Internal Controls in ICT Integrated Auditing Procedures

Procurement and Audit notes revision

The internal controls in a computerized environment include both manual procedures and procedures designed into computer programs. Such control procedures comprise two types of control, general controls and application controls.
a) General IT Controls
GITCs are a critical component of business operations and financial information controls. They provide the foundation for reliance on data, reports, automated controls, and other system functionality underlying business processes. The security, integrity, and reliability of financial, procurement and inventory information relies on proper access controls, controls over network operations, system software acquisition, change and maintenance, and operational controls. The General IT Controls are very important to key stakeholders—owners, investors, regulators, audit committees, management, and auditors.

i) Access to Programmes and Data
Risk: Unauthorized access to program and data may result in improper changes to data or destruction of data.
Objectives: Access to program and data is properly restricted to authorized individuals only.
• Policies and procedures
• Roles and responsibilities
• Security parameter settings of operating systems, applications (including Enterprise Resource Planning (ERP) systems (e.g. SAP, Navision, Oracle) and databases
• User access rights
• User access provisioning and de-provisioning
• Periodic access reviews
• Password requirements
• Privileged user accounts
• Monitoring & Training
• Physical security


Area Existing Control


How to Test/Validate
Physical access Only authorized personnel can access secured areas and

computer facilities

Walkthrough of areas (e.g. data centre, backup storage etc.)
User access provisioning A formal process for granting or modifying system access (based on appropriate level of

approval) is in place.

Review an evidence of approval
Password requirements Unique (to individual)

and strong passwords are used.

Assess password rules enforced

ii) Network access Control over Computer Operations
Risk: Systems or programs may not be available for users or may not be processing accurately. Objectives: Systems and programs are available and processing accurately.
• Organisation of IT function
• Service Level Agreements
• Backup and recovery procedures
• Incident handling and problem management
• Environmental controls
• Business Continuity and Disaster Recovery Plans
• Network Management
• Backups and Recovery
• Insurance


Area Existing Control


How to Test/Validate
Backup and recovery Backups for critical data and programs are available in the event of an emergency. Review/assess procedures for backup and recovery and validate that procedures are


Problem/issue management A formal process for problem/issue handling is in place in order to ensure timely identification, escalation, resolution and documentation of


Review/assess procedures for problem/issue management and validate that procedures are followed

III. Controls over Programme Development and Implementation of New Systems
Risk: Direct changes in IT development environment would override the established change management process. This could result in inappropriate and untested application changes that can potentially affect the system’s stability and integrity of procurement data.

Objectives: All changes to existing systems are properly authorized, tested, approved, implemented and documented.
• Testing procedures
• Transfer to live
• Documentation and Training
• Controls over Programme Changes
• Maintenance activities
• Change Requests Controls over Programme Changes
• Maintenance activities
• Change Requests
• Segregation of duties


Area Existing Control


How to Test/Validate
Change management controls A formal process for proper change management is in place. Review change management procedures and validate that

procedures are followed

Testing Appropriate level of

testing is performed.

Review an evidence of

test plans and results

Approval Appropriate approval

prior to migration to production is required.

Review an evidence of approval

General IT controls that relate to some or all applications are usually interdependent controls, i.e. their operation is often essential to the effectiveness of application controls. As application controls may be useless when general controls are ineffective, it will be more efficient to review the design of general IT controls first, before reviewing the application controls
b) Application controls are manual or automated procedures that typically operate at a business process level. They can be preventative or detective in nature and are designed to ensure the integrity of the procurement records. Accordingly, they relate to procedures used to initiate, record, process and report transactions or other financial data.

The purpose of application controls is to establish specific control procedures over the procurement applications such as inventory control, manufacturing resource planning (MRP), distribution requirements planning

(DRP) in order to provide reasonable assurance that all transactions are authorized and recorded, and are processed completely, accurately and on a timely basis. Application controls include the following.
I. Input Controls – These controls are used mainly to check the integrity of data entered into a business application, whether the data is entered directly by staff, remotely by a business partner, or through a Web- enabled application or interface. Data input is checked to ensure that is remains within specified parameters.


Area Existing Controls How      to      tests/


Data checks and validation ·         Sequence check

·         Limit check

·         Range check

·         Validity check

·         Reasonableness check

·         Table lookups

·         Existence check

·         Key verification

·         Check digit

·         Completeness check

·         Duplicate check

·         Logical Relationship check

•      Conduct a sample test of each scenario.

•      Observe attempts to input incorrect data.

•      Determine who can override controls.

Automated authorization, approval, and override •          Override capability

•          Authorization and approval rights

•  Conduct tests based on user access rights.

•  Test                    access privileges for each sensitive function or transaction.

•  Review access rights that set and amend configurable approval           and

authorization limits

II. Processing Controls – These controls provide an automated means to ensure processing is complete, accurate, and authorized.


Area Existing Controls How to tests/


Automated file

identification and validation

Files for processing are available and complete. Review process for

validation and test operation.

Audit trails and overrides •          Automated tracking of changes made to data, associating the change with a specific user.

•          Automated tracking and highlighting of overrides

to normal processes.

•          Review reports and evidence of reviews.

•          Review access to override normal processes.

Data extraction, filtering, and reporting •          Extract routine outputs are assessed for reasonableness and completeness.

•          Automated allocation of transactions.

•          Evaluation of data used to perform estimation for financial reporting purposes

•          Review design of extract routine against data files used.

•          Review supervisory assessment of output from extract routine for evidence of regular review and challenges.

•          Review sample of allocations for appropriateness.

•          Review process to assess extracted data for completeness and


 III. Output Controls – These controls address what is done with the data and should compare output results with the intended result by checking the output against the input.
IV. Integrity Controls – These controls monitor data being processed and in storage to ensure it remains consistent and correct.
V. Management Trail – Processing history controls, often referred to as an audit trail, enables management to identify the transactions and events they record by tracking transactions from their source to their output and by tracing backward. These controls also monitor the effectiveness of other controls and identify errors as close as possible to their sources.
Relying on application controls can yield reliability, benchmarking, time and cost savings.

Leave a Reply

Your email address will not be published. Required fields are marked *