The CISA Prep Guide - .e-bookshelf.de

Transcription

b250325 FM.F12/31/0210:11 AMPage i The CISA Prep Guide:Mastering the Certified InformationSystems Auditor ExamJohn Kramer

a250325 Reader Adv.F12/31/0210:11 AMPage oii

a250325 Reader Adv.F12/31/0210:11 AMPage oiTheWILEYadvantageDear Valued Customer,We realize you’re a busy professional with deadlines to hit. Whether your goal is to learn a newtechnology or solve a critical problem, we want to be there to lend you a hand. Our primary objectiveis to provide you with the insight and knowledge you need to stay atop the highly competitive and everchanging technology industry.Wiley Publishing, Inc., offers books on a wide variety of technical categories, including security, datawarehousing, software development tools, and networking — everything you need to reach your peak.Regardless of your level of expertise, the Wiley family of books has you covered. For Dummies — The fun and easy way to learn The Weekend Crash Course — The fastest way to learn a new tool or technology Visual — For those who prefer to learn a new topic visually The Bible — The 100% comprehensive tutorial and reference The Wiley Professional list — Practical and reliable resources for IT professionalsThe book you hold now, The CISA Prep Guide: Mastering the Certified Information Systems Auditor Exam, isthe first comprehensive and commercially available preparation guide to offer CISA study materials. Thebook provides definitions and background on all of the seven content areas of CISA, along with sampletest questions and explanations of answers. Whether you are an information systems auditor, an IS auditmanager, a CISSP or SSCP professional, or a professional who needs to get up to speed on IS systems,this book with its Boson-powered, interactive CD test-prep engines should provide all you need to knowto prepare for the CISA exam.Our commitment to you does not end at the last page of this book. We’d want to open a dialog with youto see what other solutions we can provide. Please be sure to visit us at www.wiley.com/compbooks toreview our complete title list and explore the other resources we offer. If you have a comment,suggestion, or any other inquiry, please locate the “contact us” link at www.wiley.com.Thank you for your support and we look forward to hearing from you and serving your needs againin the future.Sincerely,Richard K. SwadleyVice President & Executive Group PublisherWiley Technology Publishing

a250325 Reader Adv.F12/31/0210:11 AMPage oii

b250325 FM.F12/31/0210:11 AMPage i The CISA Prep Guide:Mastering the Certified InformationSystems Auditor ExamJohn Kramer

b250325 FM.F12/31/0210:11 AMPage iiPublisher: Bob IpsenExecutive Editor: Carol A. LongEditorial Manager: Kathryn A. MalmManaging Editor: Angela SmithNew Media Editor: Brian SnappText Design & Composition: Wiley Composition ServicesThis book is printed on acid-free paper. Copyright 2003 by John Kramer. All rights reserved.Published by Wiley Publishing, Inc., Indianapolis, IndianaPublished simultaneously in CanadaNo part of this publication may be reproduced, stored in a retrieval system, or transmittedin any form or by any means, electronic, mechanical, photocopying, recording, scanning, orotherwise, except as permitted under Section 107 or 108 of the 1976 United States CopyrightAct, without either the prior written permission of the Publisher, or authorization throughpayment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc.,10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-mail:permcoordinator@wiley.com.Limit of Liability/Disclaimer of Warranty: While the publisher and author have used theirbest efforts in preparing this book, they make no representations or warranties with respectto the accuracy or completeness of the contents of this book and specifically disclaim anyimplied warranties of merchantability or fitness for a particular purpose. No warranty maybe created or extended by sales representatives or written sales materials. The advice andstrategies contained herein may not be suitable for your situation. You should consult witha professional where appropriate. Neither the publisher nor author shall be liable for anyloss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.Trademarks: Wiley, the Wiley Publishing logo and related trade dress are trademarks or registered trademarks of Wiley Publishing, Inc. in the United States and other countries, andmay not be used without permission. CISA is a trademark or registered trademark of Electronic Data Processing Auditors Association, Inc. All other trademarks are the property oftheir respective owners. Wiley Publishing, Inc. is not associated with any product or vendormentioned in this book.For general information on our other products and services please contact our CustomerCare Department within the United States at (800) 762-2974, outside the United States at(317) 572-3993 or fax (317) 572-4002.Wiley also publishes its books in a variety of electronic formats. Some content that appearsin print may not be available in electronic books.Library of Congress Cataloging-in-Publication Data:ISBN 0-471-25032-5Printed in the United States of America10 9 8 7 6 5 4 3 2 1

