SLIDE 36 19/02/2019 36
Area Control areas for Councils – FY19
Governance Policy framework & currency of policies Management and reporting to business of IT Risks and Incidents Access to Programs & Data Starters/Transfers/Leavers User Access Reviews Managing & monitoring privileged user activity Unique user IDs Passwords Program Change Approval of changes Testing of changes Segregation of Duties between promoting change to PROD and developing/initiating change Computer Operation Disaster Recovery Planning
Example of Issue
No formal IT Security policy The Council does not have a formal IT Security policy. An IT Security policy sets out the Council’s security requirements for digital information. The policy and supporting procedure documents provide guidelines for both standard user and privileged access management. Inadequate reporting of IT risks & incidents to management The Council has no formal process in place to ensure that known and emerging IT risks and issues are regularly communicated to senior management (i.e. outside of the IT department). For example, our audit found that the operating system hosting the general ledger has passed end-of-life support. The associated risks this brings were not communicated to management and those charged with governance.
Area Control areas for Councils – FY19
Governance Policy framework & currency of policies Management and reporting to business of IT Risks and Incidents Access to Programs & Data Starters/Transfers/Leavers User Access Reviews Managing & monitoring privileged user activity Unique user IDs Passwords Program Change Approval of changes Testing of changes Segregation of Duties between promoting change to PROD and developing/initiating change Computer Operation Disaster Recovery Planning
Example of Issue
User access provisioning process needs to be enhanced Our audit identified that [insert number] users were granted access to council systems where no evidence of appropriate prior approval could be provided. Untimely access removal The Council has no formal controls in place to ensure that user account privileges for financially relevant systems are removed when no longer required. Periodic user access review process needs to be formalised. User access review is a key management control ensuring currency (accounts belong to staff currently employed) and appropriateness of user access on the business
- applications. There is no formal and periodic process to review users with access to
financially relevant systems. Privileged user key activities should be recorded and reviewed Our review of IT access controls identified that while audit logs of privileged IT access activities within the system are maintained and secured from amendment, they are not reviewed. Unsupervised use of generic user accounts During our audit, we noted that when posting manual journals, [insert number] finance staff could access the general ledger system using a shared user account. All actions performed using this user account are logged but not reviewed. Insufficient password configuration Our audit identified that general ledger password parameters did not comply with the Council’s IT Security policy or good practice guidelines. The following settings are not enforced:
- maximum password age
- minimum password age
- password history
- number of unsuccessful login attempts.