+ All Categories
Home > Documents > Governance and Management of IT

Governance and Management of IT

Date post: 01-Nov-2015
Category:
Upload: shadabali
View: 216 times
Download: 0 times
Share this document with a friend
Description:
Governance and Management of IT
16
 1 Governance and  Management of IT 1  By: Shamsuddin Surani CORPORATE GOVERNANCE 2 Corporate Governance: “ The system by which business corporations are directed and controlled” It is a set of responsibilities and practices used by an organizations management to provide strategic direction, thereby ensuring that goals are achievable, risks are properly addressed and organizational resources are properly utilitized” IT GOVERNANCE One of the domains of Enterprise Governance : How IT is applied within the enterprise. IT is now regarded as an integral part, CEOs, COOs, CFOs, CIOs and CTOs, agree that strategic alignment between IT and enterprise objectives is a critical success factor Key element of IT governance is the alignment of business and IT, leading to the achievement of business value. It is concerned with two issues: IT delivers value to the business   Driven by strategic alignment with the business IT risks are managed   Driven by embedding accountability into the enterprise.  3 INFORMATION TECHNOLOGY MONI TORING AND  A SSURANCE PRACTICES FOR BOARD AND SENIOR M  ANAGEMENT Traditional involvement of board-level executives in IT issues was to defer all key decisions to the companys IT professionals. IT governance implies a system in which all stakeholders, including the board, internal customers and departments such as finance, provide input into the decision-making proce ss. IT governance is the responsibility of the board of directors and executive management. Key IT governance practices are: IT Strategy Committee, Risk Management and IT Balanced Scorecard.  4
Transcript
  • 1Governance and

    Management of IT

    1 By: Shamsuddin Surani

    CORPORATE GOVERNANCE

    2

    Corporate Governance: The system by which business corporations are directed and

    controlled

    It is a set of responsibilities and practices used by

    an organizations management to provide strategic direction, thereby ensuring that goals

    are achievable, risks are properly addressed and

    organizational resources are properly utilitized

    IT GOVERNANCE

    One of the domains of Enterprise Governance : How IT is

    applied within the enterprise.

    IT is now regarded as an integral part, CEOs, COOs, CFOs,

    CIOs and CTOs, agree that strategic alignment between IT

    and enterprise objectives is a critical success factor

    Key element of IT governance is the alignment of business

    and IT, leading to the achievement of business value.

    It is concerned with two issues:

    IT delivers value to the business Driven by strategic alignment with the business

    IT risks are managed Driven by embedding accountability into the enterprise.

    3

    INFORMATION TECHNOLOGY MONITORING AND

    ASSURANCE PRACTICES FOR BOARD AND

    SENIOR MANAGEMENT

    Traditional involvement of board-level executives

    in IT issues was to defer all key decisions to the

    companys IT professionals.

    IT governance implies a system in which all

    stakeholders, including the board, internal

    customers and departments such as finance,

    provide input into the decision-making process.

    IT governance is the responsibility of the board of

    directors and executive management.

    Key IT governance practices are: IT Strategy

    Committee, Risk Management and IT Balanced

    Scorecard.4

  • 2FIVE FOCUS AREAS OF IT-GOV

    Strategic Alignment: Focuses on ensuring the

    linkage of business and IT plans; defining,

    maintaining and validating the IT value proposition;

    and aligning IT operations with enterprise operations.

    Value Delivery: About executing the value

    proposition throughout the delivery cycle, ensuing

    that IT delivers the promised benefits against the

    strategy, concentrating on optimizing costs and

    proving the intrinsic value of IT

    Resources Management: requires risk awareness

    by senior corporate officers, a clear understanding of

    the enterprise's appetite for risk, understanding of

    compliance requirements, transparency about the

    significant risks to the enterprise. 5

    Resource management: About the optimal

    investment in, and the proper management of,

    critical IT resources: applications, information,

    infrastructure and people.

