CISA - Domain 2 - Governance and Management of IT
CISA - Domain 2 - Governance and Management of IT
● To provide assurance to stakeholders that IT deployment is aligned with business vision, mission,
and objectives, top management may implement an IT governance framework. They will generally
include; Strategic alignment, Value delivery, Risk management, Resource management and
Performance measurement
Governance of Enterprise IT Governance integrates and institutionalizes good practices to ensure that
the enterprise's IT supports the business objectives. Factors leading to rise in importance of
governance of enterprise IT:
● Business managers and boards demanding a better return on investment
● Concern over high expenditure on IT
● The need to meet regulatory requirements for IT (SOX, Basel II, HIPAA etc.)
● The selection of service providers and the management of service outsourcing and acquisition
● Increasingly complex IT-related risks such as network security
● IT governance initiatives that include adoption of control frameworks and good practices to help
monitor and improve critical IT activities to increase business value and reduce business risk
● The need to optimize costs by following, where possible, standardized rather than specially
developed approaches
● The growing maturity and consequent acceptance of well-regarded frameworks
● The need for enterprises to assess how they are performing against generally accepted standards
and their peers (benchmarking)
Information security governance requires strategic direction and impetus. It requires commitment,
resources, and assigning responsibility for information security management as well as means for the
board to determine whether its intent has been met.
● Members of the board need to be aware of the organization’s information assets and their
criticality to ongoing business operations.
● This can be accomplished by periodically providing the board with the high-level results of
comprehensive risk assessments and Business Impact Analysis (BIA) and business dependency
assessments of information resources.
To learn about the Importance of Information Security, please refer to the e-learning material.
Executive ● Implements effective security management governance and defines the strategic security
management objectives of an organization.
Chief Information
Security Officer ● Ensures that good information security practices are carried out within the organization.
(CISO)
To learn about Governance of Enterprise IT and Management Frameworks, please refer to the e-learning material.
An IS Strategy articulates the enterprise’s long-term intention to use Information System to improve
its business processes based on the business requirements.
When formulating the IS strategy, an enterprise must consider:
● business objectives and the competitive environment;
● current and future technologies and the costs, risks and benefits they can bring to the business;
● the capability of the IT organization and technology to deliver current and future levels of service to the
business, and the extent of change and investment this might imply for the whole enterprise;
● cost of current IT and whether this provides sufficient value to the business; and
● the lessons learned from past failures and successes.
To learn about Best Practices for Governance of Enterprise IT, please refer to the e-learning material.
Risk management
Requires risk awareness by senior corporate officers,
understanding of the enterprise's appetite for risk and
compliance requirements, transparency of the
significant risks to the enterprise and embedding the
responsibilities into the organization.
Explanation:
● Organizations must clearly define organizational structures
● Responsibilities of major functions should be outline and documented to ensure proper
segregation of duties
● The CISA exam will not be testing specific job responsibilities as they may vary from one
organization to another. However, knowledge and understanding of those universally known is
needed. These include; business owners, information security and executive management
functions
● CISA exam may test separation of duties also called segregation of duties.
To learn about IS Roles and Responsibilities, please refer to the e-learning material.
Note: X indicates
incompatible
duties
Explanation:
● IT Strategies must be defined on business objectives
● IT Strategy should continue to address both emerging and developing business risks
IS Strategic planning relates to the long-term path an enterprise wants to take in leveraging
information technology for improving its business processes. Strategic planning should ensure that:
● The plans are aligned and consistent with organization goals and objectives.
● The enterprise’s requirements for IT systems and the IT organization’s capacity to deliver new
functionality through well-governed projects are considered.
The IS auditor should pay full attention to the importance of IT Strategic planning,
taking management control practices into consideration.
To learn about Information Security Governance, please refer to the e-learning material.
Information Security Management provides the lead role to ensure that organization’s information
and information processing resources under its control are properly protected.
The major component in establishing such a connection involves application of risk management
principles to assess risks to IT assets, mitigate these risks to an acceptable level.
To learn about Organization’s Technology Direction and IT Architecture (KS 2.5), please refer to the e-learning material.
Knowledge of relevant laws, regulations and industry standards affecting the organization.
Explanation:
● The complexity of IT and global connectivity has led to the enation of new regulatory
requirements.
● Globally recognized compliance requirements include protection of privacy and confidentiality of
personal data, Intellectual Property rights, and reliability of financial information.
In the CISA Exam, the IS Auditor must be aware of these globally recognized concepts;
however, knowledge of specific legislation and regulations will not be tested.
Review of these documents should be done to determine that they were created as management authorized
! and intended and they are currently and up to date.
Explanation:
● Effectiveness of IT Governance efforts is dependent on the quality management strategies and
policies in the IT Governance Framework.
● IT Strategies, policies and procedures and standards should be improved over time.
● IT Strategies, policies and procedures are effective when in use, when they meet the needs and
requirements of the organization.
● Quality management strategies measure and monitor the quality of those IT policies and
procedures based on a variety of standard frameworks.
