0% found this document useful (0 votes)
90 views3 pages

It Projmgmt Audit Prog

This audit will evaluate IT project management using the COSO framework. The audit will consist of an overview and risk assessment of existing IT projects to identify control practices and residual risks. This will determine if further evaluation is needed. If needed, the evaluation can verify controls or test individual projects against best practices for objectives, timing, budget and side-effects. The goal is to assess risks and have a dialogue to improve practices and reduce risks of project failure.

Uploaded by

Eqbal Gubran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views3 pages

It Projmgmt Audit Prog

This audit will evaluate IT project management using the COSO framework. The audit will consist of an overview and risk assessment of existing IT projects to identify control practices and residual risks. This will determine if further evaluation is needed. If needed, the evaluation can verify controls or test individual projects against best practices for objectives, timing, budget and side-effects. The goal is to assess risks and have a dialogue to improve practices and reduce risks of project failure.

Uploaded by

Eqbal Gubran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

UC Audit Program

Information Technology (IT) Project Management

I. Audit Approach

This audit of IT Project Management will be approached from the perspective of the
COSO (Committee Of Sponsoring Organizations of the Treadway Commission)
integrated internal control framework that has been adopted by the Regents. Information
for the audit program was also obtained as necessary from the Institute of Internal
Auditor’s GTAG (Global Technology Audit Guide) #12 (Auditing IT Projects), the IT
Governance Institute’s COBIT (Control OBjectives for Information and related
Technology) framework—Process PO10 (Manage Projects), and the fourth edition of the
Project Management Institute’s Project Management Body of Knowledge (Fourth
Edition).

The COSO framework models internal control as a process, effected by an entity’s board
of directors, management and other personnel, designed to provide reasonable assurance
regarding the achievement of objectives in the following categories:

● Effectiveness and efficiency of operations.


● Reliability of financial reporting.
● Compliance with applicable laws and regulations.

The above objectives are one of three dimensions of internal control in the COSO
framework. The other two dimensions are internal control elements (control
environment, risk assessment, control activities, monitoring, and information and
communication); and an entity’s units or activities. Within the framework, internal
auditors are envisioned as having the role of evaluating the effectiveness of control systems
and playing a monitoring role.

Based on COSO, for purposes of this audit IT Project Management is viewed as an


organizational activity, the objectives of which are that (1) IT projects are operationally
effective and use organizational resources efficiently; (2) IT project financial information
is collected and processed in such a way that the reliability of overall financial reporting
at the campus-, medical center-, or laboratory level is not adversely affected; and (3) IT
projects adequately address compliance with laws and regulations as applicable.

Collectively, the sources referred to above identify risks associated with the three
objectives just listed, as well as risk-mitigating best practices. Accordingly, this audit
consists of two parts. The first is an overview and risk assessment. The overview’s
purpose is to identify the existing audit population of IT projects, and, with respect to
that population, to determine the extent to which risk-mitigating best practices are
established. Based on this information, a judgment is then to be made as to the level of
residual risk of project failure.

Page 1 of 3
UC Audit Program
Information Technology (IT) Project Management

The outcome of the overview and risk assessment will determine the nature and extent of
work in the second part, which is an optional (subject to auditor judgment) detailed
evaluation.

II. General Overview and Risk Assessment (required)

A. Identify the population to be audited. Suggested criteria: those projects completed


within the most recent two-year period that primarily involve acquisition,
development, maintenance of, or change to, an electronic information system, and
whose impact extends to an entire campus, medical center, or laboratory.

B. Use the template embedded below to help identify existing control practices with
respect to the audit population as a whole, in comparison with best practice, and,
based on this information, to record a judgment as to the level of residual risk of
project failure generally. It is suggested that the template’s control content be shared
with cognizant management as a basis for inquiry, in lieu of a traditional internal
control questionnaire.

Subject to auditor judgment, if the results of the overview and risk assessment are
enough to enable a dialog about recommendations and corrective action in agreement
with management, or enable a conclusion that residual risk is low, further audit work
need not be performed. On the other hand, if the results of the overview and risk
assessment do not have this outcome, detailed evaluation should be performed.

III. Detailed Evaluation (if deemed necessary)

A. Option 1: Further Control Verification


If the overview and risk assessment indicated the presence of risk-mitigating best
practices, but there remains some uncertainty as to the degree to which the asserted
practices are actually operational, consider conducting further inquiry as necessary to
conclusively determine their status. To conduct this inquiry, pick a sample of the
control conditions in the overview and risk assessment template on which to focus
this additional effort, and seek additional evidence of their operational status as
circumstances warrant.

B. Option 2: Testing of Individual IT Projects


If the overview and risk assessment indicated control insufficiency, but there was not
agreement with cognizant management about this insufficiency or about possible
corrective action, consider detailed testing of individual IT projects. To conduct this

Page 2 of 3
UC Audit Program
Information Technology (IT) Project Management

testing, apply criteria from the GTAG matrix embedded below, as necessary, to a
sample of the audit population of IT projects, to help determine the extent to which
they:

1) achieved their objectives;


2) were concluded timely;
3) were concluded within their established budget; and
4) were concluded without adverse organizational or operational side-effects.

Page 3 of 3

You might also like