top of page
Search
Writer's pictureTewodros Guday

The Importance of IS Audit: Why It's necessary for your Organization


In my last blog post, I promised to assess the importance of having an Information System audit in any organization. Here is why I am in favor of why an Information System Audit is important. But first, I want to specifically point out that financial technology (fintech) and other big companies must focus not only on the importance of IS audit presence but also on the impact it has on the business and what it brings to the overall security of the organization, starting from assets to human life and even business secrets. While the text may be lengthy, I trust you'll find it engaging and insightful. It offers a glimpse into the subject, as well as my personal experiences when interacting with a few companies in Ethiopia. These encounters shed light on their varying levels of awareness regarding the significance of IS audit within their organizations.


Information Systems (IS) audit holds significant importance in any organization due to its critical role in ensuring the security, reliability, and compliance of an organization's information technology and systems. There are multiple reasons why it is significant; however, I will mention some of them here to prompt your reflection. One of the critical aspects of leading a business in any domain is that any organization needs to know its business risks. IS audit helps identify and assess risks related to an organization's information systems. When an organization conducts regular audits, it can proactively identify vulnerabilities, potential threats, and weaknesses in its IT infrastructure, allowing it to take appropriate measures to mitigate these risks and enhance overall security. According to NIST, the Risk Management Framework (RMF) includes important activities to prepare the organization to manage security and privacy risks: categorizing the system and information processed, stored, and transmitted based on impact analysis; selecting controls to protect the system; implementing the controls; assessing to determine if the controls are in place; having senior officials make risk-based decisions to authorize the system to operate; and continuously monitoring control implementation and risk to the system [1].

Safeguarding sensitive data and preventing unauthorized access

Data is the foundation of any information system and is essential for its functioning, decision-making, and value creation. Without data, an information system would lack meaning, purpose, and functionality. IS audit plays a crucial role in safeguarding sensitive data and preventing unauthorized access, breaches, or leaks.

I recall a noteworthy incident from my interactions with a highly influential organization. During our conversation, I inquired about the storage location of their business-critical and decision-making documents. I asked whether they had a clear comprehension of who could access these documents and whether measures were in place to prevent unauthorized access by individuals lacking the necessary roles or permissions. The response I received indicated uncertainty, and it was acknowledged that their user management system and associated processes required evaluation. Intriguingly, they had yet to assess the extent of their business-critical data or its potential impact on their operations. By evaluating the effectiveness of security controls and measures, IS audits help ensure that data is properly protected and compliant with relevant regulations, such as GDPR and HIPAA. Effective evaluation of security controls and measures through IS audits ensures that data is properly protected and compliant with regulations like the General Data Privacy Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA).

IT practices and systems are aligned with requirements

When I inquire with auditors or senior-level employees about the post-audit report process, the response I receive is that the report is generated and submitted to the executive board. However, the significance lies not only in conducting audits as a mere formality but in the diligent pursuit of the audit outcomes. This involves taking ownership of the corrective actions outlined by auditors within the specified timeframe, ensuring their implementation, and thereby preventing potential unwarranted consequences. Compliance with industry-specific regulations and standards is essential for any organization to operate legally, ethically, and responsibly. It helps protect stakeholders, mitigate risks, enhance reputation, and contribute to the overall success and sustainability of the organization. Organizations often need to adhere to various industry-specific regulations and standards. IS audits ensure that the organization's IT practices and systems are aligned with these requirements, helping to avoid legal and financial penalties.

Effectively respond to and recover from unexpected disruptions

Business continuity refers to an organization's ability to maintain its essential functions and operations during and after disruptive events or crises. Business continuity is essential for safeguarding an organization's operations, reputation, and financial stability. By preparing for and effectively responding to disruptions, organizations can sustain their ability to deliver products and services, protect their stakeholders, and ensure long-term success. IS audit assesses an organization's disaster recovery and business continuity plans. By evaluating backup processes, redundancy measures, and recovery strategies, IS audits help ensure that the organization can effectively respond to and recover from unexpected disruptions.


In today's digital age, where organizations heavily rely on technology and information systems, system reliability and performance are integral to achieving operational excellence, customer satisfaction, and long-term success. System reliability and performance are critical aspects for the success and sustainability of an organization. IS audits examine the reliability and performance of an organization's information systems, helping to identify areas where systems may be underperforming or where improvements are needed to optimize efficiency and user experience.


The occurrence of any incident, whether it involves a security breach or a significant financial loss, consistently remains a critical concern for any organization. Reacting after such events occur and assigning blame is often useless, as it's already too late. Instead, a proactive approach involving the thorough evaluation of controls and processes is essential prior to the realization of any fraudulent activity. Fraud detection and prevention are crucial for protecting an organization's financial well-being, reputation, and overall success. By proactively identifying and mitigating fraud risks, organizations can create a secure and trustworthy environment for stakeholders, ensuring long-term viability and sustainable growth. Additionally, it is essential for organizations to safeguard their assets, maintain trust, and ensure the integrity of their operations. IS audits can help detect and prevent fraudulent activities within an organization's IT systems. By examining transaction logs, access controls, and authorization processes, auditors can identify unusual or unauthorized activities that may indicate fraud.