b250325 FM.F12/31/0210:11 AMPage iiiContentsIntroductionChapter 1xiThe Information System Audit ProcessIS Auditing StandardsRisk-Based ApproachKnow Your BusinessControlsPreventive ControlsDetective ControlsCorrective ControlsTypes of Audit EngagementsSAS 70The Audit OrganizationAudit sessment AuditsAudit StaffingPlanning the Individual AuditIS Audit TypesRisk AssessmentCobiTAudit Objectives and ScopeUsing the Work of Other AuditorsImpact of Outsourcing on IS AuditsIndependence of an AuditorAudit 3031iii

b250325 FM.Fiv12/31/0210:11 AMPage ivContentsCreating and Maintaining Work PapersDue CareCover SheetKey DocumentsBackgroundPlanning and Risk AssessmentAudit ProgramTest Work and EvidencePost-Audit ChecklistFieldworkControl Objectives and Audit ApproachReferencingObtaining Evidence to Achieve the Audit ObjectivesFlowchartsDocumentation firmationReperformanceMonitoringTest WorkCAATsManagement Control ReportsSamplingPreparing ExhibitsIdentifying Conditions and Defining Reportable FindingsConclusionsIdentification of Control WeaknessesSummarizing Identified Weaknesses into FindingsRoot Cause AnalysisValue-Added RecommendationsReasonable Assurance through a Review of WorkThe AIC and the Next Level Review of the Work PerformedPeer ReviewCommunicating Audit Results and Facilitating ChangeReport onWeb SitesSample 1424243444447474849495050515152525354555656565657

b250325 FM.F12/31/0210:11 AMPage vContentsChapter 2Management, Planning, and Organizationof Information SystemsEvaluate the IS Strategy and Alignmentwith the Business ObjectivesSystems ArchitectureEvaluate the IS Organizational StructureRoles and ResponsibilitiesQualification and Training of the IS StaffEvaluating IS Policies, Standards, and ProceduresPolicyStandardsProceduresEvaluating Third-Party Services Selection and ManagementContract ManagementService Level AgreementsEvaluating Project ManagementEvaluating Change ManagementEvaluating Problem ManagementEvaluating Quality ManagementSystem Development Life Cycle (SDLC)Quality Assurance Standards and ProceduresEvaluating Performance ManagementKey Performance Indicators (KPIs)Performance Measurement TechniquesEvaluating Capacity ManagementEconomic Performance PracticesEvaluating Information Security ManagementEvaluating Business Continuity ManagementEvaluating IS Management Practices and Policy ComplianceChapter 00103106ResourcesSample Questions107108Technical Infrastructure and Operational PracticesEvaluating Systems Software115116Operating SystemsDatabase Management SystemsMulti-Tier Client/Server Configuration ImplicationsSecurity PackagesOperations Management Consoles116120123125128Evaluating Hardware Acquisition, Installation,and MaintenanceInstallationMaintenanceEvaluating Network InfrastructureVoice NetworksData Networks131134135137137141v

b250325 FM.Fvi12/31/0210:11 AMPage viContentsEvaluating IS Operational PracticesComputer OperationsPrinter OperatorsMedia Library ManagementPhysical Access to Operations AreasHelp Desk and User SupportJob SchedulingConfiguration ManagementAsset ManagementChange ManagementEvaluating System PerformanceMonitoring Techniques, Processes, and ToolsCapacity PlanningProblem ManagementService Level Agreements (SLAs)Chapter urcesSample Questions171172Protection of Information AssetsSecurity Risks and Review Objectives179181The Security Officer’s RolePrivacy RiskThe Security ProgramPolicy and StandardsPeriodic Security Assessments and PlanningDesigning Security from the StartIdentification, Authentication, and AuthorizationNeed to KnowSecurity Controls EconomicsRole-Based AccessEvaluating Account AdministrationUser Account ManagementSingle Sign-On SolutionsApplication Design SecurityApplication and Data AccessInformation Ownership and CustodianshipEvaluating Logical Access ControlsGood PasswordsStrong AuthenticationPKI and Digital SignaturesBiometric Access ControlsNetwork User AccessInformation Security ArchitectureSecurity Plans and ComplianceHost-Based 210212215215218219222223224225230

