/
CISA REVIEW 	The material provided in this slide show came directly from Certified Information CISA REVIEW 	The material provided in this slide show came directly from Certified Information

CISA REVIEW The material provided in this slide show came directly from Certified Information - PowerPoint Presentation

reportssuper
reportssuper . @reportssuper
Follow
346 views
Uploaded On 2020-08-28

CISA REVIEW The material provided in this slide show came directly from Certified Information - PPT Presentation

CISA REVIEW Chapter 4 IT Service Delivery and Support Learning Objectives Evaluate service level management practices to ensure that the level of service from internal and external service providers is defined and managed ID: 809881

data service review support service data support review delivery cisa chapter system database management access security processing user application

Share:

Link:

Embed:

Download Presentation from below link

Download The PPT/PDF document "CISA REVIEW The material provided in th..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

CISA REVIEW

The material provided in this slide show came directly from Certified Information Systems Auditor (CISA) Review Material 2010 by ISACA.

Slide2

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Learning Objectives:

Evaluate service level management practices to ensure that the level of service from internal and external service providers is defined and managed.

Evaluate operations management to ensure that IT support functions effectively meet business needs.

Evaluate data administration practices to ensure the integrity and optimization of databases.

Evaluate change, configuration and release management practices to ensure that changes made to the organization's production environment are adequately controlled and documented.

Evaluate problem and incident management practices to ensure that incidents, problems or errors are recorded, analyzed and resolved in a timely manner.

Slide3

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

The overall responsibility for all operations within the IS department resides with IS management. The IS auditor is not expected to be a technical expert on computer operations. Rather,

the auditor should understand the importance of management controls over operations in support of business functions.

Slide4

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

The purpose of the IS department is to provide service for end users. Often, the level of service guaranteed to users of the IS facilities is documented in

service level agreements

(SLAs). SLAs are key to effective management of IT services. They should be used to ensure a clear understanding of the expectations and services offered.

An SLA should fully define the nature, type, time and other relevant information for each service. Factors that should be considered in the delivery of these services include accuracy, completeness, timeliness and proper distribution of output related to application processing.

SLAs should be used both for outsourcing agreements and internally – between the IS department and its end-user clients. This is especially important where there is a contractual relationship between the IS department and the end user or customer. An SLA may be linked to a chargeback system, in which a specified percentage of the cost is apportioned from the end-user department to the IS department.

Slide5

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

SLAs must address a

clear business need

. For example, this might include:

System availability – regular hours and arrangements for out-of-hours service and support

Support availability – regular hours and arrangements for out-of-hours service and support

Throughput – traffic volumes, response times, etc.

Changes – change management rules and agreed-on target timescales

Security – standards and expectations, escalation procedures, etc.

Slide6

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

An audit of service level management should look for a lack of understanding by the customer of the purpose of service level management. The process requires building a relationship between the business units and IS.

Determining the state of the pre-SLA service must be done before the SLA can be agreed on, and achieving a shared perception by customers and IS can be challenging. Unless this is accomplished, other problems will ensue such as SLAs that are based on desires rather than on achievable targets. The audit must also:

Verify targets before the SLA is agreed on

Ensure targets are achievable

Other potential problems include

Lack of focus, confused definitions and inadequate resources

Lack of clearly defined responsibilities of all parties

Targets that are IT-based rather than aligned by business

Failure to communicate the SLA and its targets

Lack of senior management commitment to service level management

Slide7

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Question: Real-World Example

A multinational bank outsourced processing of its credit and debit card transactions. The maintenance of the SLA is critical to the ability of the bank to provide the required and expected service to their customers. Substantial penalties could be applied to unexpected SLA failures.

Slide8

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Answer: Real-World Example

The bank's IS auditor should:

Verify that the agreed-on SLAs were achievable by the outsourcing vendor.

Verify that adequate and complete reports of SLA achievement were prepared by the vendor's IS department in good time for the monthly SLA management meetings.

Verify that the SLA achievement reports highlighted any failures, included a reasonable explanation for the failures and outlined measures in place to ensure the failures did not recur.

