SteadyCert
Domain 1 · The IS Audit Process Card 1 / 52

CISA Domain 1: The IS Audit Process — Free Visual Study Notes

Section 1.1 Must-know

IS Audit Standards, Guidelines, Functions and Codes of Ethics

By the end of this card, you should be able to
Explain how ISACA standards, guidelines, and the code of professional ethics collectively establish the credibility and boundaries of IS audit practice.
Scenario

Alex Chen's first week at Meridian Corp ends with a pointed question from Priya Rao: 'The board is asking what gives our audit conclusions any weight. I want you to brief them tomorrow morning — three elements, what each one does, why we can't replace any of them with just good judgment.' Alex stares at the empty slide deck. He knows the framework exists; he's never had to defend why it exists. Priya adds: 'A board member is going to ask whether Guidelines are optional. You need to know what to say before they ask it.'

IS Audit Standards, Guidelines, Functions and Codes of Ethics
3 elements = 3 authority levels. Standards (mandatory) sit above Guidelines (advisory); Ethics bind the practitioner throughout.
How it works

IS audit credibility rests on three foundational elements defined by ISACA. Standards state the mandatory requirements that every IS auditor must satisfy — they define the minimum acceptable performance for IS auditing and reporting. Guidelines provide supporting guidance on how to comply with those standards, leaving room for professional judgment in specific circumstances. The Code of Professional Ethics governs the professional and personal conduct of ISACA members and certification holders. While standards are mandatory, guidelines are advisory — auditors should consider them and use professional judgment to determine the appropriate application. Together, these three elements ensure that IS audit conclusions carry authority with management, boards, and regulators.

🧠 Mnemonic
S·G·E
Standards set the floor, Guidelines show the way, Ethics bind the person — every IS auditor operates within all three.
At a glance
📋

Standards

What makes IS audit requirements mandatory?

  • Define minimum acceptable performance
  • Mandatory for all IS auditors
  • Cover auditing and reporting
  • Set by ISACA
🗺️

Guidelines

How does an auditor know how to apply standards?

  • Advisory, not mandatory
  • Explain how to comply with standards
  • Allow professional judgment
  • Provide context-specific application
⚖️

Code of Ethics

What governs auditor conduct beyond technical rules?

  • Applies to all ISACA members
  • Covers professional AND personal conduct
  • Binding on CISA holders
  • Foundation of audit credibility
Try yourself

A new IS auditor at Meridian Corp asks: 'Why do we follow ISACA's framework at all — can't we just use professional judgment?' What is the key distinction between Standards and Guidelines that explains why professional judgment alone is insufficient?

— Pause to recall —
Standards are mandatory — professional judgment cannot override them. Guidelines are advisory — professional judgment governs their application. The Code of Ethics binds the practitioner regardless of engagement context.

Three interlocking elements give IS audit its credibility. Standards define mandatory requirements — the minimum acceptable performance any IS auditor must meet. Guidelines explain how to implement those standards, using professional judgment to adapt to context. The Code of Professional Ethics governs the professional and personal conduct of ISACA members and CISA holders, establishing the integrity foundation on which the whole framework rests. Without adherence to these elements, an IS audit activity lacks the credibility stakeholders require.

Why this matters: Exam questions routinely test which element is mandatory versus advisory. Standards = mandatory; Guidelines = advisory (use professional judgment). The Code of Ethics applies to all ISACA members and certification holders — not just auditors performing engagements.
🎯
Exam tip

The exam distinguishes mandatory (Standards) from advisory (Guidelines). If a question asks what an IS auditor 'must' do, the answer traces to Standards; what an auditor 'should consider' traces to Guidelines.

See also: 1.1.1 1.1.2 1.1.3
Section 1.1.1 Must-know

ISACA IS Audit and Assurance Standards

By the end of this card, you should be able to
Identify the three audiences ISACA IS Audit and Assurance Standards inform and state what mandatory requirement each audience receives.
Scenario

Janet Holloway presents Meridian's audit committee with the internal audit charter. A new board member stops her on page three: 'ISACA Standards are cited throughout this charter. Before I sign, I need to understand — these standards, do they bind your auditors, or do they bind us as a committee in terms of what we can expect from the audit work?' Janet pauses. The question matters: the board member is asking whether the standards are a floor for performance or a ceiling for reliance. She clicks back to the ISACA Standards slide.

ISACA IS Audit and Assurance Standards
3 audiences = 3 obligations. One mandatory document sets the floor for auditors, informs management, and binds credential holders.
How it works

ISACA IS Audit and Assurance Standards define mandatory requirements for IS auditing and reporting. They address three distinct audiences. For IS auditors, the standards establish the minimum acceptable performance level required to fulfill professional responsibilities. For management and other interested parties — including boards, regulators, and clients — the standards communicate what the IS audit profession expects of its practitioners, so those parties can calibrate how much reliance to place on audit conclusions. For holders of the CISA designation, the standards specify the professional performance obligations that accompany the credential. Because standards are mandatory, professional judgment governs their application — not whether to apply them.

🧠 Mnemonic
IMA
IS Auditors get minimum requirements, Management gets assurance information, Audit-holders (CISA) get conduct rules — IMA: three audiences, three messages.
At a glance
🔍

IS Auditors

What do Standards require of IS auditors?

  • Minimum acceptable performance
  • Meet responsibilities under the Code of Ethics
  • Mandatory compliance
  • Professional judgment in application
🏛️

Management & Interested Parties

What do Standards tell management to expect?

  • Profession's expectations for practitioner work
  • Basis for reliance on audit conclusions
  • Transparency into audit quality floor
  • Board and regulator communication
🎓

CISA Holders

What do Standards require of CISA credential holders?

  • Professional performance requirements
  • Credential-specific obligations
  • Ongoing compliance with mandatory rules
  • Performance tied to certification status
Try yourself

Meridian Corp's audit committee asks Janet Holloway: 'We rely on IS audit conclusions, but what gives us confidence those conclusions are at a minimum acceptable level?' What is the specific audience-message the ISACA Standards deliver to management and interested parties?

— Pause to recall —
Standards communicate to management and interested parties what the IS audit profession expects of its practitioners — establishing the known quality floor that allows external parties to calibrate their reliance on audit conclusions.

ISACA IS Audit and Assurance Standards serve three audiences simultaneously. For IS auditors, they define the minimum level of acceptable performance required to meet professional responsibilities under the Code of Ethics. For management and other interested parties — such as boards and regulators — they communicate what the profession expects of its practitioners, enabling informed reliance on audit conclusions. For holders of the CISA designation specifically, they articulate the professional performance requirements attached to that credential. Standards are mandatory: professional judgment determines how they are applied, not whether they apply.

Why this matters: The exam tests whether candidates recognize that Standards serve multiple audiences, not just auditors. A question about what management can expect from an IS audit engagement is answered by the Standards, not the Guidelines.
🎯
Exam tip

When a question asks what management or a board can rely on from IS audit work, the answer is rooted in ISACA Standards — not Guidelines. Standards are mandatory; they exist to give external parties a known quality floor.

📰Real World

When the U.S. Public Company Accounting Oversight Board inspected Deloitte Brazil's audits in 2016, it found partners had altered work papers to hide that audit procedures had not actually been performed. The PCAOB fined Deloitte Brazil USD $8 million — the largest penalty the PCAOB had ever imposed at that time — because the core standard violated was not a technical rule but the most basic "General" standard of all: integrity and due professional care.

See also: 1.1 1.1.2 1.10
Section 1.1.2 Must-know

ISACA IS Audit and Assurance Guidelines

By the end of this card, you should be able to
Distinguish ISACA Guidelines from Standards, and explain when and how an IS auditor applies professional judgment to guidelines.
Scenario

Alex Chen is documenting the sampling approach for the MERIDIA-1 access review. The ISACA guideline recommends a specific attribute-sampling table, but the population size makes a different method more efficient. Alex flags the deviation in a draft work paper note — but before he submits it, he realizes he's written only 'used alternative method.' Priya Rao reviews the draft and sets it back on his desk without signing off. 'This won't hold up,' she says. 'Why not?' Alex asks. He doesn't answer. He has until morning.

ISACA IS Audit and Assurance Guidelines
2 authority levels = 1 required + 1 advisory. Standards are locked; Guidelines need judgment to open.
How it works

ISACA IS Audit and Assurance Guidelines explain how to comply with IS Audit and Assurance Standards. Unlike standards, guidelines are advisory: an IS auditor should consider them and apply professional judgment to determine the appropriate implementation for each engagement context. When an auditor departs from a recommended guideline, that departure must be supported by documented reasoning that demonstrates the underlying standard is still being met. Guidelines also reference tools, techniques, and methodologies useful to IS auditors. The relationship is hierarchical: standards define the mandatory destination; guidelines suggest routes. Auditors choose routes using professional judgment.

🧠 Mnemonic
Standards = SHALL, Guidelines = SHOULD
Standards use 'shall' language — mandatory. Guidelines use 'should' language — advisory with professional judgment. When the exam says 'shall,' it means standards territory.
At a glance
🔒

Standards

What must an IS auditor always comply with?

  • Mandatory requirements
  • Minimum performance floor
  • No professional judgment to opt out
  • Basis for professional responsibility
🗺️

Guidelines

What does a guideline tell an auditor to do?

  • Advisory — should consider
  • Explain how to implement standards
  • Allow context-specific adaptation
  • Departure must be documented and justified
⚖️

Professional Judgment

What does professional judgment govern in IS audit?

  • When and how to apply guidelines
  • Justifying departures from guidelines
  • Adapting guidelines to specific contexts
  • Demonstrating standards are still met
Try yourself

Alex Chen departs from an ISACA Guideline on sampling methodology, choosing a more efficient approach for the MERIDIA-1 population. Has Alex violated his professional obligations, and what specifically must he do to keep his work defensible?

— Pause to recall —
No violation — Guidelines are advisory. But Alex must use professional judgment to justify any deviation and be prepared to demonstrate how the chosen approach still achieves the underlying Standard.

ISACA Guidelines provide guidance on how to comply with the IS Audit and Assurance Standards, but unlike Standards they are not mandatory. An IS auditor should consider the guidelines in determining how to implement standards, and should use professional judgment to determine how to apply them in context. Critically, if an auditor departs from a guideline, that departure must be justified — the auditor must be able to show that the chosen approach still meets the underlying standard. Guidelines also support the use of tools, techniques, and methodologies, giving practical implementation pathways without prescribing a single correct method.

Why this matters: The mandatory vs. advisory distinction is a frequent exam trap. Standards = must follow. Guidelines = should consider, with professional judgment. If a question presents a scenario where an auditor deviates from a guideline, the key issue is whether the standard was still satisfied.
🎯
Exam tip

Exam distractors often treat guidelines as mandatory. They are not — but deviating from a guideline without documented justification is a professional concern. The test question usually asks what happens when an auditor cannot follow a guideline exactly.

📰Real World

In 2018, the UK Financial Reporting Council fined PwC £6.5 million (plus £700,000 in costs) over its audit of British Home Stores (BHS). The FRC found that PwC's audit work fell below the required standard in several areas, including the auditor's assessment of going-concern risk. The case illustrates the professional consequence of departing from audit standards without adequate documented justification: where an auditor's judgement diverges from established guidance and cannot be supported by rigorous reasoning, the departure itself becomes the evidence of a deficiency. Guideline departures that are not documented and justified expose auditors to exactly this kind of regulatory action.

See also: 1.1 1.1.1 1.5.4
Section 1.1.3 Must-know

ISACA Code of Professional Ethics

By the end of this card, you should be able to
State whom the ISACA Code of Professional Ethics governs and identify its primary behavioral obligations for IS audit professionals.
Scenario

During a Meridian Corp access-control audit, Alex Chen realizes that one of the vendors under review — a network security firm — is owned by him brother-in-law. Alex hasn't mentioned it. The audit is three weeks in; removing himself now would require re-assigning sections he's already documented. Priya Rao hasn't noticed the name overlap yet. The vendor's contract is up for renewal next month, and the audit finding will influence the committee's decision. Alex stares at the engagement file.

ISACA Code of Professional Ethics
Alex walks the conflict-of-interest disclosure to the audit director, acting on Articles 2 (objectivity) and 6 (inform appropriate parties).
How it works

The ISACA Code of Professional Ethics governs the professional AND personal conduct of all ISACA members and certification holders (CISA, CISM, CRISC, CGEIT). It has SEVEN articles:

  1. Support the implementation of, and encourage compliance with, appropriate standards and procedures for governance of enterprise IS&T — audit, control, security, risk
  2. Perform duties with objectivity, due diligence, and professional care, in accordance with professional standards
  3. Serve in the interest of stakeholders in a lawful manner, maintaining high standards of conduct and not discrediting the profession or the Association
  4. Maintain privacy and confidentiality of information obtained during activities — disclosure is permitted only when required by legal authority
  5. Maintain competency in respective fields and undertake only activities one can reasonably complete with the necessary skills
  6. Inform appropriate parties of the results of work performed, disclosing all significant facts that, if not disclosed, would distort reporting
  7. Support the professional education of stakeholders in their understanding of IS&T governance

Failure to comply can lead to investigation and disciplinary action including loss of CISA designation.

At a glance
👤

Scope

Who is bound, when?

  • All ISACA members
  • All CISA / CISM / CRISC / CGEIT holders
  • Professional AND personal conduct
  • Not limited to engagements
📜

Articles 1-3 (Standards & Stakeholders)

What does the Code require for the work itself?

  • Article 1: Support standards & procedures for IS governance
  • Article 2: Objectivity, due diligence, professional care
  • Article 3: Serve stakeholders lawfully; don't discredit profession
🔒

Articles 4-5 (Information & Skills)

What must the auditor protect and possess?

  • Article 4: Privacy & confidentiality of information obtained
  • Article 4: Disclosure only when required by legal authority
  • Article 5: Maintain competency in respective fields
  • Article 5: Undertake only what you can reasonably complete
📢

Articles 6-7 (Reporting & Education)

What does the auditor owe upward and outward?

  • Article 6: Inform appropriate parties of results
  • Article 6: Disclose significant facts that would distort reporting if hidden
  • Article 7: Support professional education of stakeholders
  • Article 7: Help stakeholders understand IS&T governance
Try yourself

During a Meridian Corp audit, Alex discovers a personal conflict of interest with a vendor being reviewed. What framework governs Alex's obligation here, to whom does it apply, and what must Alex do?

— Pause to recall —
ISACA's Code of Professional Ethics has seven articles and governs all ISACA members and certification holders. Alex must disclose the conflict to appropriate parties (the audit lead and audit director) under Article 2 (objectivity) and Article 6 (inform of significant facts). Self-management without disclosure violates the Code.

The ISACA Code of Professional Ethics governs both professional and personal conduct of all ISACA members and certification holders. It has seven articles:

  1. Support standards and procedures for IS governance
  2. Perform duties with objectivity, due diligence, and professional care
  3. Serve stakeholders lawfully and avoid discrediting the profession
  4. Maintain privacy and confidentiality
  5. Maintain competency
  6. Inform appropriate parties of results, including any significant facts that would distort reporting if undisclosed
  7. Support professional education of stakeholders

The conflict-of-interest scenario maps primarily to Article 2 (objectivity) and Article 6 (informing appropriate parties of significant facts) — Alex must disclose to Priya and Janet so the engagement can be re-staffed if necessary, regardless of whether the relationship would actually influence findings. Self-management of a conflict without disclosure violates the Code.

Why this matters: The exam tests that the Code applies to personal conduct, not just professional work — and that disclosure of conflicts is mandatory. Incorrect options often suggest an auditor can self-manage a conflict quietly.
🎯
Exam tip

The ISACA Code has seven articles. Three exam traps: (a) the Code applies to personal conduct, not just on-the-job — outside relationships trigger disclosure obligations; (b) Confidentiality (Article 4) yields ONLY to legal authority — not curiosity, not a manager's request; (c) conflict-of-interest scenarios require IMMEDIATE disclosure under Articles 2 and 6 — silent self-recusal is wrong.

📰Real World

In 2019, KPMG agreed to pay the U.S. SEC USD $50 million after partners were found to have used leaked PCAOB inspection plans — and separately cheated on internal training exams — in direct violation of both competence and integrity principles. Six individuals (five former KPMG executives and one former PCAOB employee) were criminally charged beginning in 2018. The quote "simply unacceptable" came from SEC Chairman Jay Clayton, not KPMG's CEO.

See also: 1.1 1.10 1.5.5
Section 1.1.4 Memorize

ITAF™ — IS Audit and Assurance Framework

By the end of this card, you should be able to
Describe the purpose of ITAF and explain how it organizes IS audit professional practices into a single reference model.
Scenario

Three days before Meridian Corp's access-management audit report is due, Alex Chen flags a finding: the IT team's user-provisioning process lacks a documented segregation-of-duties matrix. He cited an ITAF Guideline — not a Standard — as the basis. At the exit conference, Meridian's IT director leans forward: 'That's a guideline, not a standard. It's advisory. You can't issue a formal finding against us for not following advisory material.' Priya Rao, sitting beside Alex, keeps his expression neutral. Alex knows the underlying control gap is real, but the IT director has a point — ITAF's three layers do not carry the same weight. If Alex's finding rests on the Guidance layer alone, the IT director can legitimately push back. Alex must decide whether to reframe the finding under a Standard, downgrade it to a recommendation, or hold the original language.

ITAF™ — IS Audit and Assurance Framework
3 tiers = 3 ITAF layers. Standards sit atop, Guidance in the middle, Tools at the base — one integrated framework for IS audit practice.
How it works

ITAF — the IT Assurance Framework — is ISACA's comprehensive reference model for IS audit and assurance professional practices. It is organized in three layers. The top layer, Professional Practices, establishes standards covering IS auditor roles, responsibilities, required knowledge and skills, conduct, and reporting requirements. The middle layer, Guidance, provides guidelines explaining how to implement those standards using professional judgment. The bottom layer, Tools and Techniques, supplies practical methodologies, templates, and tools. ITAF also defines the terminology specific to IS assurance, creating a common professional vocabulary. It functions as a single integrating reference rather than a replacement for individual standard documents.

🧠 Mnemonic
ITAF = Integrate, Then Audit Fully
ITAF integrates Standards, Guidelines, and Tools into one framework so the auditor can audit fully without consulting multiple disconnected sources.
At a glance
📋

Professional Practices

What does ITAF's top layer define?

  • IS auditor roles and responsibilities
  • Required knowledge and skills
  • Conduct and reporting requirements
  • Diligence standards
🗺️

Guidance Layer

What does the ITAF guidance layer provide?

  • Implementation guidance for standards
  • Context-specific application
  • Professional judgment pathways
  • Advisory — not mandatory
🔧

Tools & Techniques

What practical resources does ITAF offer?