b250325 FM.F12/31/0210:11 AMPage viiContentsEvaluating Network Infrastructure SecurityFirewallsDemilitarized Zones (DMZs)ProxiesEvaluating Encryption TechniquesVirtual Private Networks (VPNs)Web Access ControlsEmail SecurityVirus ProtectionLogging and MonitoringNetwork Intrusion DetectionIncident ResponseSecurity Testing ToolsThird-Party ConnectionsEvaluating Security AwarenessSocial EngineeringEvaluating Environmental ControlsElectrical PowerTemperatureFire SuppressionHumidityMaintenanceEvaluating Physical Access Controls and ProceduresVisitor and Vendor AccessThe Physical Location, Security Measures, and Visibility ProfilePersonnel SafetyHard Copy Information ProtectionChapter 74275278279281282282284285286287ResourcesSample Questions288289Disaster Recovery and Business ContinuityThe Business Case for Continuity PlanningThe Process of Planning for Adequate Recoveryand ContinuityEvaluating Business Impact Analysis and theRequirements-Definition ProcessesEvaluating Media and Documentation Back UpProceduresEvaluating Recovery Plans, Documentation,and MaintenanceEvaluating Alternative Business Processing Plansand Associated Training301303Business Processing AlternativesTraining Evaluation305310313317324327329vii

b250325 FM.Fviii12/31/0210:11 AMPage viiiContentsEvaluating Testing Methods, Results Reporting,and Follow-Up ProcessesReporting EvaluationFollow-UpChapter 6334335ResourcesSample Questions336337Business Application Systems Development,Acquisition, Implementation, and MaintenanceEvaluation Approach345347Systems Development Approaches and ManagementProject ManagementFunctional RequirementsRequirements DefinitionsFeasibility AnalysisSystem SpecificationsSystem DesignQuality Assurance Planning and Review ProcessesSystem DevelopmentChange Control MethodologiesThird-Party ParticipationDocumentation and StandardsData Management, Security, and Audit FunctionalityTesting and Code PromotionTrainingConcluding on the Development ProcessAcquisitionEvaluate the Application System Acquisitionand Implementation ProcessVendor Management and EscrowImplementationConversionProblem Management and EscalationEmergency Change ManagementPost-ImplementationAcceptance and Post-Implementation ReviewEvaluating the Maintenance and Enhancement ProcessesVersioning and Release PackagingChapter 86388389392395396397398399399400401ResourcesSample Questions402403Business Process Evaluation and Risk ManagementCorporate GovernanceEvaluating the Effectiveness of the Information Systemsin Supporting the Business Process411413Best Practice Business Process DesignManagement Controls417418420

b250325 FM.F12/31/0210:11 AMPage ixContentsKey Performance Indicators (KPIs)Evaluating Business Process Reengineering ProjectsAssessing Performance and Customer SatisfactionE-Business Applications in Support of BusinessEvaluating the Design and Implementation of Risk ControlsPreventive ControlsDetective ControlsCorrective ControlsAutomated or Programmed ControlsManual ControlsCost-Benefit Analysis of Control EffortsEvaluating Risk Management and GovernanceImplementationRisk AnalysisControl IdentificationGap Analysis and ReportingIndependent AssuranceProvisions for Independent AuditsResourcesSample 2443445450456457Appendix A Answers to Sample Exam QuestionsChapter 1—The IS Audit ProcessChapter 2—Management, Planning, and Organizationof Information SystemsChapter 3—Technical Infrastructure and OperationalPracticesChapter 4—Protection of Information AssetsChapter 5—Disaster Recovery and Business ContinuityChapter 6—Business Application Systems Development,Acquisition, Implementation, and MaintenanceChapter 7— Business Process Evaluation andRisk Management465465Appendix B What’s on the CD-ROM555Index559477488499519530542ix