Organization without a governing strategy is building a house in the sand

Any organization without a governing strategy is building a house in the sand. IT governance refers to the framework of processes, structures, policies, and practices that guide and oversee the use of information technology within an organization. IT governance is crucial for organizations to effectively manage their IT assets, align technology with business goals, manage risks, and ensure responsible and transparent decision-making. It enhances organizational efficiency, resilience, and competitiveness in a technology-driven business environment.

At some point, when I inquire with auditors or senior-level employees about the post-audit report process, the response I receive is that the report is generated and submitted to the executive board. However, the significance lies not only in conducting audits as a mere formality but in the diligent pursuit of the audit outcomes. This involves taking ownership of the corrective actions outlined by auditors within the specified timeframe, ensuring their implementation, and thereby averting potential unwarranted consequences. IS audits evaluate the organization's IT governance structure, policies, and procedures. This ensures that IT resources are effectively managed, and decisions are aligned with the organization's goals and objectives.

Identifying and addressing risks associated with third-party relationships

Many organizations rely on third-party vendors for IT services and solutions. Vendor and third-party risk management are essential for organizations to maintain control over their operations, protect their assets, ensure data security, comply with regulations, and sustain their reputation. Organizations can mitigate potential disruptions and vulnerabilities, contributing to their overall success and resilience by proactively identifying and addressing risks associated with third-party relationships.

During my interactions with various companies, I've come across instances where they lack awareness about the necessity of evaluating third-party vendors or managing their supply chains. It appears that they may not consider it their responsibility to oversee how vendors safeguard their crucial business codes, the processes they follow, or their management of code libraries, including timely updates. This scenario underscores a lack of comprehension not only at the organizational level but also extends to the internal auditors. This highlights a gap in understanding the significance of Information Systems (IS) audits. IS audits help assess the security measures and practices of these vendors, reducing the risk of security breaches through third-party relationships.


Another important issue in any organization is the optimization of resources for effectiveness. Resource utilization is very important for organizations to achieve operational excellence, improve cost management, enhance productivity, and drive growth. Proper allocation and management of resources contribute to a more sustainable and competitive organization, capable of meeting customer demands, adapting to changes, and realizing strategic goals. IS audits assess the efficient use of IT resources, including hardware, software, and personnel. This can lead to cost savings and more effective resource allocation.


Management accountability is essential to any organization because it establishes a framework of responsibility, transparency, and ownership throughout the leadership hierarchy. As I previously stated above, accountability ensures that managers make well-informed and thoughtful decisions. When managers know they will be held responsible for the outcomes of their choices, they are more likely to carefully consider the potential consequences and make decisions that align with the organization's goals. When management is held accountable for their actions, decisions, and the performance of their teams, it promotes effective leadership, ethical behavior, and organizational success. IS audits provide an independent evaluation of an organization's IT practices, holding management accountable for the security and integrity of the organization's information systems. Specifically, being accountable to follow up on those corrective actions presented by the auditor.

Create a culture where every one of your employees understands the value of your assets

Ultimately, IS audit plays a critical role in ensuring the security, compliance, and effective management of an organization's information systems. It helps mitigate risks, enhance data protection, and optimize IT operations, ultimately contributing to the organization's overall success and resilience.

My message to any private or government office in Ethiopia is that I understand you may have an internal audit or have implemented external IS audit. However, what I would like to emphasize is a strategic approach to IS audit and its continuity. This is something you need to consider. It allows you to create a culture where every one of your employees understands the value of your assets, the business risks related to them, and takes precautionary approaches to ensure your business's existence.

During my assessment with one organization, they had a "fault-finder" approach to IS audit through internal audit. This approach completely destroyed the methodology of IS audit within the organization. The role of IS audit is not to find faults, but rather to understand the business strategy and determine whether the controls, procedures, and risks are aligned with the business requirements and are implemented accordingly in a continuous manner. It is not the role of the IS auditor to blame employees, but to identify gaps and provide input to further develop their controls, processes, systems, and expertise.

An IS audit does not serve as a cybersecurity solution nor does it shield you from security breaches. However, through the assessment of your information systems, it enables you to identify deficiencies in your assets, systems, processes, resources, or supply chain management. Subsequently, it offers recommendations to address these gaps, enhance your protective measures, and bolster the overall resilience of your business. This is why IS audit is crucial and maintains quality and resilience for the organization's existence.

39 views0 comments

Comments


Post: Blog2_Post
bottom of page