Slide9

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

A major responsibility of IS management is ensuring the implementation of control functions including:

Authorization and monitoring of IT resource usage based on corporate policy

Identification of internal and external security vulnerabilities, and their timely resolution

Detection of intrusion attempts

Review and authorization of changes to the network, system and applications

Monitoring to ensure compliance with standards

Review of logs from all IT systems to detect critical system events and establish accountability of IT operations

Capability of IS processing to recover from minor and major disruptions in a timely manner.

Confidentiality, integrity and availability of the data

Plans for equipment replacement and capacity changes to maximize current job throughput and efficiently manage future acquisitions

Management of hardware and software changes to avoid undue disruption to normal processing

Maintenance of job accounting reports and other audit records

Control of logical and physical access to computer resources

Slide10

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Instructions:

Here are four issues and four resource monitoring reports that should identify the issue. Match each issue to the corresponding report.

Issues

Delayed reports

Operator training

Poor system testing

Security access problems

Reports

Console logs

Output distribution report

Operations problem report

Abnormal job termination report

Slide11

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Answers:

Delayed reports

Output distribution report

Operator training

Operations problem report

Poor system testing

Abnormal job termination report

Security access problems

Console log

Slide12

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Like any other asset of an organization, computer resources should be used in a way that benefits the entire organization. A variety of tools are available to monitor systems performance and provide information to authorized personnel. This information should be used as part of an established process for systems monitoring that conforms to the organization's strategies and policies.

Slide13

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Monitoring Use of Resources

Controls over computer resources – sometimes referred to as

general controls

– are essential because of the reliance on computer processing in managing the business. The complexity of software and hardware, and their interrelationships require controls to detect and document any abnormal conditions that could lead to the identification of an error. This generally is in the form of an automated or manual log.

Errors that should be entered in the log include:

Program errors

System errors

Operator errors

Network errors

Telecommunication errors

Hardware errors

Slide14

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Example log:

An error log entry should include the items shown:

Date

Resolution

Code

Description

Source

Escalation

Status

Responsibility

Department

Status

Narrative

Slide15

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

This section gives an overview of various types of computer hardware and networking components. For an IS auditor, what is important is understanding the capabilities of the various devices and how they affect business risk and support business objectives.

Slide16

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Computer system hardware includes components that, while performing interdependent functions, can be classed as either processing components or input/output (I/O) components.

Processing Components

The principal hardware component of a computer is the central processing unit (CPU). This is made up of an arithmetic logic unit (ALU), a control unit and an internal memory. The control unit's circuits control or direct all system operations. The ALU handles mathematical and logical operations. The internal memory (within the CPU) processes transactions.

In addition to the CPU, the computer requires random access memory (RAM), read-only memory (ROM) and, usually, permanent storage devices such as a hard disk.

Input/Output

Components

I/O components are used to transfer information or instructions to the computer and to record or collect the output generated. A keyboard, for example, is an input-only device, but a touch screen can serve as both an input and output device. Printers are an example of an output-only device.

Slide17

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

A distributed computing environment uses a variety of devices to deliver application services:

Print servers

– Allow an organization to consolidate printing resources rather than provide a number of printers

Application (program) servers

– Host the software that provides application access to client computers, as well as the application processing and communication with the application database. The consolidation of applications and licenses enhances application security and control.

Web servers

– Provide information and services to internal and external users through web pages and applications

Proxy servers

– Serve as an intermediate link between users and resources by accessing services on the user's behalf, offering (depending on the setup) greater speed and/or greater security

Database servers

– Provide a repository for raw data and work with application servers and web servers to provide the processing of the data

Slide18

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

A

proxy server

has a large variety of potential purposes, including:

To keep machines behind it anonymous (mainly for security).

To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.

To apply access policy to network services or content, e.g. to block undesired sites.

To log / audit usage, i.e. to provide company employee Internet usage reporting.

To scan transmitted content for malware before delivery.

To scan outbound content, e.g., for data leak protection.

Slide19

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Appliances

– Specialized devices providing a single type of service more efficiently than would be possible for a multipurpose device. Examples include

Firewalls

– Positioned between network segments, these inspect the traffic and apply security policies. The effectiveness of the firewall depends on the quality of the security policies.

