ICT
AUDITING SERVICES
1. ICT RISK
MANAGEMENT ADVISORY SERVICES
This service is available to clients who
are in the pre-implementation stage of commissioning
IT System, simple or complex that accepts,
process, distributes and
delivers and is the repository
for highly sensitive transactions and information
– such as commercial banks, security
firms, treasury operation of corporations,
and so forth.
The deliverables of the review may be used
by the client as a ‘driver’
for the formulation of an IS Strategic Plan
and Budget in order to integrate the necessary
IS Security Risk Management components
into the overall solution.
Alternatively, a client can stipulate the
area of concern and the ICT-Risk Management
Services Organisation (BKYG CONSULTANTS)
will conduct the appropriate reviews and
report on all information security weaknesses
or breaches in the organization, evaluating
the security functionality
in a particular application, business operational
support, network and paperless
solutions, new products being evaluated,
and even in a technologically related complex
legal contract.
|
2) ICT
POLICY DEVELOPMENT AND ICT MANAGEMENT
FUNCTION DEVELOPMENT
The most value-added service provided
by the ICT-Risk Management Services Organisation
(ICT-RMSO) to assist clients in securing
themselves thoroughly by operating on
‘auto-pilot’ mode. The ICT-RMSO
(BKYG Consultants) will establish
and implement an ISP – Information
Security Policy, design the specifications
necessary for the framework of the IS
management function, implement and train
the support team to maintain and enforce
the IS policies.
From the deliverables created out of
this consultancy services, the client
will reach the state of being ‘ISO-ready’
even if such stage has never been considered
achievable previously.
|
3)
ICT STANDARD OPERATION PROCEDURE DEVELOPMENT
This service will compliment the development
of an ISP – information Security &
Policy. The client will be provided the following
deliverables :- |

|
Operational Procedures that
incorporate online functions ; |
 |
Flowcharts of the workflow ; |
 |
Security Access control capability ; |
 |
Vital records management ; |
 |
Business fall-back / resumption procedures
; and |
 |
Internal controls established. |
|
|
4) IS /
ICT MANAGEMENT AUDIT
This is one of the branches of the ICT
Audit that the ICT-Risk Management Services
Organisation will provide. Its concentration
is very much on Financial
and Compliance Audit related
to the Governance of
the ICT functions in the client’s
organization.
The areas that this branch of an ICT
Audit will cover are physical access to
ICT premises, IS-governed access control
to the ICT resources – databases--
files -- records, etc., and ICT procurement
procedures.
|
5) ICT
APPLICATION AUDIT
ICT Application Audit concentrates on
the nature an application is behaving
in deriving and creating expected results
(as intended and stated in Policies
and Guidelines)
from data processing activities.
Inputs, the Application’s
Parameter files and outputs are
three key information examined initially
and followed by random testing to verity
the overall behaviour of an application
(or several applications) to meet the
expected results. Application functionality
and performance are evaluated.
Apart from this, Application
Audit also looks at infrastructure
security and access controls
pertinent to the application(s)
being audited involving many different
classes of users of the application (such
as system administrators, supervisors,
data entry operators, etc.) information
distribution, retention, disposal procedures
and business continuity.
|
6)
ICT TECHNOLOGY AUDIT
Information Systems / ICT Technology Audit
concentrates on the attributes of the technology
implemented and configured based on policies
and procedures adopted by the client’s
organisation.
The main focus of this audit are on :- |
 |
Technical platform and security (involving
the access control configuration at the operating
system level) |
 |
Access controls on resources available on
the data network (e.g.. Databases applications
folders, networked printers, scanners, CCTV
cameras, sensors, etc.) |
|
Office Automation and e-commerce applications
enabled by the clients business. |