b250325 FM.F12/31/0210:11 AMPage xAcknowledgmentsI would like to thank my family — Nick, John, and my wife Linda — forputting up with me through the process of developing this book. Withouttheir patience and understanding, this would not have been as easy or asenjoyable. I am also grateful to the many IS auditors whom I have met andworked with during my career in IS auditing. The association with otherprofessionals who pursue excellence in their work is always a benefit topersonal growth.About the AuthorJohn Kramer is the Information Security Manager and Security Architectfor the UPMC Health System. He spent eight years working in informationsystems auditing for both large banking and investment and health careinstitutions. In both environments, he has been responsible for managingall phases of the IS audit programs, conducting risk assessments, and managing IS operations and audit functions. John has had the responsibility forthe development and training of many IS auditors, several of whom havepassed the CISA exam successfully. John has been a CISA since 1995. He isa former Vice President of the Pittsburgh ISACA chapter. He is also aCISSP. His formal education is in electrical engineering.

b250325 FM.F12/31/0210:11 AMPage xiIntroductionInformation systems auditing is a profession that is both rewarding andchallenging. It allows the information systems auditor a unique view of thebusiness processes and the supporting information technology that encompass a wide scope of understanding and perspective. This view is often oneof the overall system and how it works; the big picture. IS auditing is frequently a stepping stone to management positions and careers within thebusiness for which the auditor learns the systems and controls. Processknowledgeable system thinkers with inherent integrity and risk focus areoften sought as reliable management material. The most sought after, globally accepted standard of certification for an IS auditor is that of CISA, Certified Information System Auditor. Since 1978, this designation means thatthe auditor is recognized as a certified professional. Earning the CISA designation shows that the auditor takes his profession seriously and is dedicated to establishing his reputation and career as a proficient professional.CISAs are trained in all aspects of IS auditing and bound by a code ofethics to perform sensitive activities reliably and with integrity. The certification process was established to evaluate competency of IS auditors and provide a mechanism for encouraging IS auditors to maintain and enhance theirknowledge of the IS auditing profession. CISA certification requires a broadknowledge of the information technology management processes and fiveyears of experience in IS auditing, control, or security allowing for a few substitutions and waivers. It also depends on a basic understanding of generallyxi

b250325 FM.Fxii12/31/0210:11 AMPage xiiIntroductionaccepted auditing practices as well as many of the basic processes used everyday in information processing and business management.The CISA certification is a pre-requisite for many audit and security jobpostings in the marketplace today. The majority (71 percent) of those holding a CISA certification surveyed in 2001 believe that obtaining this certification has helped to advance their careers. This opinion was borne out bya recent survey conducted by Foote Partners, which showed that CISAsreceived the highest salary bonuses among the 39 technical skills certification programs studied. Those possessing the CISA certification received amedian 10 percent bonus (as a percent of base salary), the highest bonusamount attributed to a certification. Overall, the average bonus for all certifications tracked during the same time period was only 6.8 percent.More than 10,000 individuals registered for the CISA exam in 2002, yetvery little information is available about what IS auditors’ work is allabout. Becoming certified takes years of experience and exposure to information systems and risk and control techniques. There is no substitute forthis work experience. My hope is that this book will give you insight intoone person’s perspective of how to perform this work, add value to thebusiness organizations you are supporting as an IS auditor, and mostimportantly show you how to consolidate your understanding of the auditprocess into the successful passing of the CISA exam in June.After you have received your certification, you will find that this book isa valuable reference and ongoing tool that you can use while practicingyour trade as an IS audit professional. Technology is a fast-paced and everchanging world where yesterday’s bleeding edge is today’s obsoleteprocess. IS auditing techniques applied to the business processes’ risks andcontrols do not change as much over time, however. They are more closelytied to human behavior and corporate governance, which mature andendure steadfastly over time. To know the IS audit profession is to understand how to go about getting the right results without necessarily havinga full understanding of each and every technical solution that comes along.You don’t need to know all of the technologies in the greatest detail tounderstand how the business processes require them for processing andhow to control risks inherent in the technical solution to business problems. ISACA has created many excellent standards and control-assessmentprocesses to provide the auditor with the tool needed to successfully applyrisk and control examinations to the business processes, assisting them toimprove and achieve the business objectives. The CISA certification is aproud moment for the audit professional, one which marks a milestone ina successful career path.

