cobit presentation

35
2007 IT Governance Institute. All rights reserved. www.itgi.org 1 IT Governance Using COBIT ® and Val IT™: Presentation, 2 nd Edition The explanation of the COBIT ® framework in this PowerPoint presentation is designed for use by professors whose classes cover topics such as: Information systems management Information security management Auditing Information systems auditing Accounting information systems

Upload: fran-rodriguez

Post on 22-Jan-2015

1.486 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

  • 1. The explanation of the COBIT framework in this PowerPoint presentation is designed for use by professors whose classes cover topics such as: Information systems management Information security management Auditing Information systems auditing Accounting information systemsIT Governance Using C OBI T andVal IT: Presentation, 2 nd Edition 2007 IT Governance Institute. All rights reserved. www.itgi.org 1

2. Disclaimer The IT Governance InstituteTM (ITGITM) and the author of IT GovernanceUsing COBIT and Val IT TM: Presentation, 2nd Edition, have designedthe publication primarily as an educational resource for educators.ITGI, ISACA and the authors make no claim that use of this productwill assure a successful outcome. The publication should not beconsidered inclusive of all proper procedures and tests or exclusiveof other procedures and tests that are reasonably directed toobtaining the same results. In determining the propriety of anyspecific procedure or test, controls professionals should apply theirown professional judgement to the specific control circumstancespresented by the particular systems or IT environment. Note thispublication is an update of COBIT in Academia: COBIT PresentationPackage. 2007 IT Governance Institute. All rights reserved. www.itgi.org 2 3. Disclosure 2007 IT Governance Institute. All rights reserved. This publication is intended solely for academic use and shall not be used in any other manner (including for any commercial purpose). Reproductions of selections of this publication are permitted solely for the use described above and must include the following copyright notice and acknowledgement: Copyright 2007 IT Governance Institute. All rights reserved. Reprinted by permission. IT Governance Using COBIT and Val IT: Presentation, 2nd Edition, may not otherwise be used, copied or reproduced, in any form by any means (electronic, mechanical, photocopying, recording or otherwise), without the prior written permission of ITGI. Any modification, distribution, performance, display, transmission or storage, in any form by any means (electronic, mechanical, photocopying, recording or otherwise) of IT Governance Using COBIT and Val IT: Presentation, 2nd Edition, is strictly prohibited. No other right or permission is granted with respect to this work. IT Governance Using COBIT and Val IT: Presentation, 2nd Edition ISBN 978-1-60420-029-4 2007 IT Governance Institute. All rights reserved. www.itgi.org3 4. Acknowledgements Researcher Ed ODonnell, University of Kansas, USA Contributors Roger Stephen Debreceny, Ph.D., FCPA, University of Hawaii, USA Steven DeHaes, University of Antwerp Management School, Belgium Erik Guldentops, CISA, CISM, University of Antwerp Management School, Belgium Robert Parker, CISA, CA, CMC, FCA, Canada V. Sambamurthy, Ph.D., Michigan State University, USA Scott Lee Summers, Ph.D., Brigham Young University, USA John Thorp, The Thorp Network, Canada Wim Van Grembergen, Ph.D., University of Antwerp Management School, Belgium Ramesh Venkataraman, Ph.D., Indiana University, USA 2007 IT Governance Institute. All rights reserved. www.itgi.org 4 5. This presentationincludes... Driving forces for IT governance andControl Objectives for Information andrelated Technology (COBIT) An introduction to: The COBIT framework COBIT supporting materials An explanation of where COBIT fits withother frameworks and standards 2007 IT Governance Institute. All rights reserved. www.itgi.org 5 6. The Governance Environment 2007 IT Governance Institute. All rights reserved. www.itgi.org 6 7. Forces Driving IT GovernanceBusiness/ITComplianceAlignmentROI ProjectExecutionSecurity 2007 IT Governance Institute. All rights reserved. www.itgi.org 7 8. IT Governance Needs a Management Framework Vgic t D alu t e en eli eDriving Forces a m tr nS ig ve ryAl Map Onto theITGovernance Perf ureme Perf ureme entIT GovernanceMeaMea Dom ainsagem Man isk orm ormss Domains R ance t ance t Resource n nManagement 2007 IT Governance Institute. All rights reserved. www.itgi.org8 9. C OBI T 4.1The IT Governance FrameworkInternationally accepted good CobiTC OBI TpracticesManagement-oriented best practices Supported by tools and repository for trainingFreely available atIT Processeswww.itgi.orgIT Management Processes Sharing knowledge and IT Governance Processesleveraging expert volunteersContinually evolvingThe only IT managementMaintained by reputable not- and control frameworkfor-profit organisation that covers the end-to-end Maps 100 percent to COSO IT life cycleMaps strongly to all majorrelated standards 2007 IT Governance Institute. All rights reserved. www.itgi.org 9 10. C OBI T 4.1The ITGovernance FrameworkIs a reference, set of best practices,not an off-the-shelf cureEnterprises still to need to analysetheir control requirements andcustomise based on: Value driversCobiT C OBI T Risk profile IT infrastructure, organisation best practices and project portfolio repository for IT ProcessesIT Management Processes IT Governance Processes 2007 IT Governance Institute. All rights reserved. www.itgi.org 10 11. Key Driving Forces forC