CISA Flashcards
(131 cards)
Common Control Considerations
What is Common Control Consideration 1?
A. Central Development and Implementation of Controls
B. This means that the rules or procedures for keeping our systems safe and working well are made by the main group in charge and have to be followed exactly the same way by everyone, no matter where they work. This means there’s a central place where we watch over things like who accesses what, how systems are managed, and if everything is secure.
C. Example 1: Let’s say the CIO make a rule about how we handle databases like Oracle, SQL, Progress, and DB2. They say everyone in every office has to follow this rule exactly as it is, without changing anything. So, whether you’re in New York, London, or Tokyo, everyone has to manage those databases in the same exact way according to the rule from headquarters.
D. All are exhibits of Common Control Consideration 1
D. All are exhibits of Common Control Consideration 1
Common Control Consideration 1:
A: Centeral Development and Implementation of Controls
This means that the rules or procedures for keeping our systems safe and working well are made by the main group in charge and have to be followed exactly the same way by everyone, no matter where they work. This means there’s a central place where we watch over things like who accesses what, how systems are managed, and if everything is secure.
Example 1: Let’s say the CIO make a rule about how we handle databases like Oracle, SQL, Progress, and DB2. They say everyone in every office has to follow this rule exactly as it is, without changing anything. So, whether you’re in New York, London, or Tokyo, everyone has to manage those databases in the same exact way according to the rule from headquarters.
What is Common Control Consideration 2?
A. Consideration 2: Consistency in Control Performance and Monitoring
B. This means that the people who check if our systems are working well and secure should have similar jobs and skills, no matter where they work in the company.
C. Example: Let’s say there’s a rule in place that says we need to regularly check if our computer systems are secure. The people responsible for doing this check should have similar roles and skills, whether they’re working in the main office, a branch office, or a warehouse. For instance, if we have IT specialists checking security in one office, we should have similar IT specialists doing the same job in all other locations. This ensures that the checks are done consistently and effectively everywhere in the company.
D. All are exhibits of Common Control Consideration 2- Consistency in Control Performance and Monitoring
D. All are exhibits of Common Control Consideration 2- Consistency in Control Performance and Monitoring
Consideration 2: Consistency in Control Performance and Monitoring
This means that the people who check if our systems are working well and secure should have similar jobs and skills, no matter where they work in the company.
Example: Let’s say there’s a rule in place that says we need to regularly check if our computer systems are secure. The people responsible for doing this check should have similar roles and skills, whether they’re working in the main office, a branch office, or a warehouse. For instance, if we have IT specialists checking security in one office, we should have similar IT specialists doing the same job in all other locations. This ensures that the checks are done consistently and effectively everywhere in the company.
What is Common Control Consideration 3?
A. Consideration 3: Consistency in Automated Control Configuration
B. Explanation: If we use computer programs or systems to manage certain tasks automatically, do we set up these programs the same way across all parts of the company?
C. Example: Imagine we have a program that automatically checks if people are using strong passwords to access our systems. If this program is used in different offices or departments, it should be set up in exactly the same way in each place. For instance, if we set the program to require passwords with a minimum of 8 characters and at least one number in the main office, the same rules should apply in all other locations. This ensures that the automated checks are consistent and reliable throughout the company.
D. All are exhibits of Common Control Consideration 2- Consistency in Control Performance and Monitoring
Consideration 3: Consistency in Automated Control Configuration
Explanation: If we use computer programs or systems to manage certain tasks automatically, do we set up these programs the same way across all parts of the company?
Example: Imagine we have a program that automatically checks if people are using strong passwords to access our systems. If this program is used in different offices or departments, it should be set up in exactly the same way in each place. For instance, if we set the program to require passwords with a minimum of 8 characters and at least one number in the main office, the same rules should apply in all other locations. This ensures that the automated checks are consistent and reliable throughout the company.
What is Common Control Consideration 4?
A. Consideration 4: Consistency in Automated Control Configuration
B. Explanation: If we’re using information from our computer systems to check if everything is running smoothly, are these systems the same in all parts of the company?
C. Example: Let’s say we have a system that keeps track of who accesses certain files on our company network. If we’re using this system to make sure only authorized people are accessing sensitive information, we need to ensure that the system is the same across all offices and departments. For instance, if one office uses a high-security access system while another office has a less secure one, the data we gather might not be reliable. So, we need to make sure that the systems generating this data are consistent everywhere to get accurate results and maintain security standards across the company.
