Risk assessment checklist - Acquire and implement

Similar documents
Risk assessment checklist - Plan and organize

Risk assessment checklist - Purchasing cycle

Risk assessment checklist - Not-for-Profit governance

STANDARD ON INTERNAL AUDIT (SIA) 7 QUALITY ASSURANCE IN INTERNAL AUDIT *

QUALITY ASSURANCE PLAN OKLAHOMA DEPARTMENT OF HUMAN SERVICES ENTERPRISE SYSTEM (MOSAIC PROJECT)

RREGULATION ON INTERNAL CONTROLS AND INTERNAL AUDIT FUNCTION IN MICROFINANCE INSTITUTIONS. Article 1 Scope and Purpose

Outline of the Discussion

INTERNAL AUDIT DIVISION

F: Compliance Audit Checklists: Organisational & Management Issues

CMMI FOR SERVICES, THE PREFERRED CONSTELLATION WITHIN THE SOFTWARE TESTING FUNCTION OF A SOFTWARE ENGINEERING ORGANIZATION

Information System Audit Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000)

Principles of Information Security, Fourth Edition. Chapter 10 Implementing Information Security

INFORMATION TECHNOLOGY PROCUREMENT

TURBO MACH A DIVISION OF VT SAA

BAFE SP203-1 Assessment Check List

Software configuration management

DIRECTOR, INFORMATION TECHNOLOGY PROJECT IMPLEMENTATION/ FISCAL INTEGRATION

RUWACON QUALITY MANUAL

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.

Request for Proposal for Implementation of ERP and Webbased ERP- like Solutions

INS QA Programme Requirements

1. In a dispute between two staff physicians, the primary role of the CEO is to:

REPORT 2014/014. Audit of the implementation of the Murex system in the Investment Management Division of the United Nations Joint Staff Pension Fund

MASS MANAGEMENT ACCREDITATION STANDARDS

GUIDANCE NOTE FOR DEPOSIT TAKERS (Class 1(1) and Class 1(2))

INFORMATION SYSTEMS (IS) SYSTEMS DEVELOPMENT SERVICES TITLE SERIES DEFINITIONS

Position Description - APPLICATIONS MANAGER

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. EudraLex The Rules Governing Medicinal Products in the European Union

Understanding and Mitigating IT Project Risks BY MIKE BAILEY AND MIKE RIFFEL

Head of Information Services (I.S.) Job reference: FIS1603. Director of Finance & IS. Head of Information Services. ICT Manager

For. Planning and Research Related to Procurement of a Systems Integration, Enhancements to a MMIS, New Fiscal Agent, and a Replacement DSS

ISO 9001: 2000 (December 13, 2000) QUALITY MANAGEMENT SYSTEM DOCUMENTATION OVERVIEW MATRIX

Essential IT Considerations for Sarbanes-Oxley Act

OP Page. 1 of 7 QUALITY. 2/3/2010 Issue Date. Notes: Breeze-Eastern

QUALITY MANUAL ECO# REVISION DATE MGR QA A 2/25/2008 R.Clement J.Haislip B 6/17/2008 T.Finneran J.Haislip

EMPLOYEE FRAUD OPPORTUNITIES CHECKLIST

/3130 Supervisory Controls Testing

INTERNATIONAL STANDARD

COBIT Control Assessment Questionnaire

25 D.L. Martin Drive Mercersburg, PA (717)

NIGP OA 4 ACCREDITATION CRITERIA FORM

npliance IN 2008, MICROSOFT CORP. WAS FINED 899 MILLION Auditing for

SENIOR MANAGEMENT ANALYST

AUDIT SISTEM INFORMASI MUHAMMAD BAGIR, MTI

(Non-legislative acts) REGULATIONS

CMMI V2.0 MODEL AT-A-GLANCE. Including the following views: Development Services Supplier Management. CMMI V2.0 outline BOOKLET FOR print.

Management Response and Action Plan

A Guide to IT Risk Assessment for Financial Institutions. March 2, 2011

PART THREE: Work Plan and IV&V Methodology (RFP 5.3.3)

Quality & Compliance Manager (Children s Homes & Schools)

CHAPTER 5 INFORMATION TECHNOLOGY SERVICES CONTROLS

Retail Payment Systems Internal Control Questionnaire

Preferred Systems Solutions Commercial Price list Calendar Year 2018

Quality Assurance in Internal Audit. Standard on Internal Audit (SIA) 7

Brumund Foundry Inc.

