18.12.2012 Views

Proceedings

Proceedings

Proceedings

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.1 Planning and scoping of the audit<br />

The key starting point in performing the database audit is to understand the business<br />

risk that lies in the system of which the respective database is a component. It is<br />

important for the auditors to understand how the system is used, what is the criticality<br />

of the transactions processed by the system and the confidentiality and availability<br />

requirements for the data stored in its database.<br />

The second step is to obtain an understanding of the IT environment and to see how<br />

the database fits into the overall system architecture. A clear picture of the IT<br />

architecture will help the auditor to identify and assess the risks created by each<br />

component of the information system, e.g. application, interfaces, network topology,<br />

operating system that may potentially influence the database security. In this respect,<br />

the auditor should:<br />

� interview the application / system administrator;<br />

� interview the business owners of the systems;<br />

� review an inventory of IT infrastructure (servers, databases, applications, etc);<br />

� review network topology;<br />

� perform a general review of the IT policies and procedures in place to observe<br />

how the internal control system is.<br />

Based on the review, the risk category is identified for each component of the<br />

information system.<br />

A lack of a clear understanding of the business risks and of the IT environment may<br />

result in an audit report that is not capturing the risks that the information system<br />

really poses to the organization and the findings and recommendation could be<br />

unrealistic and could not mitigate the existing risks.<br />

Following the thorough understanding of the risks involved and the IT environment,<br />

the subsequent steps are performed:<br />

• Define the audit scope and objectives. These should be aligned with the Annual<br />

Audit Plan and Audit Charter and should consider the budget and time<br />

limitations.<br />

• Define the audit limitations and constraints, if any.<br />

• Review the previous database audit reports. Reports issued by both internal and<br />

external auditors and the regulatory bodies should be considered. Determine<br />

whether the issues previously identified have been corrected, taking into<br />

account the following:<br />

� the efficiency and the response time of the corrective measures;<br />

� addressing of the root cause problem (if possible) and not only of the<br />

consequences.<br />

The auditor should assess the overall risk level employed by the remaining<br />

findings and recommendations, left unsolved.<br />

• Based on the assessment of the previous audit reports, changes in the scope and<br />

objectives of the audit should be performed, if it is the case.<br />

~ 294 ~

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!