b250325 FM.F12/31/0210:11 AMPage xiiiIntroductionThe ISACA OrganizationThe Information Systems Audit and Control Association (ISACA) wasfounded in 1969. With over 26,000 members in over 100 countries, it is therecognized world leader in IS governance, control, and assurance. The mission of ISACA is to support enterprise objectives through the development,provision, and promotion of research, standards, competencies, and practices for the effective governance, control, and assurance of information,systems, and technology. The Association helps IS audit, control, and security professionals focus not only on IS, IS risks, and security issues, but alsoon the relationship between IS and the business, business processes, andbusiness risks. There are more than 160 local chapter organizations in citiesacross the globe that provide unique opportunities to leverage commonexperiences and further knowledge of the IS auditing profession.The ExaminationThe CISA examination is administered once a year on a Saturday in earlyJune. You must register at least a month in advance, and by registeringearly you can receive discounts on your registration fees. Discounts arealso afforded to ISACA members for the test and study materials that areoffered by ISACA. This is just one of the many benefits of membership tothis international IS auditing professional organization. In 2002, the examwas given in over forty states in the United States and over seventy othercountries worldwide, many in multiple locations in that country. You canpick a test center where you would like to take the test and the languagethat you would prefer the exam be given in. Two to three weeks before theexam date, you will be sent an admission ticket that must be presented forphysical admission to the exam location. Local ISACA chapters often hostthe test and provide administration and logistics for the exam. Booklets arehanded out and oral instructions are given at the start of the four-hourexam time frame during which you must answer 200 multiple-choice questions similar to the ones at the end of each chapter of this book.Several supplemental resources are available to help in preparing for theexam. ISACA provides some study aids which can be purchased from theirWeb site. Technical books on the details of IS auditing and systems controlsare relatively few, however. Your local ISACA chapter is an excellent sourceof information and can be a valuable resource for finding others to studywith and share preparation for the exam with.xiii

b250325 FM.Fxiv12/31/0210:11 AMPage xivIntroductionObtaining and Maintaining CertificationBecoming a Certified Information Systems Auditor is a process of passingthe exam described in this book, showing a commitment to the professionby agreeing to the professional ethics and continuing education requirements, and providing evidence of five years of IS audit, control, or securityrelated work experience. This is not a paper certification by any measure.Criteria for Becoming a CISACISA certification is a process of assessing individuals for their skills andjudgment related to IS audit, control, and security. In addition to passingthe exam, the candidate must submit evidence of five (5) years of experience in the professional practice of IS audit, control, or security. Substitution and waivers of such experience may also be obtained that will applyto this five-year experience requirement as follows: A maximum of one year of experience may be substituted for One year of other audit experience One year of information systems experience and/or An associate’s degree (60 semester college credits or itsequivalent) Two of the required five years of experience may be substituted for abachelor’s degree (120 semester college credits or its equivalent). One year of IS audit, control, or security experience may be substituted for each two years of experience as a full-time universityinstructor in a related field (e.g., computer science, accounting, ISauditing) with no maximum limitation to the two for one experienceyear substitution.All related experience submitted as evidence for the certification as an ISauditor must have been gained within the ten years preceeding the application for certification or within five years from the date the candidate initially passed the exam. Individuals may choose to take and pass the CISAexam prior to meeting the experience requirements but will not beawarded the CISA designation until all the requirements are met. All experience will be independently verified with employers.