COORDINATOR OF PURCHASING Job Description

ISACA Systems Implementation Assurance February 2009

Work Plan and IV&V Methodology

Internal Audit Report

External Quality Assessment Are You Ready? Institute of Internal Auditors

IMDRF. Final Document. Regulatory Authority Assessor Competence and Training Requirements. IMDRF MDSAP Work Group

Los Rios Community College District Adopted: November 2013 Revised: June 2014

ACTION Agenda Item I ANNUAL AUDIT REPORT December 6, 2002

The table below compares to the 2009 Essential Elements and the 2018 Enhanced Data Stewardship Elements

OPERATIONAL RISK EXAMINATION TECHNIQUES

Project Management Knowledge Areas SECTION III

Project Management Process Groups. PMP Study Group Based on the PMBOK Guide 4 th Edition

Audit of Weighing Services. Audit and Evaluation Services Final Report Canadian Grain Commission

EU GMP - Annex 11 Computerised systems Versione corrente Nuova versione per commenti (emessa 8 aprile 2008)

Temporary, contract and interim recruitment services Permanent and fixed term selection recruitment services Retained & executive recruitment services

REPORT 2016/023 INTERNAL AUDIT DIVISION. Review of recurrent issues in the implementation of Umoja in field missions

ISO9001:2008 SYSTEM KARAN ADVISER & INFORMATION CENTER QUALITY MANAGEMENT SYSTEM SYSTEM KARAN ADVISER & INFORMATION CENTER

QUALITY SYSTEM MANUAL

CQR-1. CONTRACTOR QUALITY REQUIREMENTS for CONSTRUCTION SERVICES Revision Date: 6/8/2015

City Auditor s Office 2017/18 Annual Audit Plan

á1058ñ ANALYTICAL INSTRUMENT QUALIFICATION

EUROPEAN COMMISSION DIRECTORATE-GENERAL FOR HUMANITARIAN AID AND CIVIL PROTECTION - ECHO

PROTECTED A. Follow-up on Internal Audit: MWAV ISSC Pre-publication copy not for external distribution Proposed Final January 2014 PROTECTED A

Key Considerations for Implementing Bodies

INFORMATION TECHNOLOGY PROCUREMENT

NR CHECKLIST Rev. 1. QAM IMP References NBIC Part 3, 1.8 Y N Y N a. Organization. Company Name/Certificate Number: Page 1 of 26

CITY OF JOLIET, ILLINOIS FINAL

Project Progress Report #2

General Accreditation Guidance. ISO/IEC 17025:2017 Gap analysis. April 2018

REPORT 2015/184 INTERNAL AUDIT DIVISION. Audit of rations management in the United Nations Support Office in Somalia

Audit Recommendations Status Report as of December 31, 2018

Scientific Working Group on Digital Evidence

Regulatory Overview Annex 11 and Part 11. Sion Wyn Conformity +[44] (0)

IT Risk Management: IT Audit

Five Star Environmental Audit Specification August 2016

MANUAL QUALITY CONTROL & QUALITY ASSURANCE

CAPITAL AVIONICS, INC. Quality Manual

Establishing Free and Open Source Software Compliance Programs: Challenges and Solutions. By Ibrahim Haddad, Ph.D.

CORPORATE MANUAL OF INTEGRATED MANAGEMENT SYSTEM

(5) May carry out maintenance of the database (6) May carry out monitoring and organizing daily uploading of data and automatic issue of reports

SHIFT ROUTINES AND OPERATING PRACTICES. 2.1 DOE , Conduct of Operations Requirements for DOE Facilities

Product Manufacturing Should YOU Manufacture Your Product? 5 Questions to Ask

A02 Assessment Rating Guide Revision 2.9 August 21, 2016

Program Lifecycle Methodology Version 1.7

Transcription:

Check Yes or No or N/A (where not applicable). Where a No is indicated, some action may be required to rectify the situation. Cross-references (e.g., See FN 1.01) point to the relevant policy in the First Reference Internal Control Library. FN = Finance & Accounting PolicyPro, Volume 1; GV = Finance & Accounting Policy- Pro, Volume 2; OP = OMPP policies in FAPP electronic version; IT = Information Technology PolicyPro; NP = Not-for-Profit PolicyPro. Identify automated solutions AI1 Are identified application needs evaluated in the context of business and IT objectives and plans? See IT 3.01, AI2 AI3 AI4 AI5 AI6 AI7 AI8 AI9 Do system or business process owners approve the initial definition of the application? See IT 3.01, Have senior management and IT management approved the initial definition of the application and given approval to proceed to the next stage? See IT 3.01, Are decisions to proceed to the next phase of development or acquisition taken at key, predetermined checkpoints? See IT 3.01, 3.02, Have comprehensive requirements been established, including user-functionality and data requirements? See IT 3.01, Has there been extensive user and owner involvement in the definition of requirements? See IT 3.01, Have you ensured that data requirements and the impact on the current data architecture is taken into account in the definition of requirements? See IT 3.01, Have you ensured that system integration and interface issues and the impact on users and other stakeholders has been considered in the definition of requirements? See IT 3.01, 3.02, Have you identified the hardware and systems software requirements of the proposed system? See IT 3.01, 2008-2010 First Reference Inc. All Rights Reserved. 1

AI10 AI11 AI12 AI13 AI14 Have you estimated the staff required to support the proposed system? See IT 3.01, 3.02, Have you estimated the benefits and savings of the proposed system, and done a cost/benefit analysis? See IT 3.01, Have you assessed the business and technology risks of the proposed system? See IT 3.01, Have you carefully considered and evaluated alternative solutions? See IT 3.01, Have you obtained approval on the best solution from all key stakeholders? See IT 3.01, Acquire and maintain application software AI15 Have you defined procedures to ensure that detailed design specs refer back to initial design, user requirements and risk analysis? See AI16 AI17 AI18 AI19 AI20 Do you require sign-off on the detailed design from the computer operations and software support service providers, confirming that requirements and risks have been addressed? See Do you establish standards for legal contracts associated with system acquisitions? See Do you establish standards to ensure that application programming is efficient and effective, requiring that existing code be reused where possible and that appropriate programming tools and techniques are employed? See Do you use RFPs to provide programming and systems standards to vendors? See IT2.02, 3.02 Do you review code received from vendors for compliance with standards? See 2008-2010 First Reference Inc. All Rights Reserved. 2

AI21 AI22 AI23 AI24 AI25 Do you protect your intellectual property by requiring that outsourced contracts include penalty clauses covering proprietary systems logic, processes and data? See Do you consider the ongoing maintenance of information systems by specifying user-maintainable tables, standard text formats, modularized code and high-quality documentation? See Do you have a policy that mandates that application systems design includes an assessment of business risks and controls? See IT1.03, 3.02 Do you have a policy requiring the application control design to be approved by the business system owner? See IT1.03, 2.02, 3.02 Does application security and controls design comply with your organization s overall security architecture? See IT1.03, 2.02, 3.02 Acquire and maintain technology infrastructure AI26 Have measurable objectives and performance targets been established for systems development and acquisition? Have targets been communicated to those responsible for meeting them? See, 12.01 AI27 AI28 AI29 For developed and acquired systems, have you prepared an implementation plan that sets out resource needs, dependencies, as well as fallback, recovery, conversion, and verification steps? See Has the implementation plan been reviewed and signed off by implementing management and the system owner? See IT1.03, 2.04, 3.01, Are processes in place to maintain effective control over conversion data, including a data conversion plan, verification of conversion data, and detailed verification of the results. See IT2.04, 3.01, 2008-2010 First Reference Inc. All Rights Reserved. 3

Enable operation and use AI30 Have all personnel involved in systems acquisition and development activities received adequate training and supervision? See IT2.02, 3.02, 12.01 AI31 AI32 AI33 Are implementation responsibilities assigned to appropriate personnel via position descriptions, mandates and project roles and responsibilities documents? See IT1.03, 2.04, 3.01,, 12.01 Have you developed manual procedures for the operation and control of the system in conjunction with development of the application? See IT2.04, 3.01, Have you written adequate operating documentation for information systems processing? Has it been reviewed and approved? See IT2.04, 3.01, Procure IT resources AI34 Are computer operations line management personnel required to sign-off on all implementations? See AI35 When designing, staffing and scheduling IT conversions, have implementation and business risks been identified and considered? See Install and accredit solutions and changes AI36 Have developed and acquired systems been adequately tested before implementation? Did you prepare and approve a test strategy and test plans? See AI37 Have you completed a formal acceptance process with appropriate system owners to confirm that testing has been satisfactorily completed and user requirements have been met? See 2008-2010 First Reference Inc. All Rights Reserved. 4

AI38 AI39 Have you received final approval after implementation but before operation from appropriate user management, including sign-off that implementation has been successful. See Have you conducted a post-implementation review to confirm that the objectives for implementing the system have been met? See Manage changes AI40 Have you assigned specific responsibilities and authorization requirements for change management? See IT 6.01, 1.03, 3.02 AI41 AI42 AI43 AI44 AI45 AI46 AI47 Do you ensure that all anticipated changes are in accordance with your IT strategic plan? See IT1.01, 1.02, 1.03, 3.02, 6.01 Do you establish and enforce standards to ensure that there is appropriate segregation of duties between the different roles involved in changes to IT resources? See IT1.03, 6.01,1.03 Do you have independent quality assurance and/or audit processes to review change management activities, and assess the security and control implications of the change prior to implementation? See IT6.01, 1.03, 7.06 Where changes are to be applied to multiple environments with different levels of risk, do you implement changes in lower-risk environments first? See IT6.01, 1.03 Do your system software change management procedures include system software maintenance activities? See IT3.02, 1.03 Do you ensure that system software maintenance is monitored and approved by technically qualified independent resources? See IT3.02, 1.03, 7.06 Do you periodically report on the content of key parameters and key processes within security mechanisms, to allow their contents to be verified? See IT5.01, 7.02, 8.02, 9.03, 9.04 2008-2010 First Reference Inc. All Rights Reserved. 5