OBI THow IT is What theThe resources The resourcesHow IT is What themade available to organised to organised tostakeholdersstakeholders made available torespond to theBusiness expect from ITand built up byIT and built up byITrespond to theRequirementsexpect from ITrequirements ITrequirements ProcessesITResources IT Business ITResources RequirementsProcesses Data Plan and Effectiveness Organise Application Efficiencysystems Aquire and Confidentiality Implement Technology Integrity Deliver and Facilities Support Availability Compliance People Monitor and Evaluate Informationreliability 2007 IT Governance Institute. All rights reserved. www.itgi.org11 12. How Does C OBI T Link to ITGovernance?Direction and RequirementsResourcingControl GoalsResponsibilities ObjectivesBusinessITGovernance Information theInformationbusiness needs toexecutives and boardachieve its objectives need to exercise theirresponsibilitiesIT Governance 2007 IT Governance Institute. All rights reserved. www.itgi.org12 13. An Overview of C OBI T 2007 IT Governance Institute. All rights reserved. www.itgi.org 13 14. Process OrientationBusinessRequirementsITProcesses IT Resources Natural grouping of processes, often matching an organisationalDomainsdomain of responsibility A series of joined activities with natural control breaks Processes Actions needed to achieve a measurable resultactivities have a life cycle, whereas tasks areActivities discreteor Tasks 2007 IT Governance Institute. All rights reserved. www.itgi.org 14 15. Process Orientation Business RequirementsIT Domains IT Processes Plan andITResourcesOrganiseIT Processes Acquire and IT strategyImplement Computer operations Deliver and Incident handlingActivitiesSupport Acceptance testing Record new problem. Monitor and Change management Analyse.EvaluateContingency planning Propose solution.Natural grouping of Problem management Monitor solution.processes, often matching Record known problem.A series of joined activitiesan organisational domain ofwith natural (control) breaks Etc. responsibilityActions needed to achieve ameasurable resultactivitieshave a life cycle, whereas tasksare discrete 2007 IT Governance Institute. All rights reserved. www.itgi.org 15 16. Process OrientationPlan and OrganiseDescription This domain covers strategy and tactics, and concerns the identification of the way IT can best contribute to the achievement of the business objectives. The realisation of the strategic vision needs to be planned, communicated and managed for different perspectives. Proper organisation and technological infrastructure must be put in place.TopicsBusinesss n a mo D Strategy and tacticsRequirements IT Vision plannedProcessesIT Organisation and infrastructureResourcesQuestions Are IT and the business strategy aligned? i Is the enterprise achieving optimum use of its resources? Does everyone in the organisation understand the IT objectives? Are IT risks understood and being managed? Is the quality of IT systems appropriate for business needs? 2007 IT Governance Institute. All rights reserved. www.itgi.org16 17. Waterfall ModelThe control ofIT Processes that satisfy Business Requirements is enabled by Control Statements consideringControl Practices4 Domains - 34 Processes - 210 Control Objectives 2007 IT Governance Institute. All rights reserved. www.itgi.org 17 18. C OBI T Business Objectives CriteriaFramework EffectivenessEfficiencyConfidentiality Integrity Availability Compliance Reliability IT Resources Data Application systems TechnologyMonitor and Facilities People EvaluatePlan and IT LifeOrganiseDeliver andCycle SupportAcquire andImplement 2007 IT Governance Institute. All rights reserved. www.itgi.org18 19. C OBI T Processes PO1Define an IT strategic plan. PO2Define the information architecture. PO3Determine technological direction. PO4Define the IT processes, organisation and relationships. Plan andPO5Manage the IT investment. OrganisePO6Communicate management aims and direction. PO7Manage IT human resources. PO8Manage quality. PO9Assess and manage IT risks. PO10 Manage projects. AI1Identify automated solutions. AI2Acquire and maintain application software. AI3Acquire and maintain technology infrastructure.Acquire and AI4Enable operation and use. Implement AI5Procure IT resources. AI6Manage changes. AI7Install and accredit solutions and changes. 2007 IT Governance Institute. All rights reserved. www.itgi.org19 20. C OBI T ProcessesDS1 Define and manage service levels.DS2 Manage third-party services.DS3 Manage performance and capacity.DS4 Ensure continuous service.DS5 Ensure systems security.DS6 Identify and allocate costs.Deliver andDS7 Educate and train users. SupportDS8 Manage service desk and incidents.DS9 Manage the configuration.DS10Manage problems.DS11Manage data.DS12Manage the physical environment.DS13Manage operations.ME1 Monitor and evaluate IT performance. Monitor andME2 Monitor and evaluate internal control.EvaluateME3 Ensure compliance with external requirements.ME4 Provide IT governance. 2007 IT Governance Institute. All rights reserved. www.itgi.org 20 21. Processes in the Student Book The following processes are included in the Student Book, 2nd Edition: DS2 Manage third-party services. PO9 Assess and manage IT risks. AI2 Acquire and maintain application software. DS5 Ensure systems security. ME2 Monitor and evaluate internal control. DS2 is used as an example in the Student Book, 2nd Edition, and the following slides use DS2 to illustrate the related COBIT information for a process. 