The IS auditor should be aware of quality management. However, the CISA exam does
not test specifics on any ISO standards.
Explanation:
● Maturity and process improvement models help enterprises evaluate the current state of internal
controls in comparison to the desired state.
● Evaluating internal controls illustrates to senior management the effectiveness, compliance and
relevance of IT procedures, tools and processes in support of alignment with business needs.
The IS auditor should be aware of quality management. However, the CISA exam does
not test specifics on any ISO standards.
To learn about Maturity and Process Improvement Models, please refer to the e-learning material.
Explanation:
● Optimization techniques eliminate unnecessary activities thus increase efficiency.
● Process optimization requires evaluating current state vs. the desired state and identifying
activities to migrate to the desired state.
Performance optimization refers to the process of improving the productivity of information systems
to the highest level possible without unnecessary, additional investment in the IT infrastructure.
To learn about Performance Optimization—Methodologies and Tools, please refer to the e-learning material.
Explanation:
● IT resources are deployed to ensure service delivery and value.
● IT resource investment and allocation practices are essential to justify the investment of IT
resources to senior management.
● IT initiatives should be evaluated using techniques such as: cost/benefit analysis and planned and
forecasted resource consumption. This ensures that IT initiatives meet the needs of the
organization.
Enterprise face limited resources in terms of people and money that can be used to allocate to IT
investments. IT investments can provide financial benefits such as cost reduction and non financial
benefits such as improved customer satisfaction.
Information Technology value is determined by the relationship between what the organization will
pay and what it will receive. Key governance practices to increase the value of IT include:
● Evaluate value optimization
● Direct value optimization
● Monitor value optimization
Financial management is a critical element of all business function, in situation where user-pays
scheme (a form of chargeback) can improve application monitoring of IS expenses and available
resources.
Explanation:
● The increasing trend of outsourcing IT infrastructure to third-party service providers, it is vital to know the
latest trends in contracting strategies, processes and contract management practices.
● Outsourcing may also introduce risks.
The IS Auditor should be familiar with the Request for Proposal (RFP) process and know what needs to
be reviewed in an RFP. Issues that should be addressed will cover:
● Service levels
● Right to audit or third party audit reporting
● Software escrow
● Penalties for non-compliance
● Adherence to security policies and procedures
● Protection of customer information
● Contract change processes
● Contract termination and any associated penalties
To learn about Enterprise Risk Management (KS 2.12), please refer to the e-learning material.
The IT balanced scorecard (BSC) is a process management evaluation technique that can be applied to
the IT governance process in assessing IT functions and processes. A balanced scorecard measures:
● financial performance;
● customer/user satisfaction;
● internal/operational processes; and
● the ability to learn and innovate.
The scorecard aims to illustrate the relationship of financial, internal business processes, the
customer and learning and growth in determining a balanced score.
Organizational change management involves use of a defined and documented process to identify
and apply technology improvements.
● The IS department is the focal point for such changes by leading or facilitating change in the
organization.
● Once senior management support is obtained to move forward with the changes or projects, the IS
department can begin working with each functional area and their management to obtain support
for the changes.
● User feedback should be obtained throughout the project, including validation of the business
requirements and training on and testing of the new or changed functionality.
The various factors that should be considered when developing business continuity plans are:
● Pre-disaster readiness covering incident response management to address all relevant incidents
affecting business processes
● Procedures for declaring a disaster
● Circumstances under which a disaster should be declared
● Identification of persons responsible for the plan
● The step by step explanation of the recovery process
The security of offsite facility should be evaluated to ensure that it has proper physical and
environmental access controls. These include:
● Limit users access
● Use of raised floors, humidity controls and temperature controls
● Use of uninterruptible power supply, smoke detectors and fire extinguishers
● Equipment should be calibrated frequently
Knowledge of Business Impact Analysis (BIA) related to business continuity planning (BCP).
Explanation:
● The IS Auditor should determine whether BIA and BCP are suitably aligned.
● To be effective and efficient, BCP should be based on a well-documented BIA.
● BIA drives the focus of the BCP/ disaster recovery (DRP) process efforts of the organisation and helps in balancing
costs to be incurred with the corresponding benefits to the organisation.
Business Impact Analysis is a component of a Business Continuity Plan (BCP) and helps in identifying
events that could impact continuity of operations and assessing the impact of these events.
Before analyzing the business impact analysis, it is important to analyze the following questions:
● What are the organization’s business processes?
● What are the critical information resources related to the critical business processes?
● What is the critical recovery time period for information resources in which business processing
must be resumed before significant or unacceptable losses are suffered?
Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are discussed here.
● Recovery Time Objective (RTO): This is acceptable/allowable downtime incase of a disruption to
operations (determines processes and technology used for backup and recovery e.g. data tapes or
disk).
● Recovery Point Objective (RPO): This is the acceptable/allowable data loss incase of a disruption to
operations (determines frequency of backup).
The diagram shows the relationship between Disruption costs and Recovery costs.
● The two should be balanced to attain an optimal level of protection of key information assets, that
is, to obtain an optimal RPO and RTO.