Switches

– Used to divide and interconnect network segments and help to reduce collision domains in Ethernet-based networks

Routers

– Used to link two or more physically separate network segments, which can still function as independent networks

Load balancers

– Distribute traffic across several different devices to increase the performance and availability of IT services

Slide20

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Instructions:

Here are five network components and five descriptions. Match each component to its description.

Component

Database server

Firewall

Load balancer

Proxy server

Router

Description

Provides link between user and resources, accessing services on user's behalf

Provides repository for raw data

Distributes traffic across devices to increase performance

Applies security policies

Links two or more physically separate network but allows them to function independently

Slide21

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Answer:

Database server

Provides repository for raw data

Firewall

Applies security policies

Load balancer

Distributes traffic across devices to increase performance

Proxy server

Provides link between user and resources, accessing services on user's behalf

Router

Links two or more physically separate network but allows them to function independently

Slide22

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Database Management Systems

A DBMS enables an organization to organize, control and use the data needed by application programs. The principal functions of a DBMS include reducing data redundancy, improving access time and providing basic security for sensitive data.

A DBMS data dictionary identifies the fields, their characteristics and their use. These dictionaries may be active or passive. A passive dictionary is only a repository of information that can be viewed or printed. An active data dictionary includes entries for all data elements and facilitates application processing – for example, by providing validation characteristics or print formats.

Slide23

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

A DBMS offers an organization a number of advantages:

Allowing data to exist independent of the applications that use them

Simplifying support for changing data requirements

Improving efficiency of transaction processing

Reducing data redundancy

Maximizing data consistency

Minimizing maintenance cost through data sharing

Enabling enforcement of data/programming standards

Enforcing data security

Enabling integrity checks on stored data

Facilitating of users'

ad hoc

access to data, especially through designed query language and application generators

Slide24

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Instructions:

Here are five terms and five descriptions. Match each term to its corresponding description.

Term

Data definition language (DDL)

Data dictionary

Field

Metadata

Normalization

Description

Creates a representation of the schema

Reduces data redundancy

Basic data element

The data elements required to define a database

Description of all the items stored in the database

Slide25

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Answers:

Data definition language (DDL)

Creates a representation of the schema

Data dictionary

A listing of all data stored in the database that describes for each data element the name, data type (numeric, alphanumeric, etc.), length, whether it is required or not, a description, etc

.

Field

Basic data element

Metadata

Data about data stored in a system that provides additional relevant information about this data. For example, a customer entry should include metadata about when the customer was created, who created the new customer, changes to the customer master record,

etc

.

Normalization

Reduces data redundancy

Slide26

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Database Controls

Most DBMSs have internal security features that interact with the OS access control functions. These security features are often combined to cover security concerns associated with maintaining database integrity and availability.

Among the controls may be:

Establishing and enforcing definition standards

Establishing and implementing data backup and recovery procedures to ensure database availability

Establishing necessary levels of access controls for data items, tables and files to prevent inadvertent or unauthorized access

Establishing controls to ensure only authorized personnel can update the database

Slide27

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Database Controls

A DBMS can control user access at these levels:

User and the database

Program and the database

Transaction and the database

Program and data field

User and transaction

User and data field

Slide28

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Real-World Example

Government regulations require that a major utility submit certain complex statistical information. To comply with the mandate, the organization used a database that had been created by a member of the finance department who had a great deal of business experience, but no formal IS training or experience with risk management.

This large database embedded highly technical algorithms for calculating management information and had been in use for many years. The system used an old version of the database software which was no longer supported by the software vendor. No formal normalization had been carried out, although there was no evidence of data redundancy. Finally, there were no security or resilience controls in place.

The database creator was about to retire and was the only person in the organization who had knowledge of the database and how to interpret the information analyses. The finance department management did not have an understanding of how the required data were collected and collated.

Think About It:

What would you, as an IS auditor, recommend to management?

Slide29

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Real-World Example: Answer

The database was critical to the very existence of the business because incomplete, inaccurate or late submission of the data to the governing body would result in legal action resulting in heavy fines and, possibly, the forced closure of the business.

