CISA Made Easy

                                           - easy CISA preparation

Monday, November 17, 2008

CISA Quick Tips 08-1711

1. Proper access control policy should be framed with regard to data file access and directory access while implementing Database Management system (DBMS).

2. Segregation of duties is a key area to be audited while auditing IT Operations.

3. In case of outsourced network operations, the logs of network devices should be secured and only accessed by the organization/third party(other than network vendor).

4. CAAT provides reasonable assurance that audit objectives will be achieved.

5. IT Governance ensures appropriate and suitable controls are being followed as per Standard practices by the organization

Readers who visited this post also read :

0 comments:

 

Home | | | | |

CISA made Easy - Easy CISA Preparation