b250325 FM.F12/31/0210:11 AMPage xvIntroductionMaintaining Your CISA CertificationThe CISA certification must be actively maintained by the individual whois awarded with this designation through a program of continuing educational pursuit and annual maintenance fees paid in full to ISACA. The continuing education policy requires that a certified individual earn andsubmit a minimum number of Continuing Professional Education (CPE)hours annually. CISAs must obtain and submit one hundred and twenty(120) CPEs over a three-year reporting period with a minimum of twenty(20) CPEs in any given year. Some CISAs are selected each year for an auditof their CPE credits and their applicability to the continuing educationprocess. You must respond and submit any required supporting documentation if you are selected for this annual audit. For this reason, it is veryimportant to keep separate and accurate records related to your continuingeducational efforts related to maintaining your CISA certification.The Certification Board may at its discretion revoke certification for anumber of reasons. This action would be taken only after due and thorough consideration and for one of the following reasons: Falsifying or deliberately withholding relevant information. Intentionally misstating a material fact. Engaging in or assisting others in dishonest or inappropriate behavior in connection with the CISA exam or the certification process. Violating the Code of Ethics in any way. Failing to meet the Continuing Education requirements. Failing to pay annual CISA maintenance fees.The Approach and Layout of This BookThe approach of this book is a blend of relating experiences and the transference of knowledge: Experiences in passing the CISA exam, years of performing IS audits, and audit management, as well as teaching entry-levelIS auditors. My experiences are somewhat unique because they span bothmedical and financial business environments as both an auditor and auditmanager. Recruiting junior auditors and training them to perform IS auditsand eventually pass the CISA exam were both personally rewarding andxv

b250325 FM.Fxvi12/31/0210:11 AMPage xviIntroductioninstructive to the advancement my understanding of the IS audit profession. I have included information and relate my views about several of thestandards and current direction of the ISACA organization and its evolving testing criteria. This firsthand knowledge of what works and whatinformation is most relevant to the professional IS auditor uniquely positions you, the reader, to study for and pass the CISA exam and perform ISaudits with confidence.Organization of the BookThe text is organized according to the examination content areas that arecurrently defined for preparation and study for the CISA examination:Chapter 1, “The IS Audit Process” (10 percent of test content).Chapter 2, “Management, Planning, and Organization of InformationSystems” (11 percent of test content).Chapter 3, “Technical Infrastructure and Operational Practices”(13 percent of test content).Chapter 4, “Protection of Information Assets” (25 percent of test content).Chapter 5, “Disaster Recovery and Business Continuity” (10 percent oftest content).Chapter 6, “Business Application System Development, Acquisition,Implementation, and Maintenance” (16 percent of test content).Chapter 7, “Business Process Evaluation and Risk Management”(15 percent of test content).Appendix A, “Answers to Sample Exam Questions.”Appendix B, “What’s on the CD-ROM.”Each chapter is accompanied by a series of sample questions that are inthe same format as those found on the CISA examination. Answers areprovided for each question along with an explanation of the answers inAppendix A.Valuable reference material and glossaries of terms include informationwith which you will need to become familiar. Some of the author’s favoriteresources are listed at the end of each chapter to guide the candidate forfurther study and to use in performing IS audits.

b250325 FM.F12/31/0210:11 AMPage xviiIntroductionThe Companion CD-ROMIncluded with this book is a CD-ROM containing all of the questions presented as samples, formatted in a similar fashion as those in the CISA exam.The Test Engine from Boson Software allows you to determine what categories or content areas you are strong and weak in, in order to narrow yourstudy efforts as you prepare for the actual exam. You can review the correctanswers after each question and time your test-taking abilities. Options forkeeping track of your quiz-scoring include asking missed questions overagain in subsequent quizzes and multiple quizzes using select content areasif desired. Scoring is tracked and graded as you progress. Instructions forloading and using the software are included in Appendix B of this book.Who Should Read This BookThis book is not only a useful preparation guide for the CISA exam, butalso will serve as a reference to best audit practices which can be subsequently adapted to the individual situation faced by an IS auditor in his orher work. It can be used to ensure that all aspects of risk and control havebeen considered when preparing for or performing an IS audit engagement. There are three main categories of readers for this comprehensiveexam prep guide: Candidates who are planning on sitting for the CISA exam andwho are looking for a comprehensive and practical guide to all ofthe knowledge required to achieve certification. This book is notdesigned to cover all of the details of every aspect of IS audit andcontrol. Instead it provides a guide that will walk the candidatethrough all audit content areas at a high level, allowing the candidate to determine where they need to follow up with additionalresources and fill in the gaps in their knowledge base. Students of IS management and auditing w

The CISA Prep Guide: Mastering the Certified Information Systems Auditor Exam, is the first comprehensive and commercially available preparation guide to offer CISA study materials. The book provides definitions and background on all of the seven content areas of CISA, along with sample test questions and explanations of answers.