  • Audit methodologies
  • Templates and checklists
  • Sampling techniques
  • Data analysis approaches
📖

Common Vocabulary

What additional function does ITAF serve?

  • Defines IS assurance terms and concepts
  • Creates shared professional vocabulary
  • Enables consistent communication
  • Aligns IS audit with broader governance
Try yourself

A CISA holder issues an audit finding citing only an ITAF Guideline document. The auditee refuses to remediate, arguing the document is advisory and not binding. The same control gap is also addressed — in general terms — in an ITAF Standard. Which layer takes precedence, and how should the auditor reframe the finding?

— Pause to recall —
Alex should reframe the finding under the ITAF Standard that addresses the same control gap. A Standard (Professional Practices layer) is mandatory; a Guideline (Guidance layer) is advisory. The IT director is correct that a finding cannot stand on a Guideline alone. If a Standard covers the gap — even in general terms — Alex must cite the Standard as the basis for a formal finding. If only a Guideline applies, he must downgrade the item to a recommendation, not a finding.

The IT director is technically correct: ITAF's three layers do not carry equal weight. The top layer — Professional Practices — contains Standards that are mandatory for all ISACA IS audit professionals. The middle layer — Guidance — contains Guidelines that are advisory; they explain how to implement Standards using professional judgment, but they are not mandatory requirements. The bottom layer — Tools and Techniques — offers practical methodologies and templates with no binding authority at all.

Because Alex's finding is based solely on a Guideline, the IT director has legitimate grounds to dispute it. Alex has two paths: (1) Cite the Standard instead. The scenario states the same control gap (lack of a documented segregation-of-duties matrix) is addressed — in general terms — in an ITAF Standard. Alex should reframe the finding to cite that Standard as the authoritative basis. A formal finding grounded in a mandatory Standard is defensible against the auditee's objection. (2) Downgrade to a recommendation. If Alex cannot map the gap to a Standard, he must downgrade the item from a finding to a recommendation — acknowledging it reflects advisory best practice rather than a mandatory requirement. He may still reference the Guideline, but he cannot call it a binding audit finding.

Tools and Techniques (the third layer) are relevant only for explaining how to implement a control — they do not provide citation authority for a finding. The correct action is to identify the applicable Standard, reframe the finding citation, and reissue before the report is finalized.

Why this matters: ITAF is tested as the overarching integrating framework — broader than any single standard or guideline. Exam questions may distinguish it from COBIT (governance) or ISO frameworks. ITAF is specifically ISACA's IS audit professional-practice framework.
🎯
Exam tip

ITAF is ISACA's IS audit framework specifically — not COBIT (IT governance) or COSO (internal control). If an exam question asks about the source of IS auditor professional practice standards, roles, and techniques in a single reference, the answer is ITAF.

📰Real World

When India's Satyam Computer Services fraud collapsed in 2009 (a USD $1.47 billion falsification), regulators across jurisdictions scrambled for a common language to describe what the auditors had failed to do. Frameworks like ITAF exist so that when cases cross borders — as Satyam did across India, the U.S. SEC, and the PCAOB — auditors, regulators, and courts can reference the same definitions of "planning," "evidence," and "independence" instead of arguing over terms.

See also: 1.1 1.1.1 1.1.2
Section 1.1.5 Must-know

IS Internal Audit Function

By the end of this card, you should be able to
Explain how the IS internal audit function is established, what an audit charter provides, and how IS audit expertise is sourced when it is not fully available internally.
Scenario

Meridian Corp's IS audit team has been denied access to the CFO's financial reporting system three times in two weeks. Alex Chen escalates to Janet Holloway: 'We can't complete the SOX scope without those system logs.' Janet pulls the audit charter from the file cabinet and reads the access clause — it references 'systems in scope as defined by the Audit Committee,' but the CFO's system was added to scope after the charter was last signed. The CFO's assistant sends one more email: 'Access requires CFO approval.' Janet stares at the charter. The audit committee meeting is Thursday.

IS Internal Audit Function
3-step flow = Charter → Mandate → Expertise. Board approval at the top gives IS audit authority independent of management.
How it works

The IS internal audit function is established through an audit charter approved by the board of directors and audit committee, or by senior management where those bodies do not exist. The charter gives IS auditors a clear mandate to conduct IS audit activities and defines the scope and boundaries of their authority. Because effective IS audit requires specialized technical expertise — in areas such as database security, network architecture, or cloud infrastructure — not every organization can maintain all required skills internally. When a gap exists, the function may be co-sourced, combining internal audit staff with external IS audit specialists, or fully outsourced to an external provider. In all models, independence and objectivity must be preserved.

🧠 Mnemonic
CME
Charter grants authority → Mandate defines scope → Expertise delivers it — CME: three foundations of the IS internal audit function.
At a glance
📜

Audit Charter

What establishes the IS audit function's authority?

  • Approved by board of directors + audit committee
  • Or by senior management if those bodies absent
  • Defines mandate and scope
  • Constitutional document for IS audit
🔑

Mandate

What does the charter grant the IS audit function?

  • Clear mandate to perform IS audit
  • Authority to access systems and records
  • Independence from management
  • Defined reporting lines
🧠

IS Expertise

How is IS audit expertise sourced when internal capacity is insufficient?

  • Co-sourcing with external IS specialists
  • Full outsourcing as an option
  • Independence must be maintained
  • Technical specialization (DB, cloud, network)
⚖️

Independence

Why must IS audit be independent of management?

  • Management is the auditee
  • Charter authority flows from board, not management
  • Prevents conflict of interest
  • Required by ISACA Standards
Try yourself

Meridian Corp's IS audit team discovers a critical access-control gap in the CFO's division. The CFO objects that the audit team had no authority to review his systems without prior approval. What document establishes the IS audit team's authority to access any system, and who must approve it to preserve independence?

— Pause to recall —
The audit charter, approved by the board or audit committee (not management), grants the IS audit team authority to access any system in scope. When the charter is approved by management rather than the board, the independence of the audit function is compromised.

The IS internal audit function must be established by an audit charter approved by the board of directors and the audit committee, or by senior management if those bodies do not exist. The charter gives IS auditors a clear mandate to perform the IS audit function and defines the scope of their authority. Because IS audit requires specialized technical knowledge, not every organization can staff a full team internally. In those cases, the IS audit function may be co-sourced — combining internal staff with external IS audit specialists or consultants — or the entire function may be outsourced. Regardless of sourcing model, the function must maintain independence and objectivity.

Why this matters: The audit charter is the IS audit function's constitutional document. Exam questions test that the charter must be board/committee-approved — not just management-approved — and that co-sourcing is a legitimate staffing model that still requires independence.
🎯
Exam tip

The audit charter must be approved at board/committee level — not just by senior management — because management is the subject of many IS audits. If an exam question presents a charter approved only by the CIO or CFO, that is a control gap.

📰Real World

In the 2003 Parmalat collapse in Italy (a €14 billion fraud), the internal audit function reported to the CFO — the very person orchestrating the fraud. There was no charter establishing independent reporting to the board. Without that piece of paper, auditors had neither authority nor protection, and the scheme went undetected for years. Parmalat became known as "Europe's Enron" precisely because the failure wasn't exotic — it was a missing charter.

See also: 1.10.1 1.1.3 1.3
Section 1.2 Must-know

Types of Audits, Assessments and Reviews

By the end of this card, you should be able to
Distinguish the major types of IS audits, assessments, and reviews and identify the primary purpose of each type.
Scenario

Meridian Corp receives three simultaneous requests: regulators want evidence of SOX controls, legal wants to trace a suspected internal fraud, and the board wants assurance that IT operations support the five-year strategy. Janet Holloway pulls Alex Chen in: 'Three requests, three different engagement types. I need you to scope them separately — scope, evidence standard, report format. You have one hour before the steering committee call. Which one gets a legal hold notice, and why?'

Types of Audits, Assessments and Reviews
5 boxes = 5 audit types. Forensic (sealed chain) has unique legal evidence standards — the most-tested distinction.
How it works

IS auditors perform multiple types of engagements, each with a distinct purpose. A financial audit verifies that financial statements accurately reflect underlying transactions. An operational audit assesses whether IT systems and processes are working effectively and efficiently in support of business objectives. An IS audit examines controls over the confidentiality, integrity, and availability of information systems. A compliance audit tests whether the organization adheres to specific laws, regulations, or standards — such as SOX, GLBA, or PCI-DSS. A forensic audit is a specialized investigation to collect and preserve evidence of potential misconduct, fraud, or illegal acts for possible legal proceedings. The engagement type determines scope, applicable standards, evidence-handling requirements, and report format.

🧠 Mnemonic
FOICF
Financial, Operational, IS, Compliance, Forensic — the five major audit types an IS auditor encounters. Remember: Forensic has a legal evidence chain-of-custody requirement the others do not.
At a glance
💰

Financial Audit

What does a financial audit verify?

  • Accuracy of financial records
  • Reliability of financial statements
  • Transaction integrity
  • Often external auditor scope
⚙️

Operational Audit

What does an operational/IS audit evaluate?

  • Effectiveness of IT systems
  • Efficiency of IT processes
  • Alignment of IT with business goals
  • Internal audit common scope
📋

Compliance Audit

What does a compliance audit test?

  • Adherence to laws and regulations
  • Control procedure compliance
  • SOX, GLBA, PCI-DSS requirements
  • Specific standard testing
🔎

Forensic Audit

What makes a forensic audit unique?

  • Designed for legal proceedings
  • Evidence preservation and chain of custody
  • Fraud detection and attribution
  • Legal evidence standards apply
Try yourself

Meridian Corp's legal team suspects an employee has altered transaction records. The IS audit team is called in. Which audit type applies to this engagement, and what distinguishes it from the compliance and operational audits the team runs during normal planning cycles?

— Pause to recall —
A forensic audit (or investigation). It is distinguished by its legal evidence standard, chain-of-custody requirements, and narrowly scoped objective (determine whether fraud occurred and gather evidence) — unlike compliance audits (which test adherence to controls) or operational audits (which evaluate efficiency and effectiveness).

IS audit encompasses several distinct engagement types. A financial audit verifies the accuracy of financial records and statements. An operational audit evaluates whether IT systems and processes support business objectives effectively and efficiently. An IS audit broadly examines controls over information systems — covering confidentiality, integrity, and availability. A compliance audit tests adherence to specific laws, regulations, or standards (such as SOX or PCI-DSS). A forensic audit is a specialized investigation designed to gather and preserve evidence for potential legal proceedings, including fraud detection and attribution. The type of audit determines scope, evidence standards, and reporting requirements.

Why this matters: The exam tests type recognition — especially distinguishing compliance (control adherence) from operational (efficiency and effectiveness) and forensic (legal evidence standard) audits. Forensic audits require evidence-preservation chain of custody that standard audits do not.
🎯
Exam tip

The forensic audit is the most distinct type — it requires chain-of-custody evidence handling from the start because findings may be used in legal proceedings. Starting a forensic investigation using standard audit evidence procedures is a control failure.

📰Real World

After the 2013 Target breach exposed 40 million credit-card numbers, post-incident reporting revealed Target had recently passed a PCI DSS compliance audit. Compliance audits check box-ticking against specific rules; the actual vulnerability — a third-party HVAC vendor's network access — would have been the domain of a third-party service audit or a deeper IS audit focused on network segmentation. Target settled with 47 U.S. states for USD $18.5 million and paid hundreds of millions more in associated costs.

See also: 1.2.1 1.2.2 1.5.5
Section 1.2.1 Must-know

Control Self-Assessment (CSA)

By the end of this card, you should be able to
Define control self-assessment, explain who conducts it, and identify the IS auditor's role within a CSA process.
Scenario

Meridian Corp's IT operations manager hands Alex Chen a thick binder: 'We ran our own access-control review last quarter — CSA report, full scope, signed off by all process owners.' He slides it across. 'This should satisfy your audit objective.' Alex reads the cover page. The CSA methodology, the facilitator, and the scope all look solid. He sets the binder down and opens his laptop. Priya Rao watches from the doorway: 'You're not going to rely on that alone, are you?' Alex hesitates. The report looks thorough. The process owners are credible. The question is whether that's enough.

Control Self-Assessment (CSA)
4-step flow = Self-assess → Facilitate → Report → Validate. IS auditor validates last — CSA results are input, not conclusion.
How it works

Control self-assessment (CSA) is a management technique in which the staff and management of an organizational unit assess the effectiveness of their own internal controls, often with a neutral facilitator guiding the process. The purpose is to provide assurance to stakeholders — customers, regulators, and the organization itself — that the internal control environment is functioning as intended. CSA results are produced by process owners, not by independent auditors. An IS auditor's role is to evaluate the CSA process quality and determine how much reliance to place on its findings as audit evidence. CSA supplements independent audit work but does not replace it. When CSA results are deemed reliable, the IS auditor may reduce the scope of independent testing in those areas.

At a glance
👥

Who Conducts CSA

Who performs a control self-assessment?

  • Process owners and their management
  • Facilitated by a neutral internal party
  • Not the IS auditor
  • Unit being assessed performs the work
🎯

Purpose

Why does an organization conduct CSA?

  • Assure stakeholders control system is reliable
  • Ensure control objectives are met
  • Management accountability mechanism
  • Can narrow scope of independent audit
🔍

IS Auditor Role

What does the IS auditor do with CSA results?

  • Review the CSA process quality
  • Validate CSA results
  • Determine reliance level for audit evidence
  • Does NOT replace independent audit
⚠️

Limitations

What can CSA not do?

  • Cannot replace independent IS audit
  • Self-review introduces objectivity risk
  • IS auditor must validate rigor
  • Management bias may affect results
Try yourself

Meridian Corp's IT department conducts its own review of access controls and presents the results to the IS audit team as evidence that controls are operating effectively. What is the IS auditor's responsibility when CSA results are provided as assurance evidence, and why can they not simply be accepted as sufficient?

— Pause to recall —
The IS auditor must independently validate the CSA results — CSA is a management tool that reflects what process owners think about their controls. The auditor's role is to assess whether that belief matches reality. Accepting CSA results without validation substitutes management's self-assessment for independent assurance.

Control self-assessment (CSA) is an assessment of controls performed by the staff and management of the unit being assessed — the process owners themselves, often facilitated by a neutral internal facilitator. It assures stakeholders that the internal control system is reliable and ensures that each control area's objectives are being met. The IS auditor's role in CSA is evaluative: the auditor reviews the CSA process, validates its results, and determines whether those results can be relied upon as audit evidence. CSA is a management technique; it does not replace independent IS audit. The IS auditor must evaluate whether CSA objectivity and rigor are sufficient to reduce the scope of independent testing.

Why this matters: The exam tests the distinction between CSA (management-led self-review) and independent IS audit. CSA can supplement audit work but cannot replace it. The IS auditor's job is to assess CSA quality and decide how much reliance to place on it.
🎯
Exam tip

CSA is a management tool, not an audit tool. The IS auditor uses CSA results as potential evidence — but only after assessing the quality and objectivity of the CSA process. An exam scenario showing CSA results used without IS auditor validation is a control gap.

📰Real World

Wells Fargo's fake-accounts scandal (2016) unfolded while branch teams were self-assessing their controls as adequate. Over 3.5 million unauthorized accounts were opened, and the bank ultimately paid USD $3 billion in 2020 to settle criminal and civil charges. The lesson: self-assessment without independent verification becomes a rubber stamp, and when self-interest creeps in, the CSA process is the first thing that quietly bends.

See also: 1.2 1.4.6 1.6.1
Section 1.2.2 Must-know

Integrated Auditing

By the end of this card, you should be able to
Define integrated auditing and explain why IS auditors must understand business controls while financial/operational auditors must understand IT controls.
Scenario

Meridian Corp's external financial auditors flag a discrepancy: loan origination totals in the financial statements don't reconcile with the core banking system. The external team has traced the numbers three times and can't explain the gap. They escalate to Alex Chen. He pulls up the MERIDIA-1 access logs and sees something the financial team couldn't: a batch-processing account with elevated permissions made 47 adjustments to loan records during month-end close — no approval workflow, no audit trail. Alex looks at the external lead: 'I think I know where your gap is.' The lead looks at Alex's screen. 'How did we miss that for three weeks?' Alex opens a blank coordination memo.

Integrated Auditing
2 domains = 1 integrated view. IS controls (left) + Business controls (right) must meet in the middle for reliable conclusions.
How it works

Integrated auditing is an approach that combines IT control procedures with business process or financial audit procedures into a unified engagement. Because business processes now depend heavily on IT systems to record, process, and report transactions, financial and operational auditors cannot fully evaluate process reliability without understanding how IT controls govern data integrity. Similarly, IS auditors must understand the business control objectives that IT systems are meant to support. Integrated auditing bridges these domains. In practice, it means that IS auditors and financial or operational auditors work together — or that individual auditors develop competency in both areas — so that conclusions about control effectiveness reflect the full picture rather than only the IT or only the business perspective.

🧠 Mnemonic
IT + Business = Integrated
Integrated auditing = IT controls + Business controls examined together. Neither half alone gives a complete picture of control effectiveness.
At a glance
📊

IS Auditor's Expansion

What must IS auditors understand beyond IT?

  • Business control structures
  • Business process objectives
  • Financial transaction flows
  • How IT outputs feed business decisions
💻

Financial/Operational Auditor's Expansion

What must financial auditors understand about IT?

  • IT control structures
  • System access and change controls
  • Data integrity mechanisms
  • How IT processes transactions
🔗

Why Integration Matters

Why can't IT and business audits be completely separate?

  • Business processes depend on IT
  • IT weaknesses create business control gaps
  • Financial conclusions may be wrong without IT view
  • Complete picture requires both domains
Try yourself

Meridian Corp's external financial auditors and the internal IS audit team are reviewing the same loan-origination process. The external team focuses on financial accuracy; the IS team focuses on IT controls. Why must both teams understand each other's domain, and what is the approach called?

— Pause to recall —
Integrated auditing — because business processes depend on IT, so financial auditors must understand IT control structures, and IS auditors must understand business control structures, to reach valid conclusions.

Integrated auditing recognizes that business processes and IT systems are inseparable. Because critical business transactions are processed by IT, a financial or operational auditor who ignores IT controls may reach incorrect conclusions about the reliability of financial data. Conversely, an IS auditor who ignores business control objectives cannot determine whether IT controls actually support those objectives. Integrated auditing is the process by which appropriate audit procedures — from both the business and IT perspectives — are combined into a single audit approach. It requires IS auditors to develop understanding of business controls, and financial/operational auditors to develop understanding of IT control structures.

