What is COBIT?
COBIT - Control Objectives for Information and Related Technology framework was created by the information Systems Audit and Control Association - ISACA and the IT Governance Institute (ITGI) in 1992. It has been updated several times as technology changes. COBIT 5 was released in 2012 - the most recent.
What does COBIT entails?
The framework provides managers, auditors, and IT users with a set of measures, indicators, processes and best practices to maximize the benefit of information technology.
In addition, the COBIT framework is intended to assist in the development of appropriate IT governance and IT management within an organization.
Hows if the COBIT framework is organized?
The framework is organizes as follows:
What are the Business Objectives of COBIT?
Might include, but not limited to:
What are the Governance Objectives of COBIT?
The framework anticipates that IT governance will reframed by the following 5 focus areas:
What are the Information Criteria of COBIT?
the business requirements for information (ICE RACE) Integrity Confidentiality Efficiency Reliability Availability Compliance Effectiveness
What are the IT Resources of COBIT?
IT uses clearly defined processes to deploy people skills and technology infrastructure to run automated business applications and leverage business information. The resources and the processes are collectively referred to as enterprise architecture for IT.
What are the Domains and Processes of COBIT?
COBIT defines IT processes within the context of 4 domains that direct the delivery of solutions and services and ensure that directions are followed.
PO - Plan and Organize - provides direction to solution
and service delivery
AI - Acquire and Implement - provides solution of IT
needs
DS - Deliver and Support - provides svcs - translate
solution into svs received.
ME - Monitor and Evaluate - Ensure direction provided
in the planning and organizing
steps are followed in the
solution and svs processes
What are the controls in IT’s Control Monitoring?
They are:
What are the General and Application controls in control monitoring?
GC tend to be system wide, they are designed to ensure that an organization’s control environment is stable and well-managed, and include:
a. System development standards
b. Security management controls
c. Change management procedures
d. Software acquisition, development, operations, and maintenance.
AC focus on specific application, they prevent, detect, and correct transaction errors and fraud, providing reasonable assurance as to system:
a. Accuracy
b. Completeness
c. Validity
d. Authorization
What are the Input Controls in Control Monitoring?
The following source data controls regulate the integrity of input, which crucial to accurate and complete output.