    Performance measurement: Tracks and

    monitors strategy implementation, project

    completion, resource usage, process performance

    and service delivery, using, for example, balanced

    scorecards that translate strategy into action to

    achieve goals measurable beyond conventional

    accounting. 6

    IT GOVERNANCE FRAMEWORKS

    Control Objectives for Information and related Technology

    (CoBIT) was developed by the IT Governance Institute

    (ITGITM) to support IT governance by providing a

    framework to ensure that: IT is aligned with the

    business, IT enables the business and maximizes

    benefits, IT resources are used responsibly, and IT

    risks are managed appropriately. COBIT provides tools

    to assess and measure the performance of 34 IT processes

    within an organization.

    The ISOIIEC 27001 (ISO 27001) series of standards is a set

    of best practices that provides guidance to organizations

    implementing and maintaining information security

    programs. ISO 27001 originally was published in the

    United Kingdom (UK) as British Standard 7799 (BS7799)

    and has become a well known standard in the industry.7

    The IT Infrastructure Library (ITIL) wasdeveloped by the UK Office of Government

    Commerce (OGC), is a detailed framework with

    hands-on information regarding how to achieve

    successful operational service management of IT.

    Etc.

    8

  • 3AUDIT ROLE IN IT GOVERNANCE

    IT is governed by good or best practices which

    ensure that the organization's information and

    related technology: support the enterprise's

    business objectives (i.e., strategic alignment),

    deliver value, use resources responsibly, manage

    risks appropriately and measure performance.

    Audit plays a significant role in the successful

    implementation of IT governance within an

    organization. Audit is well positioned to

    provide leading practice recommendations

    to senior management to help improve the

    quality and effectiveness of the IT

    governance initiatives implemented.9

    The following aspects related to IT governance need to

    be assessed:

    Alignment of the IS function with the organization's

    mission, vision, values, objectives and strategies

    Achievement of performance objectives established by

    the business (e.g., effectiveness and efficiency) by the

    IS function

    Legal, environmental, information quality, fiduciary,

    security, and privacy requirements

    The control environment of the organization

    The inherent risks within the IS environment

    IT Investment/expenditure

    10

    IT STRATEGY COMMITTEE

    As a committee of the board, it assists the board

    in overseeing the enterprise's IT-related matters

    by ensuring that the board has the internal and

    external information it requires for effective IT

    governance decision making.

    This is a mechanism for incorporating IT

    governance into enterprise governance.

    11

    IT STRATEGY COMMITTEE VS.

    IT STEERING COMMITTEE

    IT Strategy Committee

    Advises the board and management on IT

    strategy

    Is delegated by the board to provide input to the

    strategy and prepare its approval

    Focuses on current and future strategic IT issues

    IT Steering Committee

    Assists the executive in the delivery of the IT

    strategy

    Oversees day-to-day management of IT service

    delivery and IT projects

    Focuses on implementation

    12

  • 4INFORMATION SECURITY GOVERNANCE

    Information security governance is the

    responsibility of the board of directors and

    executive management, and must be an integral

    and transparent part of enterprise governance.

    Within IT governance, information security

    governance should become a focused activity with

    specific value drivers:

    confidentiality, integrity, and availability of

    information, continuity of services and protection of

    information assets.

    13

    Until recently, the focus of protection has been on

    the IT systems that collect, process and store the

    vast majority of information rather than the

    information itself.

    The reach of protection efforts should encompass

    not only the process or Systems that generates

    the information but also the continued

    preservation of information generated as a result

    of the controlled processes.14

    OUTCOMES OF SECURITY GOVERNANCE

    Strategic alignment: Align information security

    with business strategy to support organizational

    objectives.

    Risk management: Manage and execute

    appropriate measures to mitigate risks and reduce

    potential impacts on information resources to an

    acceptable level.

    Value delivery: Optimize security investments in

    support of business objectives.

    Performance measurement: Measure, monitor and

    report on information security processes to ensure

    that SMART (Specific, Measurable, Achievable,

    Relevant and Time-bound) objectives are achieved.

    Resource management: Utilize information

    security knowledge and infrastructure efficiently and

    effectively.