Why this matters: The exam tests whether candidates understand that IT and business auditing are not separate silos. Integrated auditing is the exam's answer when a question involves an audit that must evaluate both IT controls and financial or operational controls in the same engagement.
🎯
Exam tip

Integrated auditing is the exam's answer when a scenario involves both financial accuracy questions and IT system reliability questions in the same audit. The key principle: you cannot conclude on business process reliability without examining the IT controls that process the transactions.

📰Real World

The 2008 Société Générale rogue-trader loss of €4.9 billion wasn't a pure IT problem or a pure controls problem — it was the intersection. Trader Jérôme Kerviel exploited both weak access controls (IT) and a lax supervisory culture (operational). An integrated audit approach that combined IS and operational disciplines could have joined the dots; separate audits missed them because each side assumed the other was catching it.

See also: 1.2 1.4.1 1.6.1
Section 1.3 Must-know

Risk-Based Audit Planning

By the end of this card, you should be able to
Explain the purpose of risk-based audit planning and distinguish between short-term and long-term audit planning considerations.
Scenario

Janet Holloway hands Alex Chen a copy of last year's IS audit plan and this year's draft. They look almost identical — same scope areas, same timing, same resource allocation. 'What changed this year?' Janet asks. Alex scans the list: Meridian Corp moved payroll to a new cloud provider, MERIDIA-1 had two significant architecture changes, and a regulatory examination flagged access-control gaps in the loan system. None of those changes are reflected in the new draft. 'We're planning the same audit we ran twelve months ago,' Janet says. 'What should be driving the differences?'

Risk-Based Audit Planning
2 horizons = 2 planning lenses. Short-term focuses one engagement; long-term maps the full risk universe. Risk drives both.
How it works

Risk-based audit planning establishes the overall strategy for IS audit activities by systematically identifying and prioritizing the areas of highest risk. It operates at two planning horizons. Short-term planning covers a single audit assignment — determining scope, timing, staffing, and specific procedures for that engagement. Long-term planning (typically annual or multi-year) maps the full audit universe and determines which areas will receive audit coverage, in what sequence, and with what frequency, based on their risk profile. Risk criteria include financial impact, regulatory exposure, operational criticality, and potential for reputational damage. Both horizons must be revisited periodically as risks evolve — a static annual plan that ignores changing conditions is inadequate.

🧠 Mnemonic
Risk → Priority → Plan
Risk-based audit planning always starts with risk assessment. Higher risk = higher priority = first in the plan. Both short-term (one audit) and long-term (full year) plans follow this sequence.
At a glance
📅

Short-Term Planning

What does short-term audit planning cover?

  • Single audit assignment scope
  • Specific procedures and timing
  • Staffing for current engagement
  • Risk-driven scope decisions
🗓️

Long-Term Planning

What does long-term (annual) audit planning cover?

  • Full audit universe coverage
  • Annual and multi-year rotation
  • Resource allocation across all audits
  • Strategic risk priorities
⚠️

Risk Criteria

What risk factors drive audit prioritization?

  • Financial impact
  • Regulatory exposure
  • Operational criticality
  • Reputational damage potential
🔄

Dynamic Replanning

When must the audit plan be revised?

  • When risks change materially
  • New regulations or systems emerge
  • Major incidents occur
  • Organizational restructuring
Try yourself

Meridian Corp built its IS audit plan by cycling through last year's plan and updating dates. Janet Holloway reviews the draft and asks for a fundamental rebuild. What is the single driving input that should determine both what to audit and how much effort to allocate — and why does last year's plan not satisfy that requirement without a current assessment?

— Pause to recall —
Risk — specifically, the current risk assessment of the organization's audit universe. Last year's plan reflects last year's risk profile; without reassessing current inherent risk, control changes, and business changes, the plan allocates effort based on stale information rather than actual exposure.

Audit planning establishes the overall audit strategy and details the specific procedures needed to execute that strategy. It operates at two time horizons. Short-term planning addresses the specific audit assignment at hand — scoping, staffing, timing, and procedures for a single engagement. Long-term planning (typically annual) covers the full audit universe: which areas will be audited across the year, in what sequence, and with what resources. Risk-based audit planning means both horizons are driven by risk assessment — areas with higher inherent risk, greater complexity, or potential for reputational damage receive more audit attention. Risk criteria may include financial impact, regulatory exposure, operational criticality, and reputational factors.

Why this matters: The exam tests that audit planning is not ad hoc — it must be structured, risk-driven, and operate at both assignment and annual levels. A plan that ignores reputational risk or focuses only on the current year without a multi-year view is incomplete.
🎯
Exam tip

Risk-based audit planning means the audit calendar is driven by risk assessments — not tradition, management preference, or rotation schedule alone. The exam often presents scenarios where a high-risk area is not in the plan; the correct response is to revise the plan based on the risk.

📰Real World

The 2017 Equifax breach exposed the data of 147 million people because Equifax failed to patch a known flaw in Apache Struts on an internet-facing system that held sensitive PII. Any reasonable risk-based audit plan would have scored that system as catastrophic impact and highest priority. Equifax ultimately agreed to a settlement of up to USD $700 million with U.S. federal and state authorities.

See also: 1.3.1 1.3.4 1.3.5
Section 1.3.1 Must-know

Individual Audit Assignments

By the end of this card, you should be able to
Identify the key considerations an IS auditor must address when planning an individual audit assignment beyond the annual audit plan.
Scenario

Alex Chen has spent three weeks planning Meridian Corp's AWS environment audit. The work program is drafted, sampling methodology is set, and the fieldwork calendar starts Monday. Then Friday afternoon: two regulatory bulletins land on his desk, and an email from the cloud team confirms that the primary data residency architecture changed last month. His original scope covers the old architecture. Priya Rao stops at his desk at 4 PM: 'New regulatory guidance just dropped. Cloud architecture change went live four weeks ago.' Alex looks at the fieldwork calendar. 'Do we push the start date?' He shrugs. 'That's your call. What does the guidance say you need to do before fieldwork begins?'

Individual Audit Assignments
4 considerations = individual assignment plan inputs. Annual plan is the start — re-assess risk, technology, and regulation before every engagement.
How it works

Each individual IS audit assignment requires planning beyond simply executing the annual audit calendar. An IS auditor preparing for a specific engagement must refresh their understanding of the organization — its objectives, processes, systems, and control environment. They must also incorporate developments that occurred after the annual plan was finalized: recent periodic risk assessment results that may signal new or elevated areas of concern, changes in the organization's use of technology that alter the control landscape, and evolving privacy and regulatory requirements that affect the scope or objectives of the engagement. Individual assignment planning is a distinct, risk-informed activity — not a mechanical execution of a pre-established script.

🧠 Mnemonic
URTS
Understand the org → Risk assessment results → Technology changes → Statutes/regulatory changes — URTS: four inputs that shape an individual IS audit assignment.
At a glance
🏛️

Understand the Organization

What must an IS auditor know before fieldwork begins?

  • Auditee objectives and processes
  • Current control environment
  • Prior audit findings
  • Key stakeholders and systems
⚠️

Risk Assessment Results

How do recent risk assessments affect individual assignment planning?

  • May reveal new high-risk areas
  • Can expand or narrow scope
  • Override prior prioritization
  • Must be checked post-annual-plan
💻

Technology Changes

When must technology changes trigger scope revision?

  • New systems deployed since planning
  • Architecture changes in auditee environment
  • Cloud migrations or major upgrades
  • Changes that alter control landscape
📋

Regulatory/Privacy Changes

How do new regulations affect individual audit planning?

  • New compliance requirements may add scope
  • Privacy law changes affect data handling review
  • Cannot ignore post-annual-plan regulatory updates
  • Auditor must stay current with applicable laws
Try yourself

Alex Chen is three weeks into planning Meridian Corp's AWS environment audit when two new regulatory requirements are issued and the cloud architecture undergoes a major change. Before beginning fieldwork, what must he do — and what is the risk if he proceeds on the original plan without updating it?

— Pause to recall —
Alex must update the individual audit assignment — revise scope, objectives, and work program to incorporate the new regulatory guidance and architectural changes. Proceeding on the original plan risks testing controls that no longer exist or missing new requirements, producing findings that are incomplete and potentially invalid.

In addition to following the overall annual audit plan, each individual audit assignment requires its own adequate planning. An IS auditor must consider factors that may have emerged since the annual plan was set: results of recent periodic risk assessments, changes in the application of technology in the auditee's environment, and evolving privacy and regulatory requirements. The auditor should also refresh their understanding of the specific organization being audited — its objectives, processes, and control environment. Individual assignment planning is not merely executing a pre-set script; it is a fresh risk-informed scope-setting exercise for that particular engagement.

Why this matters: The exam tests whether candidates recognize that individual assignment planning is distinct from annual planning. A significant technology or regulatory change after the annual plan is set must trigger scope re-evaluation at the assignment level — not waiting for the next annual planning cycle.
🎯
Exam tip

Individual assignment planning is separate from annual planning. The exam presents scenarios with post-plan changes (new regulation, new system) and asks what the auditor should do. The answer is always to re-assess scope at the assignment level — not wait for the next annual plan.

📰Real World

When the UK's Financial Conduct Authority fined Tesco Bank £16.4 million in October 2018 over the November 2016 cyber-attack, the FCA Final Notice documented that the bank had received specific prior warnings it failed to incorporate into its controls review: a Visa fraud alert on 4 November 2015, a Visa portal post on 5 November 2015 identifying point-of-sale fraud patterns, and a MasterCard email on 30 September 2016 describing a PoS 91 attack on a UK issuer. Despite this intelligence, Tesco Bank's debit card authorisation systems were never updated to decline the PoS 91 transaction type that the 2016 attackers exploited — the attack channel that drove £2.24 million of the £2.26 million stolen. The case illustrates the individual audit assignment planning requirement directly: prior periodic risk assessment results and regulatory intelligence must be reviewed and incorporated before fieldwork begins. An auditor who does not refresh the known-risk landscape at assignment planning stage can produce a work programme that is blind to the highest-probability attack vectors already on record.

See also: 1.3 1.3.2 1.5.2
Section 1.3.2 Must-know

Effect of Laws and Regulations on IS Audit Planning

By the end of this card, you should be able to
Explain how external legal and regulatory requirements shape the scope and risk focus of IS audit planning.
Scenario

Meridian Corp operates under SOX, GLBA, and PCI-DSS. When Janet Holloway circulates the draft IS audit plan for management review, the payment processing manager pushes back: 'We had our annual QSA certification last March — PCI-DSS scope is covered. Remove it from your plan; you're duplicating effort.' The comment comes with a note from the CFO's office: 'Agree. Streamline the plan.' Janet looks at the regulatory section of the plan. The QSA scope and the IS audit scope don't fully overlap — and there's a control area the QSA didn't test. She has until Monday to respond.

Effect of Laws and Regulations on IS Audit Planning
3-step flow = Identify → Assess risk → Incorporate. Regulations are non-negotiable inputs — missing one makes the plan incomplete.
How it works

Every organization must comply with governmental and external requirements governing IS practices, data management, and information security. These requirements vary by industry and jurisdiction — a regional bank faces SOX, GLBA, PCI-DSS, and state banking regulations simultaneously. IS audit planning must identify all applicable legal and regulatory requirements, assess the risk that the organization is not complying with each, and incorporate that risk assessment into the audit scope and prioritization. Non-compliance risk includes financial penalties, enforcement actions, reputational damage, and operational disruption. A risk-based audit plan that excludes a known applicable regulation is inherently incomplete. Regulatory requirements are non-negotiable inputs to audit planning — not optional additions based on management judgment.

🧠 Mnemonic
Identify → Assess → Incorporate
The three-step regulatory audit-planning sequence: identify all applicable laws and regulations, assess the compliance risk each creates, then incorporate those risks into the audit scope and plan.
At a glance
📋

Identify Applicable Requirements

What external requirements must IS audit planning account for?

  • SOX (public companies)
  • GLBA (financial institutions)
  • PCI-DSS (card processors)
  • State/regional banking regulations
  • General data-protection laws
⚠️

Compliance Risk Assessment

What risk does regulatory non-compliance create?

  • Financial penalties and fines
  • Regulatory enforcement actions
  • Reputational damage
  • Operational disruption
🗓️

Incorporate into Plan

How do regulations affect audit planning?

  • Add regulatory domains to audit scope
  • Prioritize high-compliance-risk areas
  • Schedule compliance-specific testing
  • Management objection does not remove regulatory scope
🔒

Non-Negotiable Nature

Can management exclude regulatory areas from the audit plan?

  • No — regulations apply regardless of management preference
  • Missing regulatory scope is an audit finding
  • Risk-based plan must include compliance risk
  • Incident history does not reduce compliance obligation
Try yourself

Meridian Corp's payment processing manager tells Janet Holloway that PCI-DSS compliance has already been certified by a QSA and 'doesn't need to appear in the IS audit plan this cycle.' What is Janet's professional obligation, and what is the consequence if she accepts management's position?

— Pause to recall —
Janet must include applicable regulatory frameworks in the audit plan regardless of management's position. IS auditors are independently responsible for identifying applicable laws and regulations and incorporating them into planning. Accepting management's waiver transfers the regulatory risk to the IS audit function and creates a gap between audit scope and compliance exposure.

Every organization, regardless of size or industry, must comply with governmental and external requirements related to IS practices, data handling, and information security. These include sector-specific regulations (SOX for public companies, GLBA for financial institutions, PCI-DSS for card processors) as well as general data-protection laws. IS audit planning must identify all applicable external requirements and assess the risk of non-compliance with each. Regulatory exposure — fines, enforcement actions, reputational damage — is a material risk factor that drives audit scope. A risk-based audit plan that omits known regulatory requirements is incomplete by definition, regardless of whether management has raised concerns about compliance.

Why this matters: The exam regularly tests that regulatory compliance is a non-negotiable input to audit planning — not an optional add-on. When a question shows an audit plan that misses a clearly applicable regulation, the correct finding is that the plan is incomplete.
🎯
Exam tip

Regulatory requirements are non-optional inputs to audit planning. If an exam scenario shows an audit plan that omits a clearly applicable law (SOX, GLBA, PCI-DSS), the correct response is that the plan is incomplete — not that management can decide to exclude it.

📰Real World

When GDPR took effect in May 2018, companies worldwide had to redraw their audit plans. In 2019, the CNIL — France's data protection authority — fined Google €50 million for GDPR violations involving transparency and consent. IS auditors operating in or with the EU immediately had to add GDPR compliance scope into audits that, the year before, hadn't touched personal-data processing at all.

See also: 1.3 1.3.1 2.1.1
Section 1.3.3 Must-know

Audit Risk and Materiality

By the end of this card, you should be able to
Define audit risk and materiality in the IS audit context, and explain the three components of audit risk.
Scenario

Alex Chen is debriefing with Priya Rao after the MERIDIA-1 batch-processing review. An external examiner found a material reconciliation error that Alex's fieldwork missed. Priya pulls out the planning file: inherent risk was rated 'high' at the start (complex batch logic, prior-year finding), and control risk was also rated 'high' (no automated reconciliation, manual exception review). She sets the file in front of Alex: 'Given those two ratings, what should your detection risk have been? And what does the fact that you missed a material item tell you?' Alex looks at him sampling methodology notes.

Audit Risk and Materiality
3 gates = Inherent, Control, Detection. Auditor controls only gate 3 — close it tightest when gates 1–2 are open.
How it works

Audit risk is the risk that information gathered during an IS audit contains a material error that goes undetected and therefore leads to an incorrect audit conclusion. It is composed of three elements. Inherent risk is the natural susceptibility of a process or system to material error, independent of any controls — some systems are simply more complex or volatile. Control risk is the risk that the organization's own controls fail to prevent or detect that inherent error. Detection risk is the risk that the IS auditor's test procedures fail to identify the error. The IS auditor directly influences only detection risk — by expanding sample size, applying additional procedures, or using more rigorous testing. Materiality is the significance threshold: only errors large enough to affect decisions or conclusions are material.

🧠 Mnemonic
I·C·D — Inherent × Control × Detection = Audit Risk
Inherent (the process's natural error likelihood) × Control (controls fail?) × Detection (auditor misses it?) = total audit risk. Only Detection risk is in the auditor's hands.
At a glance
🌊

Inherent Risk

What is inherent risk in IS audit?

  • Risk before any controls exist
  • Natural error likelihood of the process/system
  • Complex systems have higher inherent risk
  • Auditor cannot directly reduce this
🛡️

Control Risk

What is control risk?

  • Risk that controls fail to prevent/detect errors
  • High when controls are weak or absent
  • Assessed during control evaluation phase
  • Drives detection risk strategy
🔍

Detection Risk

What is detection risk, and who controls it?

  • Risk that audit procedures miss material errors
  • Only risk the auditor directly controls
  • Reduced by increasing sample size or test rigor
  • Must compensate when inherent + control risk are high
📏

Materiality

What makes an error material?

  • Significant enough to influence decisions
  • Threshold varies by context and stakeholder impact
  • Not every error is material
  • Customer data, availability, privacy can shift materiality threshold
Try yourself

Alex Chen's testing of MERIDIA-1's batch-processing module misses a material error in overnight reconciliation. Inherent risk and control risk for this module were both rated high during planning. What does the audit risk model say about the detection risk Alex should have targeted — and what does the outcome tell you about whether the right detection risk level was applied?

— Pause to recall —
When both inherent risk and control risk are high, audit risk = Inherent × Control × Detection. To keep total audit risk at an acceptable level, detection risk must be set very low — meaning more extensive, rigorous testing. The missed error indicates detection risk was set too high (insufficient testing), leaving the audit risk model out of balance.

Audit risk is the risk that information collected during an audit contains a material error that goes undetected. It has three components. Inherent risk is the risk of a material error existing independently of any control — the natural error-likelihood of a process or system. Control risk is the risk that existing controls fail to prevent or detect that material error. Detection risk is the risk that the IS auditor's own procedures fail to uncover the error. The auditor directly controls only detection risk — by increasing sample size, applying more rigorous tests, or using additional procedures. Inherent and control risks are properties of the auditee's environment. Materiality defines the threshold of error significance: not every error matters — only those that could influence decisions.

Why this matters: The three-component model of audit risk is a classic exam topic. The IS auditor can only directly reduce detection risk. When inherent or control risk is high, detection risk must be driven lower (more testing) to keep total audit risk acceptable.
🎯
Exam tip

The auditor only controls Detection Risk. When inherent risk and control risk are high, the auditor must lower detection risk — meaning more tests, larger samples, or more rigorous procedures. The exam presents scenarios where the auditor must decide how to respond to elevated inherent or control risk.

📰Real World

During the Wirecard collapse in Germany (2020), auditor EY had failed over multiple years to confirm €1.9 billion of cash balances that turned out not to exist. The Wirecard auditors had low detection procedures on bank-confirmation evidence — a detection-risk failure, not a control-risk one. EY ultimately faced a record €500,000 fine from Germany's audit regulator APAS and a two-year ban from accepting new public-interest audit clients in Germany.