2007 IT Governance Institute. All rights reserved. www.itgi.org 21 22. Navigating in C OBI T DS2 Process LevelInformationCriteriaWaterfall IT Governance ITResources 2007 IT Governance Institute. All rights reserved. www.itgi.org 22 23. DS2 Waterfall 2007 IT Governance Institute. All rights reserved. www.itgi.org 23 24. DS2 ManagementGuidelines 2007 IT Governance Institute. All rights reserved. www.itgi.org 24 25. DS2 Management Guidelinescont. 2007 IT Governance Institute. All rights reserved. www.itgi.org 25 26. DS2 Maturity Model DS2 Manage Third-party Services Management of the process Manage third-party services that satisfies the business requirement for IT of providing satisfactory third-party services whilst being transparent about benefits, costs and risks is: 0 Non-existent when Responsibilities and accountabilities are not defined. There are no formal policies and procedures regarding contracting with third parties. Third-party services are neither approved nor reviewed by management. There are no measurement activities and no reporting by third parties. In the absence of a contractual obligation for reporting, senior management is not aware of the quality of the service delivered. 1 Initial/Ad Hoc when Management is aware of the need to have documented policies and procedures for third-party management, including signed contracts. There are no standard terms of agreement with service providers. Measurement of the services provided is informal and reactive. Practices are dependent on the experience (e.g., on demand) of the individual and the supplier. 2 Repeatable but Intuitive when The process for overseeing third-party service providers, associated risks and the delivery of services is informal. A signed, pro forma contract is used with standard vendor terms and conditions (e.g., the description of services to be provided). Reports on the services provided are available, but do not support business objectives. 2007 IT Governance Institute. All rights reserved. www.itgi.org26 27. DS2 Maturity Modelcont.3 Defined whenWell-documented procedures are in place to govern third-party services, with clear processes for vetting andnegotiating with vendors. When an agreement for the provision of services is made, the relationship with the thirdparty is purely a contractual one. The nature of the services to be provided is detailed in the contract and includeslegal, operational and control requirements. The responsibility for oversight of third-party services is assigned.Contractual terms are based on standardised templates. The business risk associated with the third-party services isassessed and reported.4 Managed and Measurable whenFormal and standardised criteria are established for defining the terms of engagement, including scope of work,services/deliverables to be provided, assumptions, schedule, costs, billing arrangements and responsibilities.Responsibilities for contract and vendor management are assigned. Vendor qualifications, risks and capabilities areverified on a continual basis. Service requirements are defined and linked to business objectives. A process exists toreview service performance against contractual terms, providing input to assess current and future third-partyservices. Transfer pricing models are used in the procurement process. All parties involved are aware of service, costand milestone expectations. Agreed-upon goals and metrics for the oversight of service providers exist.5 Optimised whenContracts signed with third parties are reviewed periodically at predefined intervals. The responsibility for managingsuppliers and the quality of the services provided is assigned. Evidence of contract compliance to operational, legaland control provisions is monitored, and corrective action is enforced. The third party is subject to independentperiodic review, and feedback on performance is provided and used to improve service delivery. Measurements vary inresponse to changing business conditions. Measures support early detection of potential problems with third-partyservices. Comprehensive, defined reporting of service level achievement is linked to the third-party compensation.Management adjusts the process of third-party service acquisition and monitoring based on the measurers. 2007 IT Governance Institute. All rights reserved. www.itgi.org27 28. Control Practices COBIT Control Practices, 2nd Edition Detailed guidance on each of the control objectives Management-oriented From three to 12 control practices per control objective 2007 IT Governance Institute. All rights reserved. www.itgi.org 28 29. DS2 Control Practices 2007 IT Governance Institute. All rights reserved. www.itgi.org 29 30. DS2 Control Practices cont. 2007 IT Governance Institute. All rights reserved. www.itgi.org 30 31. IT Assurance GuideIT Assurance Guide: Using COBIT Detailed guidance to support assurancepractitioners in: Financial statement audit Internal audit Value for money Operational improvement Guidance on: How to leverage COBIT for assurance Detailed assurance testing steps 2007 IT Governance Institute. All rights reserved. www.itgi.org 31 32. DS2 Assurance Steps 2007 IT Governance Institute. All rights reserved. www.itgi.org 32 33. DS2 Assurance Steps cont. 2007 IT Governance Institute. All rights reserved. www.itgi.org 33 34. Implementation Guide, 2 nd Edition IT Governance Implementation Guide, 2nd Edition Detailed, structured guidance to the implementation of IT governance Generic IT governance implementation guidance, not just COBIT 2007 IT Governance Institute. All rights reserved. www.itgi.org 34 35. Where C OBI T Typically SitsGovernanceCOS KingManagement Governance LayerOOBI TC LayerITIL IT 17799 CMM TickITLayerIT 2007 IT Governance Institute. All rights reserved. www.itgi.org 35