In this case, the IS auditor recommended:

Create a new database using current software.

Place the database on a network server, subject to network access controls and routine backups.

Retain the staff member as a consultant to advise on the design and implementation of the new database.

Slide30

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

IS auditors need an overall understanding of the purpose and function of Operating System (OS) software, database management systems, and utility programs. Although in-depth knowledge of specific software is not necessary, the business purposes and control requirements of each are critical elements in an audit.

Slide31

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

An OS manages the sharing and use of the computer resources such as processors, real memory (e.g., RAM), auxiliary memory (e.g., disk storage) and I/O devices. An OS contains programs that interact between the user, the processor and applications software.

The functions an OS performs include:

Defining user interfaces

Permitting users to share hardware and data

Scheduling resources among users

Informing users of any errors that occur with the processor, I/O or programs

Enabling recovery from system errors

Communicating between the OS and application to allocate memory to processors, and make the memory available when the process is completed

Allowing system file management

Slide32

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

The OS settings enable activity logging, which allows analysis of system functions. Among the areas that can be analyzed based on the activity log are:

Data file versions used for production processing

Program access to sensitive data

Programs scheduled and run

Utilities or service aids usage

OS operation to ensure OS integrity has not been compromised by improper changes to system parameters and libraries

If an OS is improperly implemented or monitored, the result can be unauthorized access, inaccurate system usage logs, undetected errors and corrupted data.

Slide33

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Tape and Disk Management Systems

To provide controls for removable resources such as tapes and disks, organizations can use an automated tape management system (TMS) or disk management system (DMS). This specialized system software tracks and lists tape or disk resources, and includes:

Data set name

Specific tape reel or disk drive location

Creation date

Effective date

Retention period

Expiration date

Contents information

Slide34

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Utility Programs

Utility programs – the system software used to perform maintenance and routines required during normal processing operations – can be categorized into five functional areas, based on how they are used:

Understanding application systems

Assessing or testing data quality

Testing a program's ability to function correctly and maintain data integrity

Assisting in faster program development

Improving operational efficiency

Slide35

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Utility Programs, cont.

Server and PC operating systems are often equipped with specific utilities to:

Handle verification, cleaning and defragmenting of hard disk and removable memory units

Define the file system standard to be used for each unit

Initialize removable data volumes (floppy disk) and volumes of disk/removable memory

Save/restore system images

Reconstruct and restore (logically) canceled files

Test system units and peripherals

Many of these utility programs can perform outside the security system or can function without producing an audit trail of activity. As a result, access to and use of these sensitive and powerful utilities should be well controlled and restricted.

Slide36

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Utility Programs, cont.

IBM has a utility called AMSAPZAP, colloquially known as Super Zap, which bypasses all access control software and has the ability to change data while they are being processed, to change programs while they are running and even change the OS parameters. Super Zap's use must be restricted to emergency access codes only since it may also bypass system logging.

Many UNIX system managers make use of hacker utilities such as COPS and SATAN to assess system vulnerabilities. By definition, these would provide the same information to an unauthorized user.

Slide37

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Real-World Example

A major financial processing organization involved with the authorization of credit card transactions at point of sale used software to manage its authorization and fraud control system that includes a large number of system utilities.

Some of these utilities have capabilities such as adding users or terminals, or starting and shutting down the system. An audit found that these utilities were contained in a library to which only authorized system support staff had access.

However, one utility that system support staff thought could be used only for simple interrogation (such as current usage statistics) was held in a globally available library.

Think About It:

As an IS auditor, would you be concerned that a system utility was available to all users?

Slide38

CISA REVIEW

Chapter 4 – IT Service Delivery and Support

Real-World Example: Answer

The auditor determined that it was possible, without even logging on, to access the mainframe and use the utility to request full statistical information on all of the hundreds of terminals currently connected to the authorization system. As an OS utility, this program took priority over application programs. This put such demands on the system's processing capabilities that the organization's business-critical applications could be shut down.

All utilities should be regarded as a business risk and must be protected.