    15

    Information security governance is the responsibility of

    the board of directors and executive management, and

    must be an integral and transparent part of enterprise

    governance.

    Effective Information Security Governance

    To achieve effective information security governance,

    management must establish and maintain a framework to

    guide the development and management of a comprehensive

    information security program that supports business objectives

    This framework provides the basis for the development of a

    cost-effective information security program that supports the

    organizations business goals.

    16

  • 5ROLES AND RESPONSIBILITIES OF

    SENIOR MANAGEMENT AND BOARDS OF

    DIRECTORS

    The tone at the top must be conducive to effective

    security governance. It is unreasonable to expect

    lower-level personnel to abide by security

    measures if they are not exercised by senior

    management.

    Executive management endorsement of intrinsic

    security requirements provides the basis for

    ensuring that security expectations are met at all

    levels of the enterprise. Penalties for

    noncompliance must be defined, communicated

    and enforced from the board level down. 17

    IT INVESTMENT AND ALLOCATION

    PRACTICES

    Each enterprise faces the challenge of using its

    limited resources, including people and money, to

    achieve its goals and objectives. When an

    organization invests its resources in a given

    effort, it incurs opportunity costs because it is

    unable to pursue other efforts that could bring

    value to the enterprise.

    An IS auditor should understand an

    organizations investment and allocation practices to determine whether the enterprise is

    positioned to achieve the greatest value from the

    investment of its resources.

    18

    Traditionally, when IT professionals and top

    managers discussed the ROI of an IT investment,

    they were thinking about financial benefits.

    Today, business leaders also consider the

    nonfinancial benefits of IT investments.

    Financial benefits include impacts on the

    organizations budget and finances e.g. cost reductions or revenue increases.

    Nonfinancial benefits include impacts on

    operations or mission performance and results

    e.g. Improved customer satisfaction, better

    information, shorter cycle time.

    19

    MATURITY AND PROCESS IMPROVEMENT MODELS

    Capability Maturity Model (CMM) a standardized framework for assessing the maturity level of an

    organizations information system development and management processes and products. It consists of five

    levels of maturity: Level 1Initial: System development projects follow no prescribed

    process.

    Level 2Repeatable: Project management processes and practices are established to track project costs, schedules, and functionality.

    Level 3Defined: A standard system development process (sometimes called a methodology) is purchased or developed. All projects use a version of this process to develop and maintain information systems and

    software.

    Level 4Managed: Measurable goals for quality and productivity are established.

    Level 5Optimizing: The standardized system development process is continuously monitored and improved based on measures and data

    analysis established in Level 4.

    20

  • 6CAPABILITY MATURITY MODEL (CMM)

    POLICIES AND PROCEDURES

    Policies

    High-level documents

    Represent the corporate philosophy of an

    organization

    Must be clear and concise to be effective

    Policies

    Management should review all policies carefully

    Policies need to be updated to reflect new

    technology and significant changes in business

    processes

    Policies formulated must enable achievement of

    business objectives and implementation of IS

    controls

    22

    POLICIES (CONTINUED)

    Information Security Policies

    Communicate a coherent security standard to users,

    management and technical staff

    Must balance the level of control with the level of

    productivity

    Provide management the direction and support for

    information security in accordance with

    business requirements, relevant laws and

    regulations

    23

    POLICIES (CONTINUED)

    Information Security Policy Document

    Definition of information security

    Statement of management intent

    Framework for setting control objectives

    Brief explanation of security policies

    Definition of responsibilities

    References to documentation

    24

  • 7POLICIES (CONTINUED)

    Review of the Information Security Policy

    Document

    Should be reviewed at planned intervals or when

    significant changes occur to ensure its continuing

    suitability, adequacy and effectiveness

    Should have an owner who has approved

    management responsibility for the development,

    review and evaluation of the security policy

    Should include assessing opportunities for

    improvement to the organizations information security policy

    25

    PROCEDURES

    Detailed documents:

    Must be derived from the parent policy

    Must implement the spirit (intent) of the policy

    statement

    Procedures must be written in a clear and concise

    manner

    An independent review is necessary to ensure that

    policies and procedures have been properly

    documented, understood and implemented 26

    RISK MANAGEMENT

    The process of identifying vulnerabilities

    and threats to the information resources

    used by an organization in achieving

    business objectives

    27

    DEVELOPING A RISK MANAGEMENT

    PROGRAM

    To develop a risk management program:

    Establish the purpose of the risk management

    program

    Assign responsibility for the risk management plan

    28

  • 8RISK MANAGEMENT PROCESS

    Identification and classification of information

    resources or assets that need protection

    Examples of typical assets associated with

    information and IT include: Information and Data, H/w & S/w, Services, Document, Personnel

    Assess threats and vulnerabilities and the

    likelihood of their occurrence

    Common classes of threats are:

    Errors, Malicious damage/attack, Fraud, Theft,

    Equipment/software failure

    Examples of Vulnerability are:

    Lack of user knowledge, Lack of security functionality, Poor

    choice of passwords, Untested technology

    Once the elements of risk have been established

    they are combined to form an overall view of risk

    29

    The magnitude of the result of a threat agent

    exploiting a vulnerability is called an Impact

    Threats usually result in a direct financial loss in

    the short term or an ultimate (indirect) financial

    loss in the long term. Examples of such losses

    include:

    Direct loss of money (cash or credit)

    Breach of legislation

    Loss of reputation/goodwill

    Endangering of staff or customers

    Loss of business opportunity

    Reduction in operational efficiency/performance

    Interruption of business activity

    30

    RISK MANAGEMENT PROCESS(CONTINUED)

    Once risks have been identified, existing controls

    can be evaluated or new controls designed to

    reduce the vulnerabilities to an acceptable level

    of risk

    The remaining level of risk, once controls have

    been applied, is called residual risk and can be

    used by management to identify those areas in

    which more control is required to further reduce

    risk

    Final acceptance of residual risk takes into

    account:

    Organizational policy, Cost and effectiveness of

    implementation etc.

    31

    RISK MANAGEMENT PROCESS(CONTINUED)

    IT risk management needs to operate at multiple

    levels including:

    Operational - Risks that could compromise the

    effectiveness of IT systems and supporting

    infrastructure

    Project - Risk management need to focus on the

    ability to understand and manage project complexity

    Strategic - The risk focus shifts to consideration such

    as how well the IT capability is aligned with the

    business strategy.32

  • 9IS MANAGEMENT PRACTICES

    In most organizations, the IS department is a

    service (support) department. The traditional role

    of a service department is to help production

    (line) departments conduct their operations more

    effectively and efficiently. Today, however, IS has

    become an integral part of every facet of the

    operations of an organization.

    Management activities to review the

    policy/procedure formulations and their

    effectiveness within the IS department would

    include practices such as personnel

    management, sourcing and IT change

    management.

    33

    HUMAN RESOURCE MANAGEMENT

    Human resource management relates to

    organizational policies and procedures for

    recruiting, selecting, training and promoting

    staff, measuring staff performance, disciplining

    and staff, succession planning, and staff

    retention.

    The effectiveness of these activities, as they

    relate to the IS function, impacts the quality of

    staff and the performance of IS duties.

    34

    Hiring Practices: Hiring practices are important toensure that the most effective and efficient staff is chosen

    and that the company is in compliance with legal

    recruitment requirements.

    Some of the common controls would include:

    Background checks (e.g., criminal, financial,

    professional, references).

    Confidentiality agreements

    Etc.

    35

    Employee Handbook: Distributed to allemployees upon being hired, should explain items

    such as: security policies and procedures,

    company expectations, employee benefits, etc.

    Promotion Policies: Promotion policies should

    be fair and equitable and understood by

    employees. Policies should be based on objective

    criteria and consider an individual's performance,

    education, experience and level of responsibility.

    The IS auditor should ensure that the IS

    organization has well defined policies and

    procedures for promotion, and is adhering to

    them. 36

  • 10

    Training: Training should be provided on a

    regular basis to all employees based on the areas

    where employee expertise is lacking. Training is

    particularly important for IS professionals, given

    the rapid rate of change of technology and

    products.