See also: 1.3.4 1.6 1.6.2
Section 1.3.4 Must-know

Risk Assessment

By the end of this card, you should be able to
Explain the purpose and sequence of risk assessment as an IS auditor input to audit planning, and identify what outputs a risk assessment must produce.
Scenario

A quality reviewer examines Meridian Corp's audit planning file. The annual plan covers twelve areas — the same twelve as last year, with the same priority ranking. When asked for the supporting risk assessment, Janet Holloway points to a folder of prior-year audit reports: 'We reviewed the findings and updated timing.' The reviewer marks a finding: 'No evidence of a current risk identification step. Two significant organizational changes this year — cloud migration and a new payment processor — are not represented in the plan.' Janet reads the finding. The plan goes live in two weeks. She calls Alex Chen.

Risk Assessment
4-step flow = Identify → Quantify → Prioritize → Guide. Risk assessment is the engine of a valid risk-based audit plan.
How it works

Risk assessment is the structured process an IS auditor uses to direct audit planning resources toward areas of highest risk. The process follows a defined sequence. First, risks across the audit universe are identified — including operational, financial, regulatory, and reputational risks. Second, each identified risk is quantified by estimating its likelihood and potential impact. Third, risks are prioritized against the organization's risk acceptance criteria and strategic objectives. Fourth, the assessment outputs guide two decisions: what management controls are needed to address high-priority risks, and where the IS audit plan should focus its testing resources. A risk assessment must be documented. An audit plan not traceable to a current formal risk assessment cannot demonstrate that it is truly risk-based.

🧠 Mnemonic
I·Q·P·G
Identify, Quantify, Prioritize, Guide — the four-step risk assessment sequence that drives a valid risk-based audit plan.
At a glance
🔍

Identify

What does the identification step of risk assessment produce?

  • Full list of risks across audit universe
  • Operational, financial, regulatory, reputational
  • New and emerging risks
  • System-specific and process-specific risks
📏

Quantify

How are identified risks measured?

  • Estimate likelihood of occurrence
  • Estimate potential impact
  • Qualitative or quantitative scoring
  • Creates ranked list for prioritization
📊

Prioritize

How are risks prioritized?

  • Against risk acceptance criteria
  • Against organizational objectives
  • High-risk areas get more audit attention
  • Risk appetite sets the threshold
🗺️

Guide

What does a risk assessment guide?

  • Management control responses
  • IS audit scope and focus
  • Resource allocation across audit plan
  • Annual and individual assignment priorities
Try yourself

Meridian Corp's annual IS audit plan was built without a formal risk assessment — Janet just consulted last year's findings. An IS audit reviewer challenges the planning process. What is the primary problem with building the audit plan from prior-year findings alone, and what is the first output a proper risk assessment should produce?

— Pause to recall —
Prior-year findings reflect last year's risk exposure, not the current state. A proper risk assessment begins by identifying risks — both current and emerging — across the full audit universe. Without this step, new or changed risks go undetected and the plan allocates effort based on outdated priorities rather than actual exposure.

Risk assessment is the analytical process that underpins risk-based audit planning. It must produce four outputs in sequence: first, identification of relevant risks across the audit universe; second, quantification of each risk's likelihood and impact; third, prioritization of risks against the organization's defined risk acceptance criteria and objectives; and fourth, guidance for appropriate management responses — meaning which controls should be strengthened — and for IS audit focus — meaning which areas should receive the most audit attention. An audit plan built on prior-year findings alone may miss emerging risks, changed environments, or new systems, and therefore may not direct audit resources to areas of highest current risk.

Why this matters: The exam tests that risk assessment is a structured, sequenced process — not an informal exercise. An audit plan must be traceable to a formal risk assessment that identifies, quantifies, and prioritizes risks. Plans based solely on tradition or last year's findings are insufficient.
🎯
Exam tip

The exam tests the four-step sequence: Identify → Quantify → Prioritize → Guide. An audit plan that skips formal risk assessment and relies on prior-year findings is a planning control gap. The output of risk assessment must drive both management action and audit focus — not just one.

📰Real World

Before the 2008 financial crisis, many banks held risk assessments showing their mortgage-backed securities as "low risk" — ratings that internal auditors had relied on without independent challenge. Lehman Brothers filed the largest bankruptcy in U.S. history with USD $639 billion in assets. Post-crisis reports repeatedly pointed to auditors and risk-assessment functions that had accepted management's rating without running their own analysis.

See also: 1.3 1.3.5 1.3.6
Section 1.3.5 Must-know

IS Audit Risk Assessment Techniques

By the end of this card, you should be able to
Identify the techniques IS auditors use to evaluate and rank audit candidates, and explain how risk factors are weighted to produce an audit priority list.
Scenario

Alex Chen lays twenty index cards across the conference table — one for each potential audit subject at Meridian Corp. He's been scoring each against four risk factors: inherent risk, change activity, prior-year findings, and control adequacy. The scoring is complete. MERIDIA-1 sits in the top slot; a newly launched cloud initiative is in the middle of the pack despite being brand new. Priya Rao studies the cards: 'Explain why MERIDIA-1 outranks the cloud initiative. The cloud environment is six months old with no audit history — shouldn't unknown risk rank higher than a system we already know has problems?'

IS Audit Risk Assessment Techniques
4-column scoring = 4 weighted risk factors. Highest total scores become audit priorities — systematic, documented, defensible.
How it works

IS audit risk assessment techniques provide a structured method for evaluating and ranking potential audit subjects when resources cannot cover all of them. The technique begins by identifying the risk factors relevant to each audit candidate — such as inherent risk of the underlying process, effectiveness of existing controls, regulatory and compliance exposure, financial materiality, frequency of prior findings, and complexity of the system or process. Each risk factor is assigned a numerical weight reflecting its relative importance. Every audit candidate is then scored against each weighted factor, producing a total risk score. The ranked scores become the basis for selecting audit priorities. This approach ensures that audit decisions are systematic, defensible, and traceable — not based on historical habit or managerial preference.

🧠 Mnemonic
F·I·R·E
Financial materiality & prior findings, Inherent risk, Regulatory & compliance exposure, Effectiveness of existing controls. Four weighted risk factors that reveal where the audit heat is highest.
At a glance
🔍

Risk Factor Identification

What factors are assessed for each audit candidate?

  • Inherent risk of the process
  • Effectiveness of existing controls
  • Regulatory and compliance exposure
  • Financial materiality and prior findings
⚖️

Weighting

How are risk factors weighted?

  • Weight reflects relative importance
  • Organization's risk environment determines weights
  • High-weight factors dominate the score
  • Weights must be documented and defensible
📊

Scoring and Ranking

How does scoring produce a ranked list?

  • Each candidate scored per weighted factor
  • Scores totaled for each candidate
  • Candidates ranked highest to lowest
  • Ranking drives audit plan prioritization
🎯

High-Risk Selection

How is the final audit scope determined?

  • Top-ranked candidates selected for audit
  • Resource constraints set the cutoff
  • Justification is traceable and documented
  • Replaces intuition with systematic evidence
Try yourself

Alex Chen has scored twenty potential audit subjects at Meridian Corp using an IS audit risk scoring matrix. MERIDIA-1 scores highest on inherent risk but lowest on control strength. A newer cloud initiative scores moderate on both. Which system should be prioritized, and what does that decision tell you about the relationship between the two scoring factors?

— Pause to recall —
MERIDIA-1 should be prioritized. High inherent risk combined with low control strength produces the highest net audit risk — weak controls fail to reduce the exposure from the underlying risk. The scoring technique identifies audit priority by combining multiple risk factors; a system with high inherent risk and strong controls may rank below one with moderate risk and no controls.

When facing a large number of potential audit subjects, an IS auditor must use a structured risk assessment technique to identify high-priority areas. The process involves identifying relevant risk factors for each candidate — such as inherent risk of the process, effectiveness of existing controls, regulatory and compliance exposure, financial materiality, and prior audit findings. Each risk factor is assigned a weight reflecting its relative importance in the organization's risk environment. Candidates are scored against each weighted factor, and the totals produce a ranked list. The highest-ranked candidates become audit priorities. This technique ensures that audit resources are systematically directed toward areas where the risk of material weakness or non-compliance is greatest.

Why this matters: The exam tests that the IS audit risk assessment technique is structured and documented — not based on auditor intuition alone. Questions often ask what factors should influence the scoring, or why a particular area should be prioritized over another.
🎯
Exam tip

The IS audit risk assessment technique is a weighted scoring model — not a gut-check. Exam questions test which factors should be included in the scoring (inherent risk, control effectiveness, regulatory exposure, prior findings) and why audit resources should follow the highest scores.

📰Real World

When JPMorgan Chase lost USD $6.2 billion in the 2012 "London Whale" derivatives incident, internal reports revealed that the bank's risk-assessment scoring on certain synthetic credit positions had been repeatedly downgraded over a year — while the subjective judgment of experienced risk officers was ignored. The numeric model said "safer"; the humans said "look harder." Both would have been right if they had been combined.

See also: 1.3.4 1.3.6 1.3
Section 1.3.6 Must-know

Risk Analysis

By the end of this card, you should be able to
Define risk analysis as a subset of risk assessment and explain how it is used during IS audit planning to identify vulnerabilities and determine control needs.
Scenario

During IS audit planning at Meridian Corp, Priya Rao assigns Alex Chen two tasks: 'First, update the audit universe risk ranking. Second, do a risk analysis on the wire transfer system before we build the fieldwork program.' Alex completes the risk ranking in a day. Then he opens the wire transfer assignment. He's not sure whether to run the same scoring matrix he used for the universe ranking or to take a different approach entirely. Priya Rao stops by: 'The two tasks use different tools. If you use the same approach for both, one of the outputs will be wrong. Which one, and why?'

Risk Analysis
3-step flow = Identify vulnerabilities → Assess materiality → Determine controls. Risk analysis zooms in to build the audit program.
How it works

Risk analysis is a component of risk assessment used during IS audit planning to focus audit resources on specific areas of concern. It involves identifying the risks and vulnerabilities associated with a particular system, process, or control area, assessing whether those vulnerabilities could represent material weaknesses — meaning they could significantly affect the organization's ability to achieve its objectives or comply with requirements — and determining what controls would be needed to reduce each identified risk to an acceptable level. The outputs of risk analysis directly inform the design of audit procedures: the IS auditor structures tests to probe the vulnerabilities identified and to verify whether the required controls exist and function effectively.

🧠 Mnemonic
Risk Analysis = Zoom In
Risk Assessment zooms out (full audit universe). Risk Analysis zooms in (specific system or process) — identifies vulnerabilities, assesses materiality, prescribes controls.
At a glance
🔬

Definition

What is risk analysis in IS audit planning?

  • Subset of risk assessment
  • Focused on specific systems/processes
  • Used to design audit procedures
  • Identifies vulnerabilities before testing
⚠️

Identify Risks & Vulnerabilities

What does risk analysis identify?

  • Specific risks in the audit subject area
  • Vulnerabilities in controls or processes
  • Data flow and exposure points
  • Access control weaknesses
📏

Materiality Assessment

How does risk analysis assess vulnerability significance?

  • Is the vulnerability material?
  • Could it affect objectives or compliance?
  • Likelihood × impact evaluation
  • Determines audit testing priority
🛡️

Control Determination

What control output does risk analysis produce?

  • Controls needed to mitigate each risk
  • Basis for audit procedure design
  • Informs what tests to run
  • Identifies missing or weak controls
Try yourself

During IS audit planning at Meridian Corp, Alex Chen is told to perform a 'risk analysis' on the wire transfer system — not a full risk assessment. What is the key distinction in scope, and what should the wire transfer risk analysis produce that a broader risk assessment does not?

— Pause to recall —
Risk assessment zooms out across the full audit universe to prioritize areas. Risk analysis zooms in on one system or process to identify specific vulnerabilities, assess their materiality, and determine whether existing controls adequately address them. The risk analysis produces specific, actionable findings about the wire transfer system — not a ranked list of systems.

Risk analysis is a subset of risk assessment used specifically during audit planning to focus the audit on areas of greatest concern. While risk assessment is the broader process of identifying, quantifying, and prioritizing risks across the organization, risk analysis focuses on a specific system or process to identify its risks and vulnerabilities, assess the likelihood that those vulnerabilities represent material weaknesses, and determine what controls are needed to mitigate each risk. The results of risk analysis provide a basis for designing audit procedures — the IS auditor knows where to look and what tests to run because the analysis has mapped the risk landscape of the subject area.

Why this matters: Exam questions may use risk analysis and risk assessment interchangeably in some contexts, but the CISA exam distinguishes them: risk assessment is the broad planning tool; risk analysis is the deeper drill-down used to determine audit procedures for a specific area. The output of risk analysis directly shapes the audit program.
🎯
Exam tip

Risk analysis is the planning tool that explains why the auditor runs specific tests on specific areas. If an exam question asks how an auditor determines which procedures to include in the audit program, the answer involves risk analysis of the subject area — not just the annual audit plan.

📰Real World

After the 2017 NotPetya attack crippled Maersk's global operations for approximately ten days at an estimated cost of USD $250–300 million, the company's own executives publicly acknowledged the scale of the control gaps exposed. Maersk's then-Chairman Jim Hagemann Snabe told the 2018 World Economic Forum that the company had to reinstall 45,000 PCs, 4,000 servers, and 2,500 applications in ten days — infrastructure that had not been separately inventoried or risk-mapped for recovery. The documented failure was not a gap in a risk register field but a failure to operationalise the controls the company knew were needed: the attack propagated via a single domain controller in a subsidiary (MePort in Ukraine) because Maersk's network lacked adequate segmentation controls, a vulnerability whose class was well understood and whose remediation had not been completed. Risk analysis identifies vulnerabilities and determines what controls are needed to mitigate them; Maersk's experience shows what happens when that analysis is not translated into implemented, tested controls before an incident occurs.

See also: 1.3.4 1.3.5 4.8.1
Section 1.4 Must-know

Types of Controls and Considerations

By the end of this card, you should be able to
Explain the fundamental purpose of controls in an organization and describe how organizations design and monitor their control environment.
Scenario

Alex Chen is reviewing the access-control environment for MERIDIA-1's batch processing module. The control inventory shows a single detective control: an end-of-day exception report reviewed by the operations manager. There are no preventive controls blocking unauthorized transactions before they execute, no containment mechanism to stop an in-progress intrusion, and no corrective procedure for reversing unauthorized changes. Priya Rao reads the inventory summary: 'Tell me which of the four control functions you've found evidence for, and which are missing. Then tell me which missing function represents the highest risk given what this system does.'

Types of Controls and Considerations
4 functions = complete control. Prevent, Detect, Contain, Recover — an effective control environment needs all four, not just the first.
How it works

Controls are mechanisms that organizations use to manage risk and provide assurance that business objectives will be achieved. An effective control performs up to four distinct functions. It prevents incidents from occurring by blocking or discouraging the risk event. It detects incidents when prevention is insufficient, identifying that a risk event has occurred. It contains incidents that are already underway, limiting their scope and impact. It enables recovery — restoring systems, data, and operations to their normal state after a risk event. Organizations implement controls through policies, procedures, practices, and organizational structures, and they monitor control effectiveness as an ongoing activity. An IS auditor evaluates controls against all four functions — a control environment that focuses only on prevention is incomplete.

🧠 Mnemonic
P·D·C·R — Prevent, Detect, Contain, Recover
Every effective control environment needs all four functions: Prevent the event, Detect when it happens, Contain the damage, Recover afterward. Missing any one creates a gap.
At a glance
🛡️

Prevent

How does a preventive control function?

  • Stops incident before it occurs
  • Password complexity rules
  • Access approvals and least privilege
  • Segregation of duties
🔍

Detect

How does a detective control function?

  • Identifies incident after it occurs
  • Log monitoring and SIEM alerts
  • Anomaly detection
  • Audit trails and reconciliations
🚧

Contain

How does a containment control function?

  • Limits spread/impact of active incident
  • Session termination
  • Network segmentation
  • Account lockout on detection
🔄

Recover

How does a recovery control function?

  • Restores normal operations after incident
  • Backup restoration
  • Business continuity procedures
  • Incident response plan activation
Try yourself

An IS auditor at Meridian Corp reviews the control framework and asks: 'What is an effective control supposed to do?' What are the four functions that an effective control should perform relative to a risk event?

— Pause to recall —
An effective control prevents incidents, detects them when prevention fails, contains them to limit damage, and enables recovery from the risk event.

An effective control serves up to four functions relative to a risk event. Prevention: the control stops the incident from occurring in the first place. Detection: when prevention fails, the control identifies that an incident has occurred. Containment: the control limits the spread or impact of an incident that has already begun. Recovery: the control enables the organization to restore normal operations after the incident. Not every control performs all four functions — controls are designed with one or more of these functions in mind. Organizations design, develop, implement, and monitor controls through policies, procedures, practices, and organizational structures to address risk across all four functions.

Why this matters: The exam tests that effective controls are multi-functional — they are not just preventive. An IS auditor evaluating a control must ask not only 'does it prevent?' but also 'does it detect, contain, and enable recovery?' A control environment with only preventive controls is incomplete.
🎯
Exam tip

An exam question about 'what an effective control does' requires all four functions: Prevent, Detect, Contain, Recover. A control environment that only prevents is incomplete — the IS auditor must evaluate all four dimensions.

See also: 1.4.1 1.4.3 1.4.4
Section 1.4.1 Must-know

Internal Controls

By the end of this card, you should be able to
Describe the internal control system and identify who is responsible for establishing the control culture and assuring control effectiveness at each organizational level.
Scenario

Alex Chen is interviewing Meridian Corp branch managers about the control environment during the annual access-control audit. The third manager in a row gives the same answer: 'Controls are IT's problem — we just follow what the system lets us do.' Alex documents the pattern. He thinks about how to frame the finding. The control weaknesses are real — he's already found three access exceptions — but the bigger issue might be above the branch level. He picks up his phone to call Priya Rao, then pauses. The finding he's about to escalate isn't about IT configuration. It's about something higher.

Internal Controls
3 levels = 3 accountability tiers. Board sets the culture (top), management designs controls (middle), staff executes (base). IS auditor evaluates all three.
How it works

Internal controls operate at all levels within an organization to reduce the risk that business objectives will not be achieved. Ultimate responsibility for the internal control environment rests with the board of directors and senior management, who establish the organizational culture and tone that makes effective controls possible. Management at all levels designs, implements, and monitors specific controls within their areas of responsibility. Staff execute controls in their daily activities and are responsible for reporting exceptions or breakdowns. The internal control system is not confined to IT — it encompasses policies, procedures, organizational structures, and practices across all business functions. IS auditors evaluate control effectiveness at all three levels, not just at the system or technical layer.

