Anda di halaman 1dari 2

IT Audit Program for Application Controls

Areas of Risk Possible errors or Irregularities Audit Objectives Audit Procedures

 Entry of the unauthorized data  To ensure the completeness and  Review the source code to ensure that the defined edits
 Data entered into the application may accuracy of the records and the validity of are included and are coded properly to achieve the
be irrelevant. the entries made therein. desired result.
 Incomplete data entry  To minimize the likelihood of input  Review test results performed by the auditor as the system
 Entry of duplicate/redundant data controls by allowing users to select from is being developed or modified.
 Loss of assets a limited number of alternative choices  Obtain data input procedures and verify that individuals
 Incompetent employees rather than inputting data. responsible for entering data have been trained on the
 To determine the data inputted are preparation, entry, and control of input.
authorized and authenticated.  Include the pre-numbering of source documents and the
 To ensure that authorized personnel are marking of records as “input” after entry.
trained.  Input source verification to provide assurance that data is
 To verify the existence and operation of only being modified by, or disclosed to, authorized
1. Input Controls manual data entry controls to prevent the individuals at known locations during approved time
entry of duplicate records. frames.
 To verify that controls exist to prevent  Use audit software developed specifically to read the log
unauthorized changes to system to get a report listing the totals and details of all
programs such as calculations and transactions processed for the day.
tables.  Use input controls such as check digit, missing data
 To determine whether appropriate check, numeric-alphabetic check, limit check, range check,
segregation of duties exists to prevent reasonable check, and validity check.
users from both entering and authorizing
transactions.

 Data redundancy  To ensure processing accomplished the  Obtain procedures for handling rejected transactions and
 Inaccurate processing of transactions desired tasks. subsequent error correction and determine whether
leading to wrong outputs/results  To provide reasonable assurance that personnel responsible for error correction and data re-
 Some of the transactions being data processing has been performed entry have been adequately trained.
2. Data Processing Controls processed by the application may accurately, without any omission or  Determine whether routines are embedded within the
remain incomplete duplication of transactions. application that ensure all correctly entered transactions
 To identify data errors, incomplete or are actually processed and posted as intended in the
missing data and inconsistencies among correct accounting period.
related data items.  Verify output is reviewed or reconciled against source
 To ensure that all rejected transactions documents for completeness and accuracy, including
have been identified and reprocessed in verification of control totals.
a timely manner.  Verify a mechanism is in place for notifying the process
 To determine the critical edits and checks owner when transactions have been rejected or errors
necessary for each application. have occurred.
 Use processing controls such as file and operator controls,
run-to-run controls, control total reports, and limit and
reasonableness tests.

 Unauthorized copying of reports  To ensure output reports are  Execute software utility that will dump a few records of the
 Repeated errors in the output protected from disclosure. encrypted file and verify that the printed data is encrypted.
generated leading to loss of revenue,  To determine that all output is produced  Review the management of encryption keys and
loss of creditability of the system as and distributed on time, physically encryption terminal definitions.
3. Output Controls well as that of the organization. controlled at all times, depending on the  Identify that the report covers the designated period via
 Non-availability of the data at the time confidentiality of the document and errors reconciliation against source documents from that period.
when it is desired. and exceptions are properly investigated  Review existing data output procedures and determine
 The information which may be of very and acted upon. whether they document which personnel receive the data
confidential nature may go to the wrong  To ensure that all transaction output has output and how the data will be protected during
hands. been distributed to appropriate personnel distribution.
and that sensitive and confidential  Obtain data output procedures and gain an understanding
information is protected during of the review process and verify that individuals
distribution. responsible for data entry have been trained on the review
 To ensure that an output report is created and verification of data output.
at the designated time and covers the
designated period.

References:

https://onlinelibrary.wiley.com/doi/pdf/10.1002/9781119203728.app2?fbclid=IwAR3ZwMtT1qaw-zX5sxmC44HFJ7TuWO37RvVQ4qqBsbzbm3303SUmk8t6R3w&

https://www.undp.org/content/dam/albania/docs/STAR/IT%20AUDIT%20MANUAL.pdf

https://www.asu.edu/fs/documents/icq/IT_application_controls_icq.pdf

https://resources.infosecinstitute.com/itac-application-controls/#gref

Anda mungkin juga menyukai