    Employee Performance Evaluations:

    Employee assessment must be a standard and

    regular feature for all IS staff. The HR

    department should ensure that IS managers and

    employees set mutually agreed goals/expected

    results.37

    Required Vacations: A required vacation

    (holiday) ensures that once a year, at a

    minimum, someone other than the regular

    employee will perform a job function. This

    reduces the opportunity to commit improper or

    illegal acts.

    Job rotation provides an additional control (to

    reduce the risk of fraudulent or malicious acts)

    since the same individual does not perform the

    same tasks all the time. This provides an

    opportunity for an individual other than the

    regularly assigned person to perform the job and

    notice possible irregularities.

    38

    Termination Policies: Written termination

    policies should be established to provide clearly

    defined steps for employee separation. It is

    important that policies be structured to provide

    adequate protection for the organization's

    computer assets and data.

    Termination practices should address voluntary

    and involuntary (e.g., immediate) terminations.

    For certain situations, such as involuntary

    terminations under adverse conditions, an

    organization should have clearly defined and

    documented procedures for escorting the

    terminated employee from the premises.39

    In all cases, however, the following control

    procedures should be applied:

    Return of all access keys, ID cards and badges-to

    prevent easy physical access

    Deletion/revocation of assigned logon IDs and

    passwords-to prohibit system access

    Notification-to appropriate staff and security

    personnel regarding the employee's status change to

    "terminated

    Arrangement of the final pay routines-to remove the

    employee from active payroll files

    Performance of a termination interview-to gather

    insight on the employee's perception of management

    Return of all company property40

  • 11

    SOURCING PRACTICES Sourcing practices relate to the way an

    organization obtains the IS function required to

    support the business Organization can perform

    all IS functions in-house or outsource all

    functions across the globe

    Giving consideration to the following:

    Is this a core function for the organization?

    Does this function have specific knowledge, processes and

    staff critical to meeting its goals and objectives, and that

    cannot be replicated externally or in another location?

    Can this function be performed by another party or in

    another location for the same or lower price, with the same

    or higher quality, and without increasing risk?

    Does the organization have experience managing third

    parties or using remote/offshore locations to execute IS or

    business functions?

    Sourcing strategy should consider each IS

    function and determine which approach allows

    the IS function to meet the organizations goals

    41

    If the organization has chosen to use outsourcing, a

    rigorous process should be followed, including the

    following steps:

    Define the IS function to be outsourced.

    Describe the service levels required and minimum metrics to

    be met.

    Know the desired level of knowledge, skills and quality of the

    expected service provider desired.

    Know the current in-house cost information to compare with

    third-party bids.

    Conduct due diligence reviews of potential service providers.

    42

    Delivery of IS functions can include:

    Insourced-Fully performed by the organization's staff

    Outsourced-Fully performed by the vendor's staff

    Hybrid-Performed by a mix of the organization's and

    vendors staffs

    43

    IS functions can be performed across the globe,

    taking advantage of time zones and arbitraging

    labor rates, and can include:

    Onsite--Staff work onsite in the IS department

    Offsite--Also known as near-shore, staff work at a

    remote location in the same geographic area

    Offshore--Staff work at a remote location in a

    different geographic region44

  • 12

    45

    Outsourcing Practices and Strategies

    Contractual agreements under which an organization

    hands over control of part or all of the functions of

    the IS department to an external party

    Becoming increasingly important in many

    organizations

    The IS auditor must be aware of the various forms

    outsourcing can take as well as the associated risks

    46

    47

    SOURCING PRACTICES (CONT..)