At a glance
🏛️

Board & Senior Management

What is the board's role in internal controls?

  • Establish control culture and tone at top
  • Ultimate accountability for control environment
  • Approve risk appetite and control policies
  • Not the day-to-day implementers
👔

Management

What is management's responsibility for controls?

  • Design controls for their areas
  • Implement control procedures
  • Monitor control effectiveness
  • Report to senior management and board
👥

Staff

What is staff's role in the control system?

  • Execute controls as designed
  • Report exceptions and failures
  • Compliance with policies and procedures
  • First-line awareness of control breakdowns
🔍

Auditor's Role

What does the IS auditor evaluate?

  • Effectiveness across all three levels
  • Culture and tone at the top
  • Design adequacy of management controls
  • Execution and compliance at staff level
Try yourself

A Meridian Corp branch manager tells Alex Chen: 'Controls are an IT problem — we just follow the system.' What is the correct answer about who sets the control culture and bears ultimate responsibility for the internal control system?

— Pause to recall —
The board of directors and senior management set the tone and bear ultimate responsibility for the internal control system — not the IT department. IT implements technical controls, but responsibility flows from the board downward. A branch manager who 'just follows the system' is operating in a control environment whose culture is set above them.

Internal controls operate at all organizational levels to mitigate risk exposures that could prevent the organization from achieving its business objectives. The board of directors and senior management are responsible for establishing the appropriate culture — the tone at the top — that facilitates an effective internal control environment. Management at all operational levels is responsible for designing, implementing, and monitoring controls within their areas. Staff are responsible for executing controls as designed and reporting exceptions. The internal control system is not an IT responsibility alone; it encompasses policies, procedures, and organizational structures across all business functions. An IS auditor evaluates the effectiveness of this multi-level system.

Why this matters: The exam tests that the board and senior management bear ultimate responsibility for the control culture — not IT or the IS audit function. A question about who is 'responsible for establishing the control environment' points to the board and senior management, not the CISO or CIO.
🎯
Exam tip

The exam assigns ultimate control responsibility to the board and senior management — not IT, not the IS audit function, not the CISO. When a question asks who is 'responsible for establishing the internal control environment,' the answer is always board/senior management.

📰Real World

When Barings Bank collapsed in 1995 after trader Nick Leeson racked up £827 million in losses (USD $1.4 billion) through unauthorized trades, the post-mortem showed the bank had no real segregation of duties — Leeson effectively controlled both trading and settlement. An internal-control system that made "what should be avoided" a first-class concern would have split those roles on day one. Instead, a 233-year-old bank ended in a weekend.

See also: 1.4 2.2.1 2.2.3
Section 1.4.2 Must-know

Control Objectives and Control Measures

By the end of this card, you should be able to
Distinguish a control objective from a control measure and explain how they relate to each other and to the organization's strategic goals.
Scenario

Alex Chen reviews the loan system control inventory for Meridian Corp's annual access-control audit. The inventory lists seventeen controls — all technically implemented, all documented. But the column labelled 'Control Objective' is blank for every entry. Alex selects one control at random: role-based access with quarterly certification. He asks the system owner: 'What risk is this control addressing?' The owner looks at the screen. 'It's standard practice for financial systems.' Alex writes a note: 'Control in place. Objective unknown.' Priya Rao reads the note over his shoulder: 'Can you tell me if that control is adequate without knowing what it's supposed to achieve?'

Control Objectives and Control Measures
3-step chain = Goal → Objective → Measure. Without the objective layer (middle step), there is no standard to evaluate the control measure.
How it works

A control objective is a statement of what a control is designed to accomplish — it connects an operational or technical control to the organization's strategic goals. Control objectives are explicitly linked to strategy: protecting customer data, ensuring transaction accuracy, maintaining regulatory compliance. A control measure is the specific mechanism that implements a control objective — a policy, procedure, configuration, or technical control that performs the actual preventive, detective, containment, or recovery function. The relationship is hierarchical: strategic goals generate control objectives, and control objectives drive control measure design. IS auditors use control objectives as the benchmark for evaluating whether control measures are effective — without a defined objective, there is no standard against which to measure a control's adequacy.

🧠 Mnemonic
Goal → Objective → Measure
Strategic Goal ('protect customer data') → Control Objective ('only authorized users may access loan records') → Control Measure ('role-based access with quarterly certification'). Three levels, one direction.
At a glance
🎯

Strategic Goal

What drives control objective design?

  • Organization's strategic goals
  • Business objectives
  • Regulatory requirements
  • Risk appetite
📋

Control Objective

What is a control objective?

  • States what the control must achieve
  • Linked to strategic goals
  • Standard for evaluating control effectiveness
  • Applies to operational areas or roles
🔧

Control Measure

What is a control measure?

  • Mechanism that implements the objective
  • Policy, procedure, or technical control
  • Evaluated against the control objective
  • Can be general or application-specific
⚙️

General vs. Application Controls

How do control types relate to objectives?

  • General controls apply across all systems
  • Application controls are system-specific
  • Both evaluated against control objectives
  • Missing objective = no evaluation standard
Try yourself

Meridian Corp's loan system has role-based access with quarterly certification but no documented control objective. When evaluating whether this control is adequate, what critical piece of information is missing, and how does its absence affect the IS auditor's assessment?

— Pause to recall —
Without a control objective, the IS auditor has no standard to measure the control against. A control measure (the 'what') can only be evaluated for adequacy in relation to the control objective it is meant to achieve (the 'why'). Without the objective layer, Alex cannot determine whether role-based access with quarterly certification is the right control for the risk, or merely a control that exists.

A control objective is defined as an objective of one or more operational areas or roles, designed to contribute to fulfilling the organization's strategic goals. Control objectives explicitly connect technical or operational controls to the organization's strategy. A control measure (or control) is the specific mechanism — policy, procedure, technical configuration — that implements the control objective. The relationship flows in one direction: strategic goal → control objective → control measure. Without a defined control objective, it is impossible to assess whether a given control measure achieves the intended outcome. General controls apply across applications and processes; application controls are specific to individual systems. IS auditors evaluate both against their stated objectives.

Why this matters: The exam tests the distinction between what a control is supposed to achieve (objective) and how it achieves it (measure). An audit finding must reference the control objective that a failing measure was meant to meet — not just describe the technical failure.
🎯
Exam tip

An audit finding must reference the violated control objective — not just describe the broken control measure. The exam tests this by presenting a failing control and asking what objective it was designed to meet. Know the strategic-goal → objective → measure chain.

📰Real World

When Capital One suffered a 2019 breach exposing the data of around 106 million people, the root cause was a misconfigured web-application firewall — a technical control that required an administrative control (regular config review) to operate correctly. Capital One agreed to pay USD $80 million to U.S. bank regulators, and later USD $190 million to settle class-action claims. Technical controls without managerial wrapping are firewalls waiting to be misconfigured.

See also: 1.4 1.4.3 1.4.6
Section 1.4.3 Must-know

Control Classifications

By the end of this card, you should be able to
Classify controls into their three primary types — preventive, detective, and corrective — and explain how each responds to a threat event.
Scenario

A Meridian Corp employee accidentally overwrites a production database record. The operations manager calls Alex Chen: 'Our change control flag caught it — there's an alert in the log.' Alex pulls the incident timeline: the record was overwritten at 2:47 PM, the alert fired at 3:02 PM, and the operations team noticed the log at 4:30 PM. Last night's backup runs at midnight. Alex opens the incident form. Three questions: Was there anything that should have stopped this before it happened? Was the detection control timely enough? Is the corrective procedure sufficient? He starts writing.

Control Classifications
3 types = 3 timing phases. Preventive (before), Detective (during/after), Corrective (fix). All three together form a complete control layer.
How it works

Controls are classified according to when they act relative to a threat event. Preventive controls are designed to stop an adverse event from occurring — they block or inhibit threats before damage is done, through mechanisms such as access controls, segregation of duties, and input validation rules. Detective controls are designed to identify that an adverse event has occurred — they recognize threats during or after the fact, through mechanisms such as log monitoring, reconciliations, and intrusion detection systems. Corrective controls are designed to restore the system or process to its correct state after a threat event has been detected — through mechanisms such as backup restoration, patch deployment, and incident response procedures. A robust control environment includes all three types, because no preventive control is perfect and events will occur.

🧠 Mnemonic
P·D·C — Before, During/After, Fix
Preventive = before the event (block it). Detective = during or after (identify it). Corrective = after detection (fix it). Three phases, three control types.
At a glance
🛡️

Preventive Controls

When does a preventive control act?

  • Before the threat event
  • Blocks or inhibits the threat
  • Access controls, segregation of duties
  • Input validation, firewalls
🔍

Detective Controls

When does a detective control act?

  • During or after the threat event
  • Identifies that an event occurred
  • Log monitoring, SIEM alerts
  • Reconciliations, anomaly detection
🔧

Corrective Controls

When does a corrective control act?

  • After detection of the threat event
  • Restores system/data to correct state
  • Backup restoration
  • Incident response, patch deployment
🔗

Why All Three Are Needed

Why can't an organization rely on prevention alone?

  • No preventive control is perfect
  • Threats will bypass prevention
  • Detection catches what prevention misses
  • Correction restores what detection finds
Try yourself

A Meridian Corp employee accidentally overwrites a production database record. Which type of control should have blocked the action, which type identified that it occurred, and which type restores the correct data?

— Pause to recall —
Preventive control (should have blocked the unauthorized overwrite), Detective control (identified the error after it occurred), Corrective control (restores the correct data from backup).

Controls are classified by when they act relative to a threat event. Preventive controls act before the event — they block or inhibit a threat from occurring (e.g., access restrictions, segregation of duties, input validation). Detective controls act during or after the event — they identify that a threat has occurred (e.g., audit logs, intrusion detection, reconciliations). Corrective controls act after detection — they restore the system or data to its correct state (e.g., backup restoration, error correction procedures, incident response). An effective control environment includes all three classifications — prevention alone is insufficient because no preventive control is perfect.

Why this matters: Classifying a control correctly is fundamental to IS audit. Exam questions present a control (e.g., 'backup and restore procedure') and ask what type it is. Backup = corrective. Log review = detective. Segregation of duties = preventive. Getting classification wrong leads to wrong audit conclusions.
🎯
Exam tip

Control type identification is a high-frequency exam topic. The pattern: preventive = before, detective = after (catch), corrective = after (fix). Backup and restore = corrective. Intrusion detection = detective. Password policy = preventive. Know these cold.

📰Real World

The 2013 Target breach is a five-control parable. Preventive failed (no network segmentation between the HVAC vendor and payment systems). Deterrent was irrelevant. Detective worked — FireEye alerts fired on November 30, 2013, and the Bangalore monitoring team escalated to Minneapolis — but the response culture failed: the alerts were reviewed, judged not to warrant immediate follow-up, and the automated malware-deletion feature of FireEye had been disabled. Corrective eventually kicked in only after the U.S. government notified Target weeks later, by which time 40 million card numbers had been exfiltrated. Compensating controls (like challenge-response for vendor access) could have covered the HVAC gap.

See also: 1.4 1.4.4 4.8.1
Section 1.4.4 Must-know

Control Relationship to Risk

By the end of this card, you should be able to
Explain the direct relationship between risk and controls, and define what compensating controls are and when they apply.
Scenario

Alex Chen reviews Meridian Corp's MERIDIA-1 batch processing workflow and confirms what the system owner already knew: segregation of duties is technically impossible — the same account that initiates batch jobs must also reconcile the output. Alex documents the constraint. The system owner slides a one-page proposal across the desk: 'We've been running an enhanced log review and an independent reconciliation as compensating controls.' Alex reads the proposal. The log review is automated; the reconciliation is manual, done by the same operations manager who runs the batch jobs. He picks up her pen. One of these proposed controls will hold. One won't.

Control Relationship to Risk
2 paths = same destination. Primary control (direct) or compensating control (alternative) — both must reach equal risk mitigation.
How it works

Risk and controls have a direct relationship: every control should address a specific, identifiable risk, and the control's existence is justified by that risk. An IS auditor evaluating any control must understand what risk it is designed to mitigate — a control without a traceable risk is unnecessary overhead; a risk without a traceable control is a gap. When a primary control cannot be implemented due to technical, operational, or cost constraints, a compensating control provides an alternative way to address the same underlying risk. Compensating controls must achieve the same risk reduction as the primary control would have — they are not lesser alternatives but different approaches to the same objective. Common compensating controls include enhanced monitoring, management review, and independent reconciliation in cases where segregation of duties is technically impossible.

🧠 Mnemonic
Risk → Control → Compensating (if needed)
Every risk needs a control. When the primary control is impossible, a compensating control must address the same risk. Same risk, different path — but the destination is equal mitigation.
At a glance
⚖️

Risk-Control Relationship

How are risk and controls related?

  • Every control traces to a specific risk
  • Control is justified by the risk it addresses
  • Risk without a control = unmitigated gap
  • Control without a risk = unnecessary overhead
🛡️

Primary Controls

What is a primary control?

  • Direct mitigation of the identified risk
  • First choice for risk reduction
  • May be technical, procedural, or organizational
  • Evaluated first in IS audit
🔄

Compensating Controls

What is a compensating control?

  • Alternative mitigation when primary is infeasible
  • Must address the same underlying risk
  • Common in legacy/constrained environments
  • Enhanced monitoring, management review
🔍

Auditor's Evaluation

What must IS auditors verify about compensating controls?

  • Same risk is being addressed
  • Risk reduction is equivalent to primary control
  • Compensating control is formally documented
  • Not just a weaker substitute — equal mitigation
Try yourself

Meridian Corp's MERIDIA-1 system cannot support segregation of duties in batch processing due to technical constraints. As the IS auditor, what principle explains why a compensating control is appropriate here, and what is the single most important characteristic that the compensating control must have?

— Pause to recall —
The principle is that every risk must have a control — when the primary control (SoD) cannot be implemented, a compensating control must address the same risk through a different mechanism. The compensating control must address the same risk the primary control was intended to mitigate; it cannot simply be an existing unrelated control repurposed after the fact.

There is a direct relationship between risk and control: every control should be traceable to the risk it addresses, and the existence of the control is justified by that risk. When an IS auditor evaluates a control, they must understand what specific risk it is designed to address. When a primary control cannot be implemented — due to technical constraints, cost, or operational factors — a compensating control provides an alternative method of addressing the same underlying risk. Compensating controls must mitigate the same risk to the same acceptable level, even if by different means. Common examples include enhanced monitoring or management review when segregation of duties cannot be achieved technically.

Why this matters: The exam frequently tests compensating controls — particularly in scenarios involving legacy systems or constrained environments. The key test: a compensating control must address the same risk as the primary control it replaces. If it does not, the risk is unmitigated.
🎯
Exam tip

The exam tests that compensating controls must address the same risk as the primary control they replace. A compensating control that merely reduces risk without achieving equivalent mitigation is insufficient. Legacy system scenarios commonly involve segregation-of-duties compensating controls — know what qualifies.

📰Real World

Capital One's 2019 breach (106 million records) traced to a firewall misconfiguration on AWS. The risk — unauthorized access to S3 data — was documented. The control — a web application firewall — existed. But the control's traceability to that specific risk was weak; nobody re-tested the link when the WAF rules changed. The control existed on paper, unmapped in practice. $190 million in settlements followed.

See also: 1.4.3 1.4 1.6.1
Section 1.4.5 Good-to-know

Prescriptive Controls and Frameworks

By the end of this card, you should be able to
Define prescriptive control sets and frameworks, and identify examples of where authoritative sources mandate specific controls an organization must implement.
Scenario

Meridian Corp's compliance team has mapped both PCI-DSS and ISO 27001 to the same access-control policy. Alex Chen reviews the mapping and notices that the policy document lists ISO 27001 control A.9.4 and PCI-DSS Requirement 8 side by side, treating them as equivalent. He pulls the actual requirements. PCI-DSS Requirement 8 specifies MFA for all non-console access into the cardholder data environment, with explicit technical parameters. ISO 27001 A.9.4 requires that access be restricted in accordance with the access control policy. Alex marks a note in the work paper. The two controls aren't the same thing. He needs to decide how to frame this before the compliance walkthrough tomorrow.

Prescriptive Controls and Frameworks
2 types = 2 audit approaches. Prescriptive (specific mandated controls, checklist testing) vs. Framework (objectives with flexibility, judgment-based).
How it works

Prescriptive control sets are defined collections of specific controls that authoritative sources — regulators, industry bodies, or standards organizations — require organizations to implement. Unlike flexible control frameworks, prescriptive sets specify exactly which controls must exist. Examples include PCI-DSS requirements for cardholder data protection (specific technical and administrative controls mandated for any entity processing payment cards) and government-mandated security configurations for cloud environments. Control frameworks such as ISO 27001 and NIST CSF, by contrast, provide categories of control objectives and allow organizations to design their own implementing controls. IS audit procedures differ: prescriptive control sets require checklist-based testing of specific mandated controls; framework-based assessments require evaluation of whether chosen controls meet stated objectives.

🧠 Mnemonic
Prescriptive = Specific Mandates; Framework = Objectives with Flexibility
PCI-DSS tells you what control to install (prescriptive). ISO 27001 tells you what objective to achieve (framework). Auditing both requires different test approaches.
At a glance
📋

Prescriptive Control Sets

What characterizes a prescriptive control set?

  • Specifies exact controls required
  • No implementation flexibility
  • Examples: PCI-DSS, HIPAA Security Rule
  • Audit = checklist test of specific controls
🏗️

Control Frameworks

What characterizes a control framework?

  • Provides categories and objectives
  • Implementation flexibility for the organization
  • Examples: ISO 27001, NIST CSF, COBIT
  • Audit = objective-based assessment
⚙️

Baseline Configurations

What are prescriptive baseline configurations?

  • Specific system configuration requirements
  • Examples: CIS Benchmarks, DISA STIGs
  • Cloud security benchmarks
  • Technical prescriptive controls
🔍

IS Auditor Approach Difference

How does the audit approach differ for prescriptive vs. framework?

  • Prescriptive: does specific control exist and work?
  • Framework: do chosen controls meet the objective?
  • Prescriptive = pass/fail per specific requirement
  • Framework = judgment-based objective evaluation
Try yourself

Meridian Corp processes credit card payments under PCI-DSS and also uses ISO 27001 for its broader information security program. An auditor asks whether both frameworks require the same access-control implementation. What is the key distinction between how PCI-DSS and ISO 27001 approach access-control requirements?