If the business continuity strategy aims at a longer recovery time, it will be less expensive than a more
stringent requirement, but may be more susceptible to downtime costs spiraling out of control.
● Downtime cost of the disaster in the short run (e.g., hours, days, weeks), grows quickly with time,
where the impact of a disruption increases the longer it lasts.
● At a certain moment, it stops growing, reflecting the moment or point when the business can no
longer function.
● The cost of downtime increasing with time .It has many components (depending on the industry
and the specific company and circumstances), such as:
o cost of idle resources (e.g., in production),
o drop in sales (e.g., orders),
o financial costs (e.g., not invoicing nor collecting),
o Delays (e.g., procurement) and
o indirect costs (e.g., loss of market share, image, and goodwill).
Explanation:
● The IS Auditor needs to understand the life cycle of BCP/DRP plan development and maintenance
and the types of BCP tests, factors to consider when choosing the appropriate test scope, methods
for observing recovery tests and analyzing test results.
The components of a Business Continuity Plan depends on organization size and requirements. It may
include:
● Business resumption plan
● Continuity of operations plan
● Continuity of support plan
● Crisis communication plan
● Incidence response plan
● Disaster recovery plan
● Occupant emergency plan
BCP test can be executed by conducting pre-test, actual test, and post-test.
● Pre-test: The set of actions necessary to set the stage for the actual test. This ranges from placing
tables in the proper operations recovery area to transporting and installing backup telephone
equipment.
● Actual test: This is the real action of the business continuity test.
o Actual operational activities are executed to test the specific objectives of the BCP.
o Actual operational activities are executed to test the specific objectives of the BCP.
5. Proper segregation of duties prohibits a system analyst from performing quality assurance
functions (it is difficult for us to poke holes in our own work).
6. The primary reason an IS Auditor reviews an organization chart is to better understand the
responsibilities and authority of individuals.
7. If an IS auditor observes that project-approval procedures do not exist, the IS auditor should
recommend to management that formal approval procedures be adopted and documented.
8. Ensuring that security and control policies support business and IT Objectives is a primary
objective of an IT security polices audit.
9. The board of directors is ultimately accountable for developing an IS security policy.
10. When auditing third-party service providers, an auditor should be concerned with ownership of
program and files, a statement of due care and confidentiality, and the capability for continued
service of the service provider in the occurrence of a disaster.
11. Proper Segregation of Duties (SoD) normally prohibits a LAN administrator from having
programming responsibilities.
12. When performing an IS Strategy audit, an IS Auditor should review both short term (one year).
and long-term (three-to five-year IS Strategies, interview corporate management personnel and
ensure that external environment has been considered. The auditor should not focus on
procedures in an audit of IS Strategy.
13. Management personnel and ensure that external environment has been considered. The auditor
should not focus on procedures in an audit of IS Strategy.
14. Business Impact Analysis (BIA) is an exercise that allow an organization to understand the cost of
interruption and identify which applications and processes are most critical to the continued
functioning of the organization.(done by setting RPOs and RTOs).
15. Recovery Time Objective (RTO) is acceptable/allowable downtime incase of a disruption to
operations (determines processes and technology used for backup and recovery e.g. data tapes
or disk).
16. Recovery Point Objective (RPO) is the acceptable/allowable data loss incase of a disruption to
operations (determines frequency of backup).
17. Above all else, an IS strategy must support the business objectives of the organization.
18. IS assessment methods enable IS management to determine whether the activities of the
organization differ from the planned or expected levels.
19. Batch control reconciliations is a compensatory control of mitigating inadequate Segregation of
duties.
20. An audit of the client’s business plan should be reviewed before the organization’s IT strategic
plan review.
21. Allowing the programmers to directly patch or change code in production programs increases the
risk of fraud.
a. a leading-edge technology.
a. a leading-edge technology.
Answer: d.
Explanation: To ensure its contribution to the realization of an organization's overall goals,
the IS department should have long- and short-range plans that are consistent with the
organization's broader plans for attaining its goals.
Copyright 2012-2014,Simplilearn,All rights reserved
d. Significant contracts
d. Significant contracts
Answer: d.
Explanation: Contractual requirements are one of the sources that should be consulted to
identify the requirement for management of information assets.
Copyright 2012-2014,Simplilearn,All rights reserved
Answer: d.
Explanation: The long term viability of a vendor is essential for deriving maximum value for
the organization. It is more likely that a financial sound vendor would be in business for a
long period of time.
Copyright 2012-2014,Simplilearn,All rights reserved
b. Preparedness test
c. Paper test
d. Regression test
b. Preparedness test
c. Paper test
d. Regression test
Answer: b.
Explanation: A preparedness test is performed by each local office to test the adequacy of
the preparedness for disaster recovery.
Copyright 2012-2014,Simplilearn,All rights reserved
Answer: c.
Explanation: The most important key step in recovering from cyber attacks is the execution
of a business continuity plan to quickly and cost-effectively recover critical systems,
processes and data.
Copyright 2012-2014,Simplilearn,All rights reserved