    48

  • 13

    SOURCING PRACTICES (CONTINUED)

    Possible advantages

    Commercial outsourcing companies likely to devote

    more time and focus more efficiently on a given

    project than in-house staff

    Outsourcing vendors likely to have more experience

    with a wider array of problems, issues and

    techniques

    Possible disadvantages

    Costs exceeding customer expectations

    Loss of internal IS experience

    Loss of control over IS

    Vendor failure 49

    SOURCING PRACTICES (CONTINUED)

    Risks can be reduced by:

    Establishing measurable, partnership-enacted

    shared goals and rewards

    Using multiple suppliers

    Performing periodic competitive reviews and

    benchmarking

    Implementing short-term contracts

    Forming a cross-functional contract management

    team

    Including contractual provisions to consider as many

    contingencies as can reasonably be foreseen50

    SOURCING PRACTICES (CONTINUED)

    Globalization Practices and Strategies

    Requires management to actively oversee the remote

    or offshore locations

    The IS auditor can assist an organization in

    moving IS functions offsite or offshore by

    ensuring that IS management considered the

    following:

    Legal, regulatory and tax issues

    Continuity of operations

    Personnel

    Telecommunication issues

    Cross-border and cross-cultural issues

    51

    Third-party Service Delivery Management

    Every organization using the services of third

    parties should have a service delivery

    management system in place to implement and

    maintain the appropriate level of information

    security and service delivery in the line with third-

    party service delivery agreements

    The organization should check the implementation of

    agreements, monitor compliance with the agreements

    and manage changes to ensure that the services

    delivered meet all requirements agreed to with the

    third party 52

  • 14

    ORGANIZATIONAL CHANGE

    MANAGEMENT

    Change management is managing IT changes for

    the organization, where a defined and

    documented process exists to identify and apply

    technology improvements at the infrastructure

    and application level that are beneficial to the

    organization and involving all levels of the

    organization impacted by the changes.

    53 54

    QUALITY MANAGEMENT

    Software development, maintenance and

    implementation

    Acquisition of hardware and software

    Day-to-day operations

    Service management

    Security

    Human resource management

    General administration

    55

    PERFORMANCE OPTIMIZATION

    Process driven by performance indicators

    Optimization refers to the process of improving

    the productivity of information systems to the

    highest level possible without unnecessary,

    additional investment in the IT infrastructure

    56

  • 15

    PERFORMANCE

    OPTIMIZATION(CONTINUED)

    Five ways to use performance measures

    Measure products/services

    Manage products/services

    Assure accountability

    Make budget decisions

    Optimize performance

    57

    IS ROLES AND RESPONSIBILITIES

    Systems development manager

    Help desk

    End user

    End user support manager

    Data management

    Quality assurance manager

    Vendor and outsourcer management

    Operations manager

    Data entry

    Systems administration

    Quality assurance

    Database administration58

    SEGREGATION OF DUTIES WITHIN IS

    Avoids possibility of errors or misappropriations

    Discourages fraudulent acts

    Limits access to data

    59

    SEGREGATION OF DUTIES CONTROLS

    Control measures to enforce segregation of duties

    include:

    Transaction authorization

    Custody of assets

    Access to data

    Authorization forms

    User authorization tables

    60

  • 16

    SEGREGATION OF DUTIES CONTROLS

    (CONTINUED)

    Compensating controls for lack of segregation of

    duties include:

    Audit trails

    Reconciliation

    Exception reporting

    Transaction logs

    Supervisory reviews

    Independent reviews

    61

    AUDITING IT GOVERNANCE STRUCTURE

    AND IMPLEMENTATION

    Indicators of potential problems include:

    Unfavorable end-user attitudes

    Excessive costs

    Budget overruns

    Late projects

    High staff turnover

    Inexperienced staff

    Frequent hardware/software errors

    62

    REVIEWING DOCUMENTATION

    The following documents should be reviewed:

    IT strategies, plans and budgets

    Security policy documentation

    Organization/functional charts

    Job descriptions

    Steering committee reports

    System development and program change

    procedures

    Operations procedures

    Human resource manuals

    Quality assurance procedures

    63

    REVIEWING CONTRACTUAL COMMITMENTS

    There are various phases to computer hardware,

    software and IS service contracts, including:

    Development of contract requirements and service

    levels

    Contract bidding process

    Contract selection process

    Contract acceptance

    Contract maintenance

    Contract compliance

    64


Recommended