— Pause to recall —
PCI-DSS is prescriptive — it specifies exact controls and configurations required (e.g., specific password complexity, MFA for all non-console access). ISO 27001 is principles-based — it defines the objective (access must be controlled appropriately) and leaves implementation to the organization. The same risk area can require different implementations under each framework.

In some instances, authoritative sources — regulators, standards bodies, or industry consortia — provide a prescriptive set of controls that organizations must implement and assess against. A prescriptive control set specifies the exact controls required (e.g., PCI-DSS requirements for cardholder data protection, specific cloud security configurations for regulated environments). A control framework, by contrast, provides categories of controls and objectives but typically allows the organization to determine how to implement them. The distinction matters for IS audit: against a prescriptive set, the auditor tests whether specific mandated controls are present and functioning; against a framework, the auditor evaluates whether the organization's chosen controls meet the framework's objectives.

Why this matters: The exam tests whether candidates can distinguish prescriptive from framework approaches. PCI-DSS and HIPAA security rules are prescriptive; NIST CSF and ISO 27001 are frameworks. Audit procedures differ: prescriptive requires checklist testing against specific mandated controls; framework requires objective-based assessment.
🎯
Exam tip

PCI-DSS = prescriptive (specific mandated controls, tested by checklist). ISO 27001 / NIST CSF = framework (objective-based, implementation flexibility). The exam tests the audit approach difference: prescriptive engagements check specific control presence; framework engagements evaluate objective fulfillment.

📰Real World

After the 2008 Heartland Payment Systems breach (approximately 130 million cards), investigators found Heartland had a current PCI DSS compliance certificate at the time of the attack. The framework was adopted, but the actual control coverage was thinner than the certificate implied. By May 2010, Heartland had accrued approximately $139.4 million in breach-related expenses (including settlements with Visa for up to $60 million, American Express for ~$3.5 million, and legal fees exceeding $26 million), with a Mastercard settlement of up to $41.1 million in negotiation — placing total potential liability well over $140 million. Adopting a framework is not the same as operating the controls.

See also: 1.4 2.1.1 5.1.2
Section 1.4.6 Must-know

Evaluation of the Control Environment

By the end of this card, you should be able to
Explain how the IS auditor evaluates the control environment, and distinguish IS audit evaluation from management's own monitoring of control effectiveness.
Scenario

Alex Chen is evaluating Meridian Corp's control environment. Devon Park has built a real-time Splunk dashboard that fires alerts whenever privileged access is granted outside business hours. The dashboard has caught three incidents in the past six months. Devon hands Alex a summary: 'Our monitoring is comprehensive. I'm not sure what additional value an IS audit test would add here.' Alex reads through the alert log. The system is well-configured. But he notices one thing: the three alerts Devon flagged as 'resolved' all show the same resolution category — 'authorized exception — no action required.' There's no documentation behind any of them. He looks up at Devon.

Evaluation of the Control Environment
2 distinct activities = both required. Management monitors daily (left); IS audit independently evaluates periodically (right). One does not replace the other.
How it works

The control environment is reviewed by the IS auditor in accordance with the risk-based audit plan. This IS audit evaluation is independent, periodic, and risk-driven. Separately, management has its own ongoing obligation to evaluate the effectiveness of the control environment — through automated monitoring tools, control dashboards, self-assessment procedures, and management review processes. These two activities are distinct and complementary. Management monitoring provides continuous, operational visibility into control effectiveness on a day-to-day basis. IS audit evaluation provides independent assurance — to the board and audit committee — that management's monitoring and the underlying controls are actually working as intended. Neither activity replaces the other: the existence of robust management monitoring reduces but does not eliminate the need for independent IS audit evaluation.

🧠 Mnemonic
Management Monitors Daily; IS Audit Validates Periodically
Two distinct activities, both necessary. Management = ongoing operational monitoring. IS Audit = independent periodic evaluation. One cannot replace the other.
At a glance
📡

Management Control Monitoring

What is management's control monitoring role?

  • Ongoing, continuous operational activity
  • Automated tools and dashboards
  • SIEM and control self-testing
  • Management's own accountability for controls
🔍

IS Audit Evaluation

What does IS audit evaluate in the control environment?

  • Independent, risk-based, periodic
  • Whether controls exist and are effective
  • Whether management monitoring is working
  • Provides assurance to board and audit committee
🔗

Complementary Roles

How do management monitoring and IS audit relate?

  • Both are necessary
  • Neither replaces the other
  • Management monitors; IS audit validates the monitoring
  • Independent evaluation cannot be delegated to management

Key Audit Question

What does the IS auditor assess beyond the controls themselves?

  • Is management's monitoring effective?
  • Does monitoring cover the right risks?
  • Are monitoring tools configured correctly?
  • Does management act on monitoring results?
Try yourself

Meridian Corp's DevOps team runs automated OWASP-aligned testing and Splunk dashboards that alert on security deviations in real time. Devon Park tells Alex Chen: 'Our monitoring is continuous and comprehensive — your independent testing is duplicating our work.' What is the IS auditor's role in a control environment where management monitoring is already strong?

— Pause to recall —
IS audit independently validates the control environment — it does not substitute for management monitoring. Even strong management monitoring is a management control, and the IS auditor's role is to assess whether management's monitoring itself is effective, appropriately designed, and operating as intended. The auditor validates the monitor, not just what the monitor reports.

The control environment must be reviewed in accordance with the risk-based audit plan. While IS audit executes its risk-based evaluation, management also has an independent obligation to evaluate the effectiveness of the control environment on an ongoing basis. Management control monitoring includes automated tools, dashboards, self-assessments, and management reviews that provide continuous visibility into control operation. IS audit evaluation is independent, periodic, and risk-based — it provides assurance to the board and audit committee that management's monitoring is itself effective. The two activities are complementary: management monitors daily; IS audit validates periodically with independence.

Why this matters: The exam tests that IS audit does not replace management's ongoing monitoring responsibility — and that management monitoring does not replace independent IS audit. Both must exist. A question showing only management monitoring but no independent IS audit evaluation is a control gap.
🎯
Exam tip

The most-tested point: management monitoring does not replace IS audit evaluation. If an exam scenario shows strong management control monitoring, the correct IS auditor response is still to independently evaluate the control environment — the scope may be narrowed, but it is not eliminated.

📰Real World

The Volkswagen 'dieselgate' scandal (discovered by U.S. regulators in 2015) featured extensive internal 'monitoring' of emissions tests. What was missing was independent evaluation. Internal teams reported what senior management wanted to hear; external auditors trusted the internal reports without testing the underlying engine-software controls. As of June 2020, the scandal had cost Volkswagen $33.3 billion (approximately €30 billion) in fines, penalties, financial settlements, and buyback costs. Seven current and former VW employees were charged with crimes in the U.S., and investigations continued in Germany.

See also: 1.4.1 1.2.1 1.8.2
Section 1.5 Must-know

Audit Project Management

By the end of this card, you should be able to
Describe the structured steps required to plan and manage an IS audit engagement from initial planning through evidence collection and reporting.
Scenario

Janet Holloway assigns Alex Chen his first solo IS audit engagement at Meridian Corp. Alex is two days into fieldwork when Priya Rao reviews his working papers. She sets them down: 'I don't see an audit program in here. Did you document the objectives and test procedures before you started testing?' Alex pulls up his files. He has scope notes and a fieldwork calendar. 'The scope was clear,' he says. 'I knew what I needed to test.' Priya points to three entries in the workpapers where the test procedure is marked 'as needed.' 'If the audit committee asks why you didn't test access certification separately,' she says, 'what will you tell them?'

Audit Project Management
4 rooms = 4 audit phases. Plan (program) → Field (evidence) → Report (findings) → Follow-Up (verify fixes). Sequence matters.
How it works

An IS audit engagement is managed through four sequential phases. Planning comes first: the IS auditor assesses risk, defines scope and objectives, allocates resources, and builds the audit program — the documented set of procedures that will be performed. Fieldwork follows: auditors execute the program by gathering evidence, testing controls, and documenting results in work papers. Reporting transforms the fieldwork evidence into a formal audit report that presents findings, conclusions, and recommendations to management and the audit committee. Follow-up completes the cycle: the IS auditor verifies that management has taken the corrective actions agreed upon in response to prior findings. Adequate planning is the prerequisite for effective fieldwork — scope gaps identified during planning are far cheaper to address than gaps discovered mid-fieldwork.

🧠 Mnemonic
P·F·R·F — Plan, Fieldwork, Report, Follow-up
Plan first (build the program), Field next (gather evidence), Report results (communicate findings), Follow up (verify fixes). Four phases, one complete audit cycle.
At a glance
📋

Planning

What does the planning phase produce?

  • Risk assessment for the engagement
  • Defined scope and objectives
  • Audit program (step-by-step procedures)
  • Resource and timeline allocation
🔍

Fieldwork

What happens during fieldwork?

  • Execute audit program procedures
  • Gather and evaluate evidence
  • Test controls
  • Document results in work papers
📄

Reporting

What does the audit report contain?

  • Findings and observations
  • Audit conclusions
  • Recommendations for corrective action
  • Management responses

Follow-Up

What does follow-up verify?

  • Management implemented agreed corrective actions
  • Previously open findings are closed
  • Residual risk is acceptable
  • Timing of corrective action is appropriate
Try yourself

Alex Chen jumps directly from scoping to fieldwork testing on a new engagement without issuing an audit program or communicating objectives to the auditee. Which phase did he skip, and what is the specific risk created by moving from planning to fieldwork without that phase?

— Pause to recall —
He skipped the planning output phase — specifically, he failed to develop the audit program (the fieldwork blueprint) and communicate objectives to the auditee. The risk: fieldwork proceeds without a documented scope and test plan, making it impossible to demonstrate that all objectives were addressed, and the auditee has no basis for preparing relevant evidence.

An IS audit engagement follows four structured phases. Planning establishes the audit scope, objectives, risk assessment, and audit program — the step-by-step plan of procedures to be performed. Fieldwork is the execution phase: auditors gather evidence, test controls, and document findings in work papers. Reporting synthesizes fieldwork results into an audit report that communicates findings, conclusions, and recommendations to management and stakeholders. Follow-up verifies that management has implemented the agreed corrective actions from prior audit findings. Adequate planning is the essential first step — without it, fieldwork lacks direction and reporting lacks a validated scope.

Why this matters: The CISA exam tests the audit engagement phases in sequence and expects candidates to map activities to the correct phase. Planning = program design. Fieldwork = evidence collection. Reporting = conclusions and recommendations. Follow-up = corrective action verification.
🎯
Exam tip

The exam sequences the phases and asks which activity belongs to which phase. Work paper documentation = fieldwork. Audit program development = planning. Corrective action verification = follow-up. Audit conclusions = reporting. Know the phase for each activity.

See also: 1.5.1 1.5.2 1.5.3
Section 1.5.1 Must-know

Audit Objectives

By the end of this card, you should be able to
Distinguish audit objectives from control objectives and explain how audit objectives define the scope and focus of an IS audit engagement.
Scenario

Alex Chen is planning the Meridian Corp wire transfer audit. He writes the audit objective as: 'Confirm that dual-authorization controls exist for all wire transfers above $10,000.' Priya Rao reads the draft and hands it back. 'You've written a control objective, not an audit objective.' Alex reads it again. The control requirement is documented in policy. The control exists. He's confirmed both in thirty minutes. Priya adds: 'You haven't asked whether the control is doing its job. Write the objective that answers that question.'

Audit Objectives
2 objectives = 2 purposes. Audit objective = auditor's mission. Control objective = control's design standard.
How it works

Audit objectives state the specific goals that an IS audit engagement is designed to accomplish — what the auditor will verify, assess, or conclude. They define the focus and boundaries of the audit and drive the design of the audit program. Control objectives, by contrast, describe how a specific internal control should function — the intended operational design of the control. An audit engagement typically encompasses multiple audit objectives, often organized around verifying that internal controls are operating effectively, that information systems are reliable, available, and secure, and that relevant regulations are being followed. The audit objective determines what tests are run; the control objective defines the standard against which the test results are evaluated.

🧠 Mnemonic
Audit Objective = 'What will I prove?' Control Objective = 'What should the control do?'
Two distinct questions: Audit objective answers the auditor's mission. Control objective answers the control's design intent. The audit tests whether the control achieves its objective.
At a glance
🎯

Audit Objective

What does an audit objective define?

  • Specific goals the audit will accomplish
  • What the auditor will verify or conclude
  • Drives the audit program design
  • Multiple objectives per audit engagement
🛡️

Control Objective

What does a control objective define?

  • How the internal control is designed to function
  • What the control is meant to prevent/detect/correct
  • Standard against which control is tested
  • Linked to business and strategic objectives
🔗

Relationship

How do audit and control objectives relate?

  • Audit objective = test the control objective
  • Audit tests whether control meets its design goal
  • Scope driven by audit objectives
  • Standards provided by control objectives
📊

Common Audit Objective Focus Areas

What do audit objectives typically address?

  • Internal control effectiveness
  • System reliability and availability
  • Information security adequacy
  • Regulatory compliance
Try yourself

Alex Chen's wire transfer audit objective is: 'Determine whether dual-authorization controls for wire transfers are operating effectively.' He finds that the control exists and is formally documented. Has he achieved his audit objective? What additional step is required?

— Pause to recall —
No — finding that a control exists and is documented satisfies awareness of the control objective (what the control is supposed to do), not the audit objective (whether it is actually working). Alex must test whether dual-authorization controls are operating effectively in practice — not just whether they are documented.

Audit objectives refer to the specific goals that the audit engagement is designed to accomplish. They focus on what the auditor will verify, confirm, or conclude — for example, 'determine whether authorization controls for wire transfers are operating as designed.' Control objectives, in contrast, describe how an internal control is supposed to function — for example, 'only transactions with dual authorization and amount limits below the threshold proceed without executive approval.' An audit generally incorporates multiple audit objectives, often organized around confirming that internal controls are effective and that the organization's information systems are reliable, secure, and available. Audit objectives drive the audit program; control objectives are what the audit program tests.

Why this matters: The exam tests that audit objectives and control objectives are distinct concepts with different purposes. Audit objectives answer 'What will the audit prove?' Control objectives answer 'What should the control do?' Conflating them leads to poorly scoped audit programs.
🎯
Exam tip

If a CISA exam question asks 'what should the IS auditor use to define the audit scope?' the answer references audit objectives. If the question asks 'what standard does the IS auditor test against?' the answer references control objectives. Distinct purposes, distinct uses.

See also: 1.5 1.4.2 1.6.1
Section 1.5.2 Must-know

Audit Phases

By the end of this card, you should be able to
Identify the key steps within each phase of the IS audit process and explain the purpose of each step in progressing toward valid audit conclusions.
Scenario

Janet Holloway gives Alex Chen a training exercise: a four-phase audit process chart with twelve activities distributed across Plan, Define, Perform, and Report. Three activities are placed in the wrong phase. One is obvious — 'issue the draft report' sits under Plan. The other two are subtler. Alex circles 'control objective testing' in the Plan phase and 'define audit scope' in the Perform phase. He's confident about one of the corrections. He's not sure about the other.

Audit Phases
4 archways = 4 audit phases in sequence. Plan → Define → Perform → Report. Activities map to phases — no skipping or mixing.
How it works

Note on phase models: the high-level IS audit lifecycle (section 1.5) uses four macro-phases — Planning, Fieldwork, Reporting, and Follow-up. This section describes the detailed execution model within that lifecycle: Plan (strategy and program), Define (objectives and testing approach), Perform (fieldwork execution), and Report (conclusions and formal output). The Plan and Define phases here elaborate the Planning macro-phase; Perform corresponds to Fieldwork; Report corresponds to Reporting. Both models describe the same process at different levels of granularity — the detailed model is used when mapping specific audit activities to phases. The IS audit process follows four sequential phases, each with specific activities. The Plan phase establishes the overall audit strategy by understanding the auditee's environment, assessing risks, determining scope and objectives, and building the audit program. The Define phase clarifies specific objectives and testing approaches for each element within scope, including evidence requirements and sampling methodology. The Perform phase executes the audit program: interviews are conducted, controls are tested, systems are observed, and evidence is collected and evaluated — all documented in work papers. The Report phase translates evidence into findings and conclusions, formulates recommendations, documents management responses, and issues the formal audit report. Each phase builds on the previous; gaps in earlier phases create problems in later ones.

🧠 Mnemonic
P·D·P·R — Plan, Define, Perform, Report
Plan the strategy, Define the specifics, Perform the fieldwork, Report the conclusions. Four phases, each building on the last.
At a glance
📋

Plan

What happens in the Plan phase?

  • Understand auditee environment
  • Assess risk and determine scope
  • Define objectives at high level
  • Develop the audit program
✏️

Define

What happens in the Define phase?

  • Specify testing approaches
  • Set evidence requirements
  • Determine sampling methodology
  • Refine objectives per scope element
🔍

Perform

What happens in the Perform phase?

  • Execute audit program
  • Conduct interviews and observations
  • Test controls and collect evidence
  • Document in work papers
📄

Report

What happens in the Report phase?

  • Synthesize evidence into findings
  • Formulate conclusions and recommendations
  • Obtain management responses
  • Issue formal audit report
Try yourself

Meridian Corp's IS audit team places 'control objective testing' under the Plan phase in their audit process chart. Alex Chen spots the error in his first-week review. Which phase does control objective testing belong in, and what specifically distinguishes the Plan phase activity from the Perform phase activity?

— Pause to recall —
Control objective testing belongs in the Perform (fieldwork) phase. The Plan phase defines strategy, scope, and methodology — it determines what to test and how. The Perform phase executes the test procedures against actual controls and collects evidence. Testing cannot occur during planning because the test plan hasn't been finalized, and the auditee hasn't been engaged.

The IS audit process is organized into four sequential phases, each with defined steps. The Plan phase establishes the overall audit strategy: understanding the environment, assessing risk, determining scope and objectives, and developing the audit program. The Define phase sets specific audit objectives, testing approaches, and evidence requirements for each element of scope. The Perform phase executes the audit program: conducting interviews, observing operations, testing controls, and collecting and evaluating evidence — all documented in work papers. The Report phase synthesizes the evidence into findings and conclusions, presents recommendations, obtains management responses, and issues the formal audit report. Each phase must be completed before the next begins, and each produces documentation that supports the phase that follows.

Why this matters: The exam maps specific activities to specific phases. Developing the audit program = Plan. Conducting interviews = Perform. Writing recommendations = Report. Any activity that appears in the wrong phase is a process control gap.
🎯
Exam tip

Exam questions test activity-to-phase mapping. When asked 'during which phase does the IS auditor collect and test evidence?' the answer is Perform. Audit program development = Plan. Report writing = Report. Never mix activities across phases in your answers.