D. All the Above
Consideration 4: Consistency in Automated Control Configuration
Explanation: If we’re using information from our computer systems to check if everything is running smoothly, are these systems the same in all parts of the company?
Example: Let’s say we have a system that keeps track of who accesses certain files on our company network. If we’re using this system to make sure only authorized people are accessing sensitive information, we need to ensure that the system is the same across all offices and departments. For instance, if one office uses a high-security access system while another office has a less secure one, the data we gather might not be reliable. So, we need to make sure that the systems generating this data are consistent everywhere to get accurate results and maintain security standards across the company.
What is Common Control Consideration 5?
A. Consideration Central Monitoring of Controls
B. Explanation: This means keeping an eye on important rules or procedures from one central place to ensure they’re followed consistently throughout the company.
C. Example: Imagine there’s a rule that says we need to regularly update our computer software to keep it secure. Instead of each department managing this on their own, there’s a central team responsible for making sure everyone follows the rule. They monitor updates across all departments to ensure nobody falls behind or skips updates, thus maintaining security across the organization.
D. All the Above
D. All the Above
Consideration 5: Central Monitoring of Controls
Explanation: This means keeping an eye on important rules or procedures from one central place to ensure they’re followed consistently throughout the company.
Example: Imagine there’s a rule that says we need to regularly update our computer software to keep it secure. Instead of each department managing this on their own, there’s a central team responsible for making sure everyone follows the rule. They monitor updates across all departments to ensure nobody falls behind or skips updates, thus maintaining security across the organization.
________ we’re basically looking at how your company manages any changes or updates to its computer systems. This can include: Application development, System development, and program change management.
To a business client, we’re focusing on how your company handles the development and management of software programs, overall computer systems, and changes within those programs. We want to make sure that these changes are managed effectively to minimize risks and ensure that your systems continue to work smoothly and securely.
A. System Change Control
B. IT Audit
C. Change Management
D. Physical Security
A. System Change Control
“system change control,” we’re basically looking at how your company manages any changes or updates to its computer systems.
To a business client, we’re focusing on how your company handles the development and management of software programs, overall computer systems, and changes within those programs. We want to make sure that these changes are managed effectively to minimize risks and ensure that your systems continue to work smoothly and securely.
_____ This refers to creating or updating software programs that your company uses for different tasks. For example, if you develop a new app for managing inventory or customer orders, that’s part of application development.
A. Application Development
B. IT Audit
C. Change Management
D. Physical Security
Application Development: This refers to creating or updating software programs that your company uses for different tasks. For example, if you develop a new app for managing inventory or customer orders, that’s part of application development.
Example: Let’s say your company decides to create a new mobile app for customers to place orders. The process of designing, coding, testing, and deploying this app is part of application development.
Another example could be updating your company’s website to include new features, such as an online chat support system. The team responsible for designing and implementing these new features is engaged in application development.
_____ This involves building or modifying the overall computer systems that your company relies on. It could include things like setting up new servers, upgrading network infrastructure, or integrating different software systems to work together smoothly.
A. Application Development
B. System Development
C. Change Management
D. Physical Security
System Development: This involves building or modifying the overall computer systems that your company relies on. It could include things like setting up new servers, upgrading network infrastructure, or integrating different software systems to work together smoothly.
Example: Your company decides to upgrade its entire network infrastructure to support higher bandwidth and better security. This involves installing new servers, routers, and switches, as well as configuring them to work together efficiently. This comprehensive upgrade process is part of system development.
Another example could be implementing a new Enterprise Resource Planning (ERP) system to streamline business processes across various departments. The planning, installation, customization, and integration of this new system into your company’s existing infrastructure constitute system development.
_______ This is about how changes are managed within the programs or software applications themselves. For instance, if you need to fix a bug in your accounting software or add new features to your customer relationship management system, that falls under program change management.
A. Application Development
B. System Development
C. Program Change Management
D. Physical Security
Program Change Management: This is about how changes are managed within the programs or software applications themselves. For instance, if you need to fix a bug in your accounting software or add new features to your customer relationship management system, that falls under program change management.
Example: Suppose there’s a bug in your company’s accounting software that causes incorrect calculations in financial reports. The process of identifying, fixing, and testing this bug, as well as deploying the updated version of the software, falls under program change management.
Another example could be adding new features to your company’s Customer Relationship Management (CRM) software based on user feedback. Managing the entire lifecycle of these changes, from requirements gathering to deployment, is part of program change management.
What is the Risk of Control (RAIT) of (LA4)- Provisioning?
A. Production systems, programs, and/or job results in inaccurate, incomplete, or unauthorized processing of data
B. Uses have access privliges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.
C. Data cnversion from legacy systems indroduces errors
D, none of above
(LA4)- Provisioning-
The risk is:
B. Users have access privileges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.
REASONING: mitigate the risks associated with excessive access privileges, improper segregation of duties, insider threats, compliance violations, and data loss or theft. By evaluating provisioning processes and access rights management, auditors help ensure that organizations maintain a secure and compliant environment for managing user access to systems and data.
What is the Control Description of (LA4)- Default Accounts on Provisioning?
A.User have access privileges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.
B. Management approves the nature and extent of user-access privileges for new and modified user access, including standard application profiles roles, critical financial reporting transactions, and segregation of duties.
C. User access is periodically reviewed
D. Privileged level access is authorized and appropriately restriced.
B. Management approves the nature and extent of user-access privileges for new and modified user access, including standard application profiles roles, critical financial reporting transactions, and segregation of duties.
Control Description of (LA4)- Default Accounts of Provisioning
Management approves the nature and extent of user-access privileges for new and modified user access, including standard application profiles roles, critical financial reporting transactions, and segregation of duties.
What is the Control Description of (LA3)- PRIVILEGED ACCESS?
A.User have access privileges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.
B. Management approves the nature and extent of user-access privileges for new and modified user access, including standard application profiles roles, critical financial reporting transactions, and segregation of duties.
C. User access is periodically reviewed
D. Privileged level access is authorized and appropriately restricted.
The Control Description of (LA3)- PRIVILEGED ACCESS
D. Privileged level access is authorized and appropriately restricted.
What is the Control Description of (LA2)- Passwords?
A.User have access privileges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.
B. Access is authenticated through unique user IDs and passwords or other methods as a mechanism for validating that users are authorized to gain access to the system. Password parameters meet company and/or industry standards (e.g. password minimum length and complexity, expiration, account lockout).
Obtain evidence of authentication and security configurations to evaluate if they are implemented consistent with the control design.
C. User access is periodically reviewed
D. Privileged level access is authorized and appropriately restricted.
Control Description of (LA2)- Passwords
B. Access is authenticated through unique user IDs and passwords or other methods as a mechanism for validating that users are authorized to gain access to the system. Password parameters meet company and/or industry standards (e.g. password minimum length and complexity, expiration, account lockout).
Obtain evidence of authentication and security configurations to evaluate if they are implemented consistent with the control design.
What is the Risk of Control (RAIT) of (LA2)- Passwords?
A. Production systems, programs, and/or job results in inaccurate, incomplete, or unauthorized processing of data
B. Uses have access privliges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.
C. Data cnversion from legacy systems indroduces errors
D, Systems are not adequately configured or updated to restrict system access to properly authorized and appropriate users.
Risk of Control (RAIT) of (LA2)- Passwords
D. Systems are not adequately configured or updated to restrict system access to properly authorized and appropriate users.
REASONING: mitigate the risks associated with unauthorized access, data breaches, insider threats, data integrity issues, compliance violations, and reputation damage. By evaluating password policies, enforcement mechanisms, and access controls, auditors help ensure that organizations maintain a secure and compliant IT environment.
What is the Risk of Control (RAIT) of (MC1)- Application Change Management?
A. Production systems, programs, and/or job results in inaccurate, incomplete, or unauthorized processing of data
B. Uses have access privliges beyond those necessary to perform their assigned duties, which may create improper segregation of duties.
C. Inappropriate changes are made to application systems or programs that contain relevant automated controls (i.e. configurable settings, automated algorithms, automated calculations, ad automated data extractions), and/or report logic
D, Systems are not adequately configured or updated to restrict system access to properly authorized and appropriate users.
Risk of Control (RAIT) of (MC1)- Application Change Management
C. Inappropriate changes are made to application systems or programs that contain relevant automated controls (i.e. configurable settings, automated algorithms, automated calculations, ad automated data extractions), and/or report logic
REASONING: help safeguard data integrity, operational continuity, and regulatory compliance within the organization.
What is the Risk of Control (RAIT) of (OP2)- Job Scheduler Access?
A. Production systems, programs, and/or job results in inaccurate, incomplete, or unauthorized processing of data
B. Production systems, programs, and/or jobs result in inaccurate, incomplete, or unauthorized processing of data.
C. Inappropriate changes are made to application systems or programs that contain relevant automated controls (i.e. configurable settings, automated algorithms, automated calculations, ad automated data extractions), and/or report logic
D, Systems are not adequately configured or updated to restrict system access to properly authorized and appropriate users.
Risk of Control (RAIT) of (OP2)- Job Scheduler Access
B. Production systems, programs, and/or jobs result in inaccurate, incomplete, or unauthorized processing of data.
REASONING: verifying the effectiveness of monitoring mechanisms in controlling access, detecting anomalies, and ensuring the accurate and secure execution of scheduled jobs. It helps in safeguarding data integrity, regulatory compliance, and overall IT risk management within the organization.
What is the Risk of Control (RAIT) of (MC6)- Job Data Conversions?
A. Production systems, programs, and/or job results in inaccurate, incomplete, or unauthorized processing of data
B. Production systems, programs, and/or jobs result in inaccurate, incomplete, or unauthorized processing of data.
C. Data converted from legacy systems or previous versions introduces data errors if the conversion transfers incomplete, redundant, obsolete, or inaccurate data.
D, Systems are not adequately configured or updated to restrict system access to properly authorized and appropriate users.
Risk of Control (RAIT) of (MC6)- Job Data Conversions
C. Data converted from legacy systems or previous versions introduces data errors if the conversion transfers incomplete, redundant, obsolete, or inaccurate data.
REASONING: Job Data Conversions is essential for verifying the effectiveness of monitoring systems in ensuring the accuracy, completeness, and integrity of converted data. It helps in detecting and correcting errors promptly, thereby safeguarding business operations, data reliability, and regulatory compliance.
Question: What is the Control Description of (OP3)-Job Monitoring?
A) Ensuring all employees have access to necessary job resources.
B) Regularly updating software applications to the latest versions.
C) Checking the temperature of the server room to prevent overheating.
D) Critical systems, programs, and/or jobs are monitored, and processing errors are corrected to ensure successful completion.
Control Description of (OP3)-Job Monitoring
D) Critical systems, programs, and/or jobs are monitored, and processing errors are corrected to ensure successful completion.
REASONING: Job Monitoring in IT audit is essential for verifying the effectiveness of systems and processes in detecting, correcting, and preventing errors during data processing. It ensures the reliability, integrity, and continuity of critical operations within the organization, contributing to overall business resilience and compliance with regulatory requirements.
Question: What is the Control Description of (MC1)-Application Change Management?
A) Ensuring employees attend regular training sessions on new software updates.
B) Allowing any employee to make changes to applications as needed.
C) Application changes are appropriately tested and approved before moved into the production environment.
D) Keeping a log of office supply purchases for inventory tracking.
The Control Description of (MC1)-Application Change Management
C) Application changes are appropriately tested and approved before moved into the production environment.
Reasoning: Change Management ensures that any changes made to the company’s software applications are properly vetted and verified before being implemented in the live environment, minimizing the risk of disruptions or errors that could impact operations.
What are risks for (MC1)-Application Change Management
A. Inappropriate Changes.
B. Improper Segregation of Duties
C. Data Integrity Compromise
D. All of the Above
D. All of the Above
risks for (MC1)-Application Change Management
-Inappropriate changes
-improper segregation of duties
-data integrity compromise
What is the risk for Provisioning Accounts (LA4)?
A. Excessive access privileges
B. Improper segregation of duties
C. Insider threats
D. Compliance Violations
E. Data Loss or Theft
F. All the Above
G. Only A through C.
F. All the Above
risk for Provisioning Accounts (LA4)
-Excessive access privileges
-Improper segreation of duties
-insider threats
-compliance violations
-data loss or theft
What is the risk for Passwords (LA2)?
A. Unauthorized access
B. Data Breaches
C. Insider Threats
D. Data Integrity Issues
E. Compliance Violations
F. Reputational Damage
G. All the Above
H. Only A, B, & E
G. All the Above
risk for Passwords (LA2)
-Unauthorized access
- Data Breaches
- Insider Threats
- Data Integrity Issues
- Compliance Violations
- Reputational Damage
_________ an account that is used by multiple individuals to access systems or data
a. shared account
b. service account
a. shared account
shared account that is used by multiple individuals to access systems or data
-WiFi
-Classrooms
-Computer Labs
-Additionals shared applications that require profile specific settings are all examples of:
a. shared account
b. service account
a. shared account
Shared account example include:
-WiFi
-Classrooms
-Computer Labs
-Additionals shared applications