
    • CMMI Training
  • CMMI APPRAISALS (PARS)
  • ENTERPRISE SUPPORT
  • CONTACT US
  • Empower Your Team to Power Business Growth
  • CUSTOMIZE YOUR IT TEAM TRAINING
  • BECOME A TRAINING PARTNER
  • BECOME A CMMI PARTNER
  • BECOME AN ACADEMIC OR WORKFORCE PARTNER
  • Sponsorship
    • Become a Sponsor
    • Global Sponsors
  • FIND A TRAINING PARTNER
    • Certification Training Partners
      • Certification Training Partners
      • Americas
      • Asia and Oceania
      • China
      • EMEA
    • COBIT Training Partners
    • Academic & Workforce Partners
    • CMMI Performance Improvement Partners
  • Over 100,000 People Were Trained by ISACA in 2022
  • BECOME A PARTNER TO CAPITALIZE ON THIS HIGH DEMAND
  • CONFERENCES
    • GRC Conference
    • ISACA Europe Conference
    • ISACA North America Conference
    • ISACA Virtual Conference
    • Student Summit
    • Call for Speakers
  • CHAPTER EVENTS
  • Training Week
  • Virtual Workshops
  • TRAINING BY TYPE
    • Online Review Courses
    • Session Recordings
    • Webinars
    • Virtual Summits
  • GROUP/ENTERPRISE TRAINING
  • TRAINING FROM AN ACCREDITED PARTNER
  • TRAINING BY TOPIC
    • All Training Topics
    • Artificial Intelligence
    • Cybersecurity
    • IT Audit
    • Certification Exam Preparation
    • COBIT
  • On-Demand CPE Training
  • September Featured Training:
  • 15% OFF THE CCOA ONLINE COURSE
  • DIGITAL TRUST
  • ISACA JOURNAL
  • INSIGHTS & EXPERTISE
  • NEWS & TRENDS
  • ENGAGE ONLINE COMMUNITIES
  • COBIT
  • RESOURCES BY TOPIC
    • Artificial Intelligence
    • Cybersecurity
    • Emerging Technology
    • Governance
    • IT Audit
    • IT Risk
    • Privacy
  • FRAMEWORKS, STANDARDS AND MODELS
  • ISACA NOW BLOG
  • ISACA VIDEOS
  • ISACA PODCAST
  • GLOSSARY
  • Announcing ISACA’s Digital Trust Ecosystem Framework and Portfolio
  • Advance Digital Trust
  • Credentialing
    • CREDENTIALING
    • CERTIFICATES
      • CERTIFICATES
      • CCAK—Certificate in Cloud Auditing Knowledge
      • COBIT
        • COBIT 2019 Foundation
        • COBIT 2019 Design & Implementation
        • Implementing the NIST Cybersecurity Framework using COBIT 2019
        • COBIT 5 Certificates
      • Cybersecurity Audit
      • Cybersecurity Fundamentals
      • Digital Trust Ecosystem Framework Foundation Certificate
      • Emerging Technology
        • AI Fundamentals
        • Blockchain Fundamentals
        • Cloud Fundamentals
        • IoT Fundamentals
      • Information Technology
        • Computing Fundamentals
        • Data Science Fundamentals
        • Networks and Infrastructure Fundamentals
        • Software Development Fundamentals
      • IT Audit Fundamentals
      • IT Risk Fundamentals
    • WHICH CERTIFICATION IS RIGHT FOR YOU?
    • VERIFY A CERTIFICATION
    • CERTIFICATIONS
      • CERTIFICATIONS
      • CISA—Certified Information Systems Auditor
      • CISM—Certified Information Security Manager
      • CRISC—Certified in Risk and Information Systems Control
      • CDPSE—Certified Data Privacy Solutions Engineer
      • CCOA—Certified Cybersecurity Operations Analyst
      • AAIA—Advanced in AI Audit
      • AAISM—Advanced in AI Security Management
      • CGEIT—Certified in the Governance of Enterprise IT
      • CET—Certified in Emerging Technology Certification
      • ITCA—Information Technology Certified Associate
      • CSX-P—CSX Cybersecurity Practitioner Certification
    • DIGITAL BADGES
    • TRAIN YOUR WAY WITH OFFICIAL ISACA EXAM PREP
    • BUILD YOUR TEAM'S PERFORMANCE WITH CUSTOMIZED TRAINING
    • RENEW OR MAINTAIN A CERTIFICATION
    • Career Journey
  • Membership
    • MEMBERSHIP
    • BECOME A MEMBER
      • BECOME A MEMBER
      • Browse Chapters
      • Find Your Membership Type
      • Member Benefits
    • ENGAGE ONLINE COMMUNITY
    • MAXIMIZE YOUR MEMBERSHIP
      • MAXIMIZE YOUR MEMBERSHIP
      • Career Center
      • Discounts & Savings
      • Free CPE
      • Free Resource Previews
      • Member-Exclusive Leadership Series
      • Mentorship
    • UPDATE YOUR PROFILE
    • GET INVOLVED
      • GET INVOLVED
      • Advocacy
      • Author an Article
      • Chapter Events Calendar
      • ISACA Awards
      • SheLeadsTech
      • Speak at Conferences
      • Volunteer
  • Enterprise
    • ENTERPRISE
    • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
      • CMMI PERFORMANCE IMPROVEMENT SOLUTIONS
      • CMMI Performance Solutions
      • CMMI Cybermaturity Platform
      • Voluntary Improvement Program
    • CUSTOMIZE YOUR IT TEAM TRAINING
    • TEAM TRAINING
      • ENTERPRISE TRAINING AND CREDENTIALS
      • Skills & Credentials
      • CMMI Training
    • CMMI APPRAISALS (PARS)
    • ENTERPRISE SUPPORT
    • CONTACT US
  • PARTNERSHIPS
    • PARTNERSHIPS
    • BECOME A TRAINING PARTNER
    • BECOME A CMMI PARTNER
    • BECOME AN ACADEMIC OR WORKFORCE PARTNER
    • Sponsorship
      • Become a Sponsor
      • Global Sponsors
    • FIND A TRAINING PARTNER
      • FIND A TRAINING PARTNER
      • Certification Training Partners
        • Certification Training Partners
        • Americas
        • Asia and Oceania
        • China
        • EMEA
      • COBIT Training Partners
      • Academic & Workforce Partners
      • CMMI Performance Improvement Partners
    • BECOME A PARTNER TO CAPITALIZE ON THIS HIGH DEMAND
  • Training & Events
    • TRAINING AND EVENTS
    • CONFERENCES
      • CONFERENCES
      • GRC Conference
      • ISACA Europe Conference
      • ISACA North America Conference
      • ISACA Virtual Conference
      • Student Summit
      • Call for Speakers
    • CHAPTER EVENTS
    • Training Week
    • Virtual Workshops
    • TRAINING BY TYPE
      • TRAINING BY TYPE
      • Online Review Courses
      • Session Recordings
      • Webinars
      • Virtual Summits
    • GROUP/ENTERPRISE TRAINING
    • TRAINING FROM AN ACCREDITED PARTNER
    • TRAINING BY TOPIC
      • Find Training by Topic
      • All Training Topics
      • Artificial Intelligence
      • Cybersecurity
      • IT Audit
      • Certification Exam Preparation
      • COBIT
    • On-Demand CPE Training
    • 15% OFF THE CCOA ONLINE COURSE
  • Resources
    • RESOURCES
    • DIGITAL TRUST
    • ISACA JOURNAL
    • INSIGHTS & EXPERTISE
    • NEWS & TRENDS
    • ENGAGE ONLINE COMMUNITIES
    • COBIT
    • RESOURCES BY TOPIC
      • Artificial Intelligence
      • Cybersecurity
      • Emerging Technology
      • Governance
      • IT Audit
      • IT Risk
      • Privacy
    • FRAMEWORKS, STANDARDS AND MODELS
    • ISACA NOW BLOG
    • ISACA VIDEOS
    • ISACA PODCAST
    • GLOSSARY
    • Advance Digital Trust
  • Join
    • PROFESSIONAL JOIN
    • RECENT GRAD JOIN
    • STUDENT JOIN
  • About Us
    • ABOUT US HOME
    • WHO WE ARE
    • NEWSROOM
    • PARTICIPATE & VOLUNTEER
    • LEADERSHIP & GOVERNANCE
    • ADVOCACY
    • ISACA FOUNDATION
    • CONTACT US
    • CODE OF PROFESSIONAL ETHICS
  • CAREERS
    • Career Journey
    • Career Center
    • Careers at ISACA
  • SUPPORT
  • Store
  • Cart
Sign In
Home / Resources / White Papers / Information Systems Auditing Tools Techniques
Information Systems Auditing Tools and Techniques
Whitepaper

Information Systems Auditing Tools & Techniques: Creating Audit Programs

Audits are important tools for organizations. A thoroughly conducted audit program can assure organizational stakeholders of the financial, operational and ethical well-being of an organization. It should confirm the effectiveness of current operations and on-going compliance with administrative or legal regulations. Or it can reveal the need for change or urgent action.

Information system (IS) audits support all of these outcomes, focusing on the information and related technology and systems that organizations depend on for competitive advantages.

However, an audit’s results are only as good as the effort that went into planning and preparing the audit engagement. The scope and objective of the audit must be clearly understood, so the purpose is clearly defined. From there, an audit plan must be created that incorporates the scope and purpose, that defines the procedures for obtaining evidence, and that supports the eventual audit conclusions and opinions.

To help address these issues and ensure the best possible outcomes for your audit programs, ISACA has created the FREE White Paper, Information Systems Auditing: Tools and Techniques— Creating Audit Programs. It outlines the basic steps necessary to develop comprehensive audit programs that clearly and consistently document the procedures used to test controls and gather supporting data.

Related Items:
Sample Audit and Assurance Program in 5 Steps—Virtual Private Network
Infographic—Audit Plan Activities: Step-By-Step

Download
  • LinkedIn
  • Facebook
  • Instagram
  • YouTube
  • Contact Us
  • Terms
  • Privacy
  • Cookie Notice
  • Cookie Settings
  • Fraud Reporting
  • Bug Reporting

1700 E. Golf Road, Suite 400, Schaumburg, Illinois 60173, USA  |  +1-847-660-5505  |  ©2025 ISACA. All rights reserved.