Section 1.5.3 Must-know

Audit Programs

By the end of this card, you should be able to
Define an audit program and explain its purposes, including how it is constructed and how it guides fieldwork execution.
Scenario

Alex Chen is six days into fieldwork on Meridian Corp's database access controls. He has tested seventeen access configurations, documented five exceptions, and drafted three findings. Priya Rao sits down to review his working papers and asks: 'Where's the audit program?' Alex shows his the scope statement and the risk assessment that preceded fieldwork. 'That's not an audit program,' he says. He opens his working papers to a blank section. 'You've tested seventeen configurations. How do I know those were the right seventeen? How do I know you haven't missed the twenty-third one, which is the one with the real exposure?'

Audit Programs
4 purposes = 1 audit program. Step-by-step procedures, documentation, supervision guide, and work paper basis — all in one pre-fieldwork document.
How it works

An audit program is a documented, step-by-step set of procedures and instructions that directs the execution of an IS audit engagement. It is constructed during the planning phase, based on the scope and objectives of the specific audit. The audit program serves several purposes: it formally documents what procedures will be performed and how, providing a record of the audit approach; it guides supervision and review, allowing audit managers to track completion and quality; it ensures complete coverage of the audit scope, preventing gaps in testing; and it establishes the basis for work papers — each procedure in the program generates corresponding documentation of evidence collected. An audit program must be written and approved before fieldwork begins; verbal or informal plans are not acceptable substitutes.

🧠 Mnemonic
Audit Program = Blueprint for Fieldwork
The audit program is the fieldwork blueprint: specifies what to test, how to test it, when, and by whom. Without it, fieldwork lacks direction, supervision, and accountability.
At a glance
📋

Definition

What is an audit program?

  • Step-by-step documented procedures
  • Based on scope and objectives
  • Created during planning phase
  • Must be written — not verbal
📄

Documentation Purpose

What does the audit program document?

  • Formal record of audit approach
  • Specific procedures and instructions
  • Evidence requirements per step
  • Sign-off lines for team accountability
👁️

Supervision Purpose

How does the audit program support supervision?

  • Tracks what has been completed
  • Identifies what remains to be done
  • Enables review of fieldwork coverage
  • Shows who performed each procedure
🗃️

Evidence Basis

How does the audit program relate to work papers?

  • Each procedure generates work paper evidence
  • Work papers reference the program step
  • Completeness verified against program
  • Evidence gap = program step not executed
Try yourself

Alex Chen is performing fieldwork on Meridian Corp's database access controls with only a scope statement — no audit program. Priya Rao asks him at midpoint: 'How will you demonstrate to the audit committee that every access-control risk in scope was addressed?' What specifically does the absence of an audit program prevent him from showing?

— Pause to recall —
Without an audit program, Alex cannot demonstrate completeness — that every risk and control objective in scope was addressed through a documented test procedure. The audit program is the pre-approved evidence that fieldwork was systematic, not selective. Without it, the audit committee cannot verify that the IS auditor's conclusions are supported by a complete, reproducible test plan.

An audit program is a step-by-step set of documented procedures and instructions that must be performed to complete the audit. It is based on the scope and objectives of the specific engagement. The main purposes of an audit program are: to formally document the audit procedures and approach for the engagement; to provide a supervision and review guide so that managers can track what has been done and what remains; to ensure that fieldwork coverage is complete relative to the defined scope; and to provide a basis for the work papers that record evidence gathered during execution. Without an audit program, fieldwork is undirected, supervision is impossible, and the connection between scope and evidence is unverifiable.

Why this matters: The audit program is the fieldwork blueprint. The exam tests that an audit program must exist before fieldwork begins, that it must be based on scope and objectives, and that it must be documented — verbal plans do not qualify.
🎯
Exam tip

The audit program must be written and approved before fieldwork begins. If an exam scenario shows fieldwork starting without a documented audit program, that is a planning control failure. The program is also the supervision tool — without it, fieldwork oversight is impossible.

See also: 1.5 1.5.2 1.5.4
Section 1.5.4 Must-know

Audit Work Papers

By the end of this card, you should be able to
Describe the purpose of audit work papers and explain the IS auditor's obligations regarding their documentation, integrity, and protection.
Scenario

After Meridian Corp's IS audit of the loan origination system concludes, the operations VP sends Alex Chen a direct request: 'Our process improvement team needs the full working paper file to understand the evidence basis for finding #3. Can you send it over?' Alex looks at the request. The operations VP is an auditee. The working papers contain test procedures, population extracts, and evidence that extends beyond finding #3. He looks at the email from Janet Holloway's assistant — she's out of office until Thursday. The ops VP follows up an hour later: 'Time-sensitive. Need it today.'

Audit Work Papers
4 contents = 1 protected file. Work papers (plans, tests, evidence, findings) belong to IS audit — not management. Integrity and confidentiality are non-optional obligations.
How it works

Audit work papers are the documented record of all IS audit activities: plans, programs, tests performed, evidence collected, findings identified, and any incidents encountered during the engagement. They provide the evidentiary foundation for audit conclusions and enable audit management to supervise and review the quality of the work performed. IS auditors have obligations regarding two properties of work papers. Integrity: work papers must be accurate and complete, and must be protected against unauthorized modification or destruction; the format may vary, but the content must be reliable. Confidentiality: work papers contain sensitive information about the auditee's systems, controls, and vulnerabilities; they must be stored securely with restricted access. Ownership of work papers rests with the IS audit function — not with management or the auditee — and any disclosure requires authorization from audit leadership.

🧠 Mnemonic
ACID for Work Papers: Accurate, Complete, Integrity-protected, Denied to unauthorized
Work papers must be Accurate (correct), Complete (cover all program steps), Integrity-protected (no unauthorized changes), and Denied to unauthorized parties (confidentiality). ACID — the work paper quality test.
At a glance
📁

What Work Papers Contain

What must be documented in audit work papers?

  • Audit plans and programs
  • Test procedures and results
  • Evidence gathered
  • Findings and incidents
🔒

Integrity Obligation

What does work paper integrity require?

  • Accurate and complete documentation
  • Protection from unauthorized modification
  • Version-controlled storage
  • Destruction controls (retention policy)
🔐

Confidentiality Obligation

Why must work papers be kept confidential?

  • Contain sensitive system and control details
  • Restricted access to authorized personnel
  • Stored in secure audit repository
  • Disclosure requires authorization
🏛️

Ownership

Who owns audit work papers?

  • The IS audit function
  • Not the auditee or management
  • Management receives report — not full file
  • Disclosure requires audit leadership approval
Try yourself

After Meridian Corp's IS audit concludes, management asks Alex Chen for a copy of the entire work paper file to support an internal process review. What is Alex's obligation before releasing any work papers, and who owns the work papers?

— Pause to recall —
The work papers are the property of the IS audit function (the organization's internal audit department or external engagement firm), not management. Before releasing any work papers externally — including to management — Alex must obtain authorization from appropriate audit leadership (Janet Holloway). He should release only what is authorized and may provide a summary extract rather than the full file.

Audit work papers are the documented record of everything performed during an IS audit engagement: the plans, programs, activities, tests, findings, and any incidents encountered. They provide the evidence trail that supports audit conclusions and enables supervision and review of the audit team's work. IS auditors have two key obligations for work papers. Integrity: work papers must be accurate, complete, and protected from unauthorized modification or destruction. The format and media may vary (paper, electronic), but the content must be reliable. Confidentiality: work papers contain sensitive information about the auditee's systems and controls; they must be stored securely and access restricted to authorized personnel. Work papers belong to the IS audit function — not to management or the auditee — and disclosure requires authorization.

Why this matters: The exam tests work paper obligations: integrity (accurate, protected from tampering), confidentiality (restricted access), and ownership (IS audit function, not the auditee). Sharing work papers with management without authorization is a confidentiality violation.
🎯
Exam tip

Work paper ownership is a common exam trap: work papers belong to the IS audit function, not to management or the auditee. When management requests the full work paper file, the correct response is to provide only what has been authorized — typically the audit report and agreed findings, not the underlying evidence.

See also: 1.5.3 1.9.4 1.1.3
Section 1.5.5 Must-know

Fraud, Irregularities and Illegal Acts

By the end of this card, you should be able to
Identify who is primarily responsible for fraud detection at Meridian Corp, explain when an IS auditor's fraud responsibilities are triggered, and describe the required response.
Scenario

During fieldwork at Meridian Corp, Alex Chen discovers anomalous patterns in wire transfer logs: eleven transfers over $50,000 approved by a single senior manager with no secondary authorization, all occurring between 11 PM and 1 AM over four weeks. The policy requires dual authorization above $25,000. Alex's fieldwork plan doesn't include this approval tier — he found this while pulling a different sample. He calls the senior manager for a routine interview question. The manager answers in three seconds and seems unfazed. Alex hangs up and stares at him screen. His next step is unclear: the finding could be a control gap, or it could be something worse.

Fraud, Irregularities and Illegal Acts
3-step flow = Management deters → IS Auditor reports indicators → Forensics investigates. Never conflate the three roles.
How it works

Management holds primary responsibility for establishing internal controls designed to deter and enable timely detection of fraud, irregularities, and illegal acts within the organization. When those controls fail — through exploitation of vulnerabilities, collusion, or management-perpetrated circumvention — the IS auditor's role is activated. During fieldwork, if an IS auditor discovers indicators of fraud or illegal acts, they must: evaluate the adequacy of the controls designed to prevent such events, document the indicators and related control weaknesses in the work papers, and escalate findings to the appropriate governance level — typically the audit committee or board when management is implicated. If the matter may require legal action, the IS auditor must escalate to appropriate authorities. The IS auditor does not investigate, resolve, or adjudicate fraud — those roles belong to forensic specialists, legal counsel, or law enforcement.

🧠 Mnemonic
Management deters; Auditor reports; Forensics investigates
Three distinct roles in fraud response: Management builds controls to deter fraud. IS Auditor evaluates controls and escalates indicators. Forensics/Legal investigates and adjudicates. Never conflate the roles.
At a glance
🏛️

Management's Role

Who is primarily responsible for fraud prevention?

  • Management — not IS audit
  • Establish and maintain internal control system
  • Deter and enable timely detection of fraud
  • Responsible even when controls fail
🔍

IS Auditor's Role

What must the IS auditor do when fraud indicators are found?

  • Evaluate adequacy of fraud-prevention controls
  • Document indicators and control gaps
  • Report to audit committee or board
  • Escalate to appropriate authorities if legal action needed
📢

Escalation Path

Where do fraud indicators escalate when management is implicated?

  • Audit committee or board — not management
  • Legal or compliance if required
  • Law enforcement if criminal acts suspected
  • Work papers document the escalation
🚫

What IS Auditors Do NOT Do

What is NOT the IS auditor's role in fraud?

  • Does not investigate fraud
  • Does not resolve or adjudicate
  • Does not protect management
  • Does not defer reporting to allow self-correction
Try yourself

During fieldwork at Meridian Corp, Alex Chen discovers anomalous patterns in wire transfer logs suggesting a senior manager may be approving fraudulent transactions. The senior manager is Alex's primary contact for the audit. What must Alex do immediately, and what action is explicitly outside his scope?

— Pause to recall —
Alex must immediately report the indicator to audit leadership (Janet Holloway) and document the control gap (absence of peer review and system-enforced limits). He must not investigate the suspected fraud himself — investigation is the role of forensics and legal. His scope is to identify and report the control failure; the investigation outcome does not change his audit obligation.

Management bears primary responsibility for establishing, implementing, and maintaining internal controls that deter and enable timely detection of fraud. Internal controls can fail due to exploitation of vulnerabilities, management-perpetrated control circumvention, or collusion. When an IS auditor discovers indicators of fraud, irregularities, or illegal acts during audit work, the auditor must evaluate the adequacy of controls designed to prevent such events, report the indicators to the appropriate governance level (typically the audit committee or board if management is implicated), and escalate to appropriate authorities — which may include legal, compliance, or law enforcement — depending on the nature and severity. The IS auditor does not conduct the fraud investigation itself; that role belongs to forensic investigators.

Why this matters: The exam tests two things: (1) management is primarily responsible for fraud prevention controls, not IS audit; and (2) when fraud indicators are found during an audit, the IS auditor must escalate — not investigate, resolve, or ignore the indicators.
🎯
Exam tip

The most-tested point: management is primarily responsible for fraud detection controls. The IS auditor evaluates controls and escalates indicators — the auditor does not investigate fraud. When management is implicated, escalation bypasses management and goes directly to the audit committee or board.

See also: 1.5.4 1.9 5.15.1
Section 1.5.6 Memorize

Agile Auditing

By the end of this card, you should be able to
Define agile auditing, explain how it adapts agile principles to IS audit engagements, and identify its key benefits and considerations.
Scenario

Meridian Corp's audit committee is reviewing the IS audit function's six-month reporting lag. The cloud team has deployed three architectural changes since the last report was issued. Janet Holloway proposes a shift to agile auditing with two-week sprints. A committee member raises her hand: 'Shorter cycles mean less time per test. Won't that compromise coverage?' Another member follows: 'And if auditors are embedded with development teams in sprints, how do you maintain independence from what you're testing?' Janet looks at her proposal. She has answers to both questions — but one of them requires a harder trade-off conversation.

Agile Auditing
2 approaches = different timelines. Traditional (one long arrow) vs. Agile (three sprints with frequent findings). Speed is gained; independence stays constant.
How it works

Agile auditing applies the principles of agile software development — iterative work cycles, continuous stakeholder collaboration, and frequent delivery of value — to IS audit engagements. Rather than following a single sequential plan-field-report cycle that may span many months, agile auditing divides the engagement into short sprints, each producing specific deliverables: findings, observations, or draft recommendations that the auditee can begin addressing immediately. Auditee engagement is continuous throughout rather than limited to opening and closing meetings. The primary benefit is timeliness: findings reach the auditee while the control issues are still relevant and actionable. Key considerations include maintaining auditor independence during close collaboration, preventing uncontrolled scope expansion across sprints, and ensuring that documentation and work papers are maintained consistently regardless of the iterative format.

🧠 Mnemonic
Agile Audit = Faster Findings, Same Independence
Agile auditing accelerates value delivery through sprints and continuous auditee collaboration — but independence, documentation, and scope discipline must be maintained throughout. Speed is the gain; independence is the non-negotiable.
At a glance
⏱️

Traditional vs. Agile

How does agile auditing differ from traditional audit?

  • Sprint-based vs. sequential engagement
  • Frequent deliverables vs. single final report
  • Continuous auditee collaboration vs. entry/exit only
  • Faster value delivery vs. end-of-engagement finding

Key Benefits

What are the primary benefits of agile auditing?

  • Faster, more timely findings
  • Auditees can act while issue is live
  • Improved engagement and buy-in
  • Findings relevant to current environment
⚠️

Key Considerations

What must agile auditors maintain?

  • Independence during close collaboration
  • Scope discipline — prevent sprint creep
  • Consistent documentation and work papers
  • Adherence to IS audit standards
🎯

When to Use Agile Audit

When is agile auditing most valuable?

  • Fast-moving technology environments
  • Large complex engagements benefiting from incremental delivery
  • When auditee collaboration improves outcomes
  • When traditional timelines create relevance gaps
Try yourself

Meridian Corp's audit committee asks Janet Holloway why IS audit findings always arrive six months after the auditee has already changed the environment. Janet proposes agile auditing. What is the core structural change that agile auditing makes to the traditional audit cycle, and what audit quality principle must be preserved regardless of sprint cadence?

— Pause to recall —
Agile auditing replaces long sequential phases with short iterative sprints, delivering findings while the audited environment is still active. The audit quality principle that must be preserved is independence — shorter cycles accelerate delivery but cannot reduce the auditor's independence from the processes being audited or the rigor of evidence collection within each sprint.

Agile auditing adapts software development agile principles — iterative cycles, continuous collaboration with auditees, and frequent value delivery — to IS audit engagements. Rather than planning a complete audit and reporting findings at the end of a multi-month engagement, agile auditing breaks the engagement into short sprints, each producing a deliverable (findings, observations, recommendations) that can be acted upon immediately. The auditee is engaged continuously rather than only at entry and exit. Key benefits include faster detection and communication of control issues, improved auditee engagement, and better alignment of audit findings with the current operational environment. Considerations include maintaining independence, ensuring findings are documented consistently, and managing scope to prevent uncontrolled expansion across sprints.

Why this matters: Agile auditing is an increasingly tested topic in the CISA exam. The key benefit is faster, more relevant delivery of findings. The key risk is scope creep and independence management. The exam may present agile auditing as an alternative to traditional methodology and ask what it addresses.
🎯
Exam tip

Agile auditing is tested as a way to improve audit relevance and timeliness — not as a shortcut. Independence, documentation standards, and scope control still apply. If an exam presents agile auditing as eliminating independence obligations, that is incorrect.

📰Real World

When Wells Fargo's fake-accounts scandal surfaced publicly in September 2016, the OCC's subsequent enforcement review found that internal audit had repeatedly rated sales-practice controls as effective while failing to identify the root cause of widespread misconduct or escalate risk management failures to the board. In January 2025, the OCC fined Wells Fargo's former Chief Audit Executive $7 million for failing to timely identify root causes of risks and escalate risk management failures — one of the largest individual civil money penalties ever assessed against an internal auditor. The documented failure, as set out in the OCC's charges, was that internal audit did not adequately scope its reviews of the sales practices area and did not escalate findings with sufficient urgency to the board and senior management. Long sequential audit cycles contributed to a pattern where by the time findings were issued, the environment being audited had already changed — the precise problem agile auditing is designed to address by delivering findings in short iterative cycles while the control environment is still current.

See also: 1.5 1.5.2 1.10
Section 1.6 Must-know

Audit Testing and Sampling

By the end of this card, you should be able to
Explain the purpose of audit sampling, distinguish statistical from nonstatistical sampling, and state what a sample must provide for audit conclusions to be valid.
Scenario

Alex Chen is designing the sampling approach for Meridian Corp's change management audit — 2,400 change records, twelve months, mixed risk levels. His audit program requires a conclusion about the approval-compliance rate across the full population. His supervisor also wants a targeted look at the thirty emergency changes, which have a different approval process and represent disproportionate risk. Alex starts drafting the sampling methodology section of the work paper. He has enough time to do either a complete statistical design or a targeted judgmental pull — but his report objective requires one specific approach for the compliance-rate conclusion. He needs to pick correctly before pulling a single record.

Audit Testing and Sampling
2 approaches = 1 required outcome. Statistical (math-based) or nonstatistical (judgment-based) — both valid if they produce sufficient and appropriate evidence.
How it works

Audit sampling enables an IS auditor to reach valid conclusions about a population by examining a carefully selected subset, rather than performing a complete review of every item. Sampling is used when time, cost, or volume considerations make total verification impractical. The entire group of items eligible for testing is the population; the selected subset is the sample. Both statistical and nonstatistical sampling approaches are legitimate. Statistical sampling uses probability-based methods to select items and allows the auditor to calculate the confidence level and precision of conclusions. Nonstatistical sampling uses auditor judgment to select items and evaluate results. Both approaches require the IS auditor to design the sample appropriately for the population, execute the audit procedures on the sample, and evaluate results to determine whether sufficient and appropriate evidence supports the intended conclusion.

🧠 Mnemonic
Statistical = Math-defensible; Nonstatistical = Judgment-based. Both valid if documented.
Statistical sampling uses probability and gives calculable confidence. Nonstatistical uses auditor judgment. The exam does not prefer one — both are valid when properly designed and documented.
At a glance
📊

Statistical Sampling

What distinguishes statistical sampling?

  • Probability-based item selection
  • Calculable confidence level and precision
  • Results projectable to full population
  • Requires statistical design before sampling
🎯

Nonstatistical Sampling

What characterizes nonstatistical sampling?

  • Auditor judgment drives selection
  • No mathematical confidence calculation
  • Valid when properly designed and documented
  • Common for targeted high-risk testing

Both Methods Require

What must both sampling methods achieve?

  • Sufficient and appropriate evidence
  • Proper sample design before selection
  • Documentation of design and execution
  • Evaluation of results against audit objective
📖

Key Concepts

What are the core sampling terms?

  • Population = full set of eligible items
  • Sample = selected subset
  • Precision = acceptable margin of error
  • Confidence level = statistical certainty
Try yourself

Alex Chen needs to test whether Meridian Corp's 2,400 change records comply with the approval policy. He cannot review all records. He wants the results to support a quantitative conclusion about the error rate across the full population. Which sampling approach is required for this objective, and why does his goal of quantitative extrapolation matter for the choice?

— Pause to recall —
Statistical sampling is required because Alex needs to extrapolate conclusions to the full population with a measurable confidence level. Statistical sampling uses probability-based selection, allowing mathematical projection of the error rate. Nonstatistical (judgmental) sampling cannot support quantitative extrapolation — it can identify errors in the sample but not estimate the error rate in the 2,400-record population.

Audit sampling allows an IS auditor to reach valid conclusions about a population by examining a representative subset rather than every item. Both statistical and nonstatistical sampling methods can produce valid conclusions, but they differ in how samples are selected and how results are extrapolated. Statistical sampling uses mathematically defined probability methods to select samples and project results to the population with calculable confidence levels. Nonstatistical sampling uses auditor judgment in selection and extrapolation. Regardless of method, the IS auditor must design and select the sample appropriately, perform the audit procedures on the sample, and evaluate sample results to obtain sufficient and appropriate evidence to support a conclusion about the full population.

Why this matters: The exam tests that both statistical and nonstatistical sampling can produce valid conclusions — neither is inherently superior. The key requirement is that the sample must yield sufficient and appropriate evidence. Exam distractors often suggest statistical sampling is always required.
🎯
Exam tip

Both statistical and nonstatistical sampling produce valid audit conclusions. The CISA exam does not require statistical sampling as the default. What matters is that the sample is properly designed, the procedures are executed on the sample, and the results provide sufficient and appropriate evidence for the conclusion.

See also: 1.6.1 1.6.2 1.8
Section 1.6.1 Must-know

Compliance Testing vs. Substantive Testing

By the end of this card, you should be able to
Distinguish compliance testing from substantive testing and explain when each is appropriate in an IS audit engagement.
Scenario

Alex Chen runs two tests on Meridian Corp's change management process. First: he reviews the policy document and confirms it requires a signed approval before any deployment. One hundred percent compliance in documentation. Then he pulls a random sample of thirty production deployments and traces each back to the approval record. Three have no matching approval ticket — the change was deployed directly by a developer with no authorization in the system. He opens his findings document. He has two conclusions that point in different directions. The compliance test says the control works. The substantive test says it doesn't. Which conclusion goes in the report, and why are both tests necessary to reach it?

Compliance Testing vs. Substantive Testing
2 test types = complementary roles. Compliance (left) tests control adherence; Substantive (right) tests transaction integrity. Strong left reduces right's scope.
How it works

IS auditors use two distinct types of tests during fieldwork. Compliance testing gathers evidence to determine whether the organization is adhering to its defined control procedures — it answers the question 'is the control being followed consistently?' Examples include reviewing whether access requests are approved before provisioning, or whether change records include mandatory sign-offs. Substantive testing gathers evidence to evaluate the accuracy and integrity of individual transactions, data, or outputs — it answers the question 'are the specific items correct?' Examples include selecting individual transactions and verifying their accuracy, tracing specific changes to authorized approvals, or reconciling balances. The two test types are complementary. Where compliance testing shows controls are strong, the IS auditor may reduce the scope of substantive testing. Where compliance testing reveals weaknesses, substantive testing must be expanded to assess the actual impact on data or transaction integrity.

🧠 Mnemonic
Compliance = 'Is the control followed?' Substantive = 'Is the data right?'
Compliance tests the control procedure. Substantive tests the actual transaction or data. Strong compliance → reduced substantive. Weak compliance → expanded substantive.
At a glance
📋

Compliance Testing

What does compliance testing verify?

  • Adherence to control procedures
  • Controls exist and are consistently applied
  • Control operation — not data quality
  • Example: approval signatures present on 100% of changes
🔍

Substantive Testing

What does substantive testing verify?

  • Accuracy and integrity of individual transactions/data
  • Quality of outputs — not just procedure adherence
  • Example: specific changes match what was authorized
  • Reconciliation of balances and records
⚖️

Relationship Between the Two

How do compliance and substantive testing relate?

  • Strong compliance → reduced substantive scope
  • Weak compliance → expanded substantive scope
  • Compliance tests controls; substantive tests impact
  • Both needed for complete assurance
🔄

Sequence

What is the typical sequence of the two test types?

  • Compliance testing typically comes first
  • Results inform extent of substantive testing
  • If compliance fails, must substantively test impact
  • Cannot skip compliance if substantive is the objective
Try yourself

At Meridian Corp, Alex Chen runs two tests: one verifying that the change management policy requires a signed approval before deployment, and another verifying that specific production changes were actually authorized before they went live. Which is compliance testing and which is substantive testing?

— Pause to recall —
Testing whether the policy requires signed approval = compliance testing (does the control procedure exist and is it being followed?). Testing specific transactions for actual authorization = substantive testing (are individual transactions/data accurate and authorized?).

Compliance testing is evidence-gathering performed to determine whether the organization is following its control procedures — it tests that controls exist and are being applied consistently. For example, verifying that 100% of change records include a manager's digital approval is a compliance test. Substantive testing evaluates the integrity of individual transactions, data, or information — it tests the quality and accuracy of outputs, not just whether control procedures were followed. For example, selecting 25 specific changes and verifying that the actual system state matches what was authorized tests the transaction substance. IS auditors use both: compliance testing first (does the control operate?) and, if controls are strong, reduced substantive testing; if controls are weak, expanded substantive testing.

Why this matters: The exam tests the interplay between compliance and substantive testing: strong compliance results (controls are working) reduce the extent of required substantive testing. Weak compliance results require more substantive testing. They test different things and substitute for each other in a specific relationship.
🎯
Exam tip

The exam frequently asks: 'What type of test is this?' Reviewing control policy documents and checking adherence = compliance. Testing specific transactions for accuracy = substantive. Remember: strong compliance results let you reduce (but not eliminate) substantive testing.

See also: 1.6 1.6.2 1.5.1
Section 1.6.2 Must-know

Sampling Methods

By the end of this card, you should be able to
Identify and distinguish the major sampling methods available to IS auditors — attribute, variable, and stratified — and explain when each is most appropriate.
Scenario

Alex Chen is sampling Meridian Corp's wire transfer approvals. His audit program has two separate objectives: determine the rate of missing approvals across the full population, and estimate the total dollar value of transfers that lacked proper authorization. He drafts a sampling plan with a single statistical sample covering both objectives. Priya Rao reviews it: 'This one sample won't answer both questions cleanly. The first objective needs one method; the second needs a different one. Which method maps to which, and why can't you use a single design for both?'

Sampling Methods
4 methods = 4 audit questions. Attribute (rate), Variable (amount), Stratified (non-uniform population), Stop-or-go (decisive early results). Match method to objective.
How it works

IS auditors select from several sampling methods depending on the nature of the audit objective. Attribute sampling is used to determine the rate of occurrence of a specific characteristic in a population — how often a given condition (such as a missing approval or an exception) appears. The output is a percentage or error rate. Variable (or estimation) sampling is used to estimate a monetary or quantitative value across the population — such as the total dollar amount associated with a particular condition. Stratified sampling divides the population into distinct, internally homogeneous subgroups before sampling each separately, improving efficiency and representativeness when the population contains items of significantly different sizes or risks. Stop-or-go sampling is an efficiency technique that allows the auditor to stop early when initial results clearly indicate either very low or very high error rates, avoiding unnecessary additional testing.

🧠 Mnemonic
A·V·S·S — Attribute, Variable, Stratified, Stop-or-go
Attribute = how often (rate). Variable = how much (dollar/quantity). Stratified = split population first. Stop-or-go = early exit when conclusion is obvious. Each method serves a different question.
At a glance
📊

Attribute Sampling

When is attribute sampling used?

  • Testing rate of occurrence of a characteristic
  • 'What % of records have this condition?'
  • Binary test — condition present or absent
  • Example: % of transactions missing approval
💰

Variable Sampling

When is variable sampling used?

  • Estimating monetary or quantitative values
  • 'What is the total dollar amount affected?'
  • Continuous scale — not binary
  • Example: total value of unapproved transfers
📂

Stratified Sampling

When is stratified sampling used?

  • Population is not uniform
  • Different risk/size groups benefit from separate sampling
  • Increases efficiency and representativeness
  • Example: high-value vs. standard transactions
🛑

Stop-or-Go Sampling

When is stop-or-go sampling used?

  • Early results are clearly decisive
  • Very low error rate → stop early
  • Very high error rate → stop and report
  • Conserves audit resources
Try yourself

Alex Chen is sampling Meridian Corp's wire transfer approvals. He needs to determine: (a) the rate of missing approvals in the population, and (b) the total dollar value of unapproved transfers. Which sampling method serves each objective?

— Pause to recall —
(a) Attribute sampling — measures the rate of occurrence of a characteristic (missing approval = attribute). (b) Variable sampling — estimates a dollar value or quantity across the population.

IS auditors choose among several sampling methods depending on the audit objective. Attribute sampling determines the rate of occurrence of a specific characteristic in a population (e.g., the percentage of transactions missing a required approval) — it answers 'how often does this condition exist?' Variable (or estimation) sampling estimates a monetary or quantitative value for a population (e.g., the total dollar amount of unapproved transactions) — it answers 'how much?' Stratified sampling divides the population into homogeneous subgroups (strata) before sampling, increasing efficiency when the population is not uniform (e.g., sampling high-value and low-value transfers separately). Stop-or-go sampling allows the auditor to halt testing early if initial results clearly show either very low or very high error rates, conserving resources when the conclusion is obvious.

Why this matters: The CISA exam tests the matching of sampling method to audit objective. Attribute = rate/occurrence. Variable = dollar amount or quantity. Stratified = non-uniform populations. Stop-or-go = efficiency when early results are decisive.
🎯
Exam tip

Match the method to the objective: rate → attribute; dollar amount → variable; uneven population → stratified; early decisive result → stop-or-go. The exam presents a scenario and asks which sampling method is most appropriate — know the trigger for each.

📰Real World

In the 2019 Capital One data breach, Paige Thompson exploited a misconfigured AWS WAF via a Server Side Request Forgery (SSRF) attack to obtain temporary credentials, then enumerated more than 700 S3 buckets and exfiltrated data on approximately 106 million individuals. Capital One's monitoring systems failed to detect the SSRF and S3 enumeration pattern in real time — the breach was discovered only after Thompson posted the data online and a third party alerted Capital One. From a sampling standpoint, this is a textbook Type II error at scale (a false negative: the monitoring controls were operating but failed to flag a condition that was actually present). The detection threshold was not calibrated to flag the specific access pattern, allowing the exception to pass undetected through every review cycle.

See also: 1.6 1.6.1 1.8
Section 1.7 Must-know

Audit Evidence Collection Techniques

By the end of this card, you should be able to
Define audit evidence and explain the three quality criteria — sufficiency, relevance, and competence — that evidence must meet to support audit conclusions.
Scenario

Alex Chen collects three pieces of evidence for the MERIDIA-1 access review: a screenshot of the access control screen showing one user, an interview note from the DBA confirming the access policy, and a system-generated extract of all active privileged users. He assembles them in the working paper. Priya Rao sits down to review. She circles the screenshot. 'This one is sufficient for one account. Your extract covers the full population. Your interview note corroborates policy intent.' She sets down the pen. 'Now rank these three by competence. And tell me which one gets flagged as primary exhibit in the working paper — and whether you could issue the finding without the other two.'

Audit Evidence Collection Techniques
S·R·C: Sufficient, Relevant, Competent. All three required — evidence failing one cannot support the conclusion.
How it works

Audit evidence is any information that an IS auditor uses to determine whether the area being audited meets established criteria and supports audit conclusions. Conclusions must be based on evidence that meets three quality criteria. Sufficiency requires that there be enough evidence to support the conclusion — a small sample cannot support a population-level conclusion, and a single document cannot support a systemic control assessment. Relevance requires that the evidence directly relate to the audit objective — evidence about access controls in one system cannot support a conclusion about a different system. Competence (reliability) requires that the evidence come from a trustworthy source and be objectively verifiable — system-generated reports are generally more competent than verbal statements, and original documents are more competent than summaries or photocopies. All three criteria must be satisfied simultaneously; evidence that meets only one or two is insufficient to support a valid audit conclusion.

🧠 Mnemonic
S·R·C — Sufficient, Relevant, Competent
Every piece of audit evidence must be Sufficient (enough), Relevant (right topic), and Competent (reliable source). All three together — not just one or two.
At a glance
📏

Sufficient

What makes audit evidence sufficient?

  • Enough evidence to support the conclusion
  • Population-level conclusion needs population-level coverage
  • Single data point or small sample may be insufficient
  • Sample size and design affect sufficiency
🎯

Relevant

What makes audit evidence relevant?

  • Directly related to the audit objective
  • Evidence addresses what is being concluded
  • Irrelevant evidence cannot support the conclusion
  • Evidence for one system ≠ relevant for another

Competent (Reliable)

What makes audit evidence competent?

  • Comes from a reliable, objective source
  • System-generated > verbal statements
  • Original documents > copies or summaries
  • Independent sources > management representations
🏆

Evidence Hierarchy

Which evidence sources are most competent?

  • System-generated reports (highest)
  • Third-party confirmations
  • Internal documents reviewed by auditor
  • Management statements (lowest)
Try yourself

Alex Chen collects three pieces of evidence for the MERIDIA-1 access review: a screenshot of the access control screen (one user), an interview note from the DBA confirming the access policy, and a system-generated report of all 847 active users. Which evidence best meets the three quality criteria for supporting a conclusion about the full access population?

— Pause to recall —
The system-generated report of all 847 active users — it is sufficient (covers the full population), relevant (directly related to access control conclusion), and competent (system-generated, objective source). The screenshot covers only one user (insufficient); the interview note is relevant but less reliable than system data (less competent).

Audit evidence is any information used by an IS auditor to determine whether the entity or data being audited meets established criteria and supports audit conclusions. Evidence must meet three quality criteria. Sufficiency: there must be enough evidence to support the conclusion — a single data point or small sample may be insufficient for a population-level conclusion. Relevance: the evidence must be directly related to the audit objective being addressed — evidence about one system is not relevant to a conclusion about another. Competence (or reliability): the evidence must come from a reliable source and be trustworthy — system-generated reports are generally more competent than verbal statements; original documents are more competent than copies.

Why this matters: The three evidence quality criteria — sufficient, relevant, competent — are foundational to every CISA exam scenario involving evidence. If evidence fails any of the three tests, the audit conclusion is not supportable. The exam presents evidence scenarios and asks which evidence best meets all three criteria.
🎯
Exam tip

Every CISA evidence question tests S·R·C. System-generated reports are more competent than verbal statements. A screenshot of one record is not sufficient for a population conclusion. Evidence must pass all three tests — not just the most obvious one.

See also: 1.5.4 1.7.1 1.8
Section 1.7.1 Must-know

Interviewing and Observing Personnel

By the end of this card, you should be able to
Describe best practices for IS audit interviews and observation of personnel, and explain how these techniques support evidence collection.
Scenario

Alex Chen interviews Meridian Corp's change board chair about the production deployment approval process. The chair describes a mandatory peer review step: 'Every change gets reviewed by a second developer before the change ticket moves to approved.' Alex schedules time to observe the weekly change advisory board meeting. He watches five change requests move through the agenda. For three of them, the peer review field in the ticket is blank. The changes are approved and scheduled for deployment anyway. The chair doesn't mention it. Alex looks at him interview notes from two days ago. He has two contradictory pieces of evidence and one week before the fieldwork closes.

Interviewing and Observing Personnel
4 requirements = structured interview + observation. Interview documents stated procedure; observation captures actual practice. Discrepancy between the two = the finding.
How it works

Interviewing and observing personnel are fundamental IS audit evidence collection techniques. Audit interviews must be structured and purposeful: the IS auditor organizes the interview in advance, clearly communicates the objectives to the interviewee beforehand, and follows a fixed outline or prepared checklist during the discussion to ensure complete and consistent coverage. After the interview, detailed notes documenting the discussion, statements made, and any commitments or clarifications are recorded as formal work paper documentation. Observation complements interviews by allowing the IS auditor to witness actual operational performance — verifying that what personnel say they do matches what they actually do. Observation is particularly valuable when there is reason to believe stated procedures may differ from actual practice. A key limitation of observation is that it captures only the moment the auditor is present; behavior may differ at other times.

At a glance
📋

Interview Preparation

How must an IS auditor prepare for an interview?

  • Organize in advance
  • Communicate objectives to interviewee beforehand
  • Prepare fixed outline or checklist
  • Schedule at appropriate time
🗣️

Interview Execution

What must happen during an audit interview?

  • Follow the fixed outline/checklist
  • Cover all required topics consistently
  • Probe discrepancies with follow-up questions
  • Maintain professional, objective tone
📄

Interview Documentation

How must interview results be documented?

  • Formal interview notes in work papers
  • Document statements, commitments, clarifications
  • Notes become official evidence
  • Interviewee may be asked to confirm
👁️

Observation

What does observation as an audit technique provide?

  • Verifies actual vs. stated performance
  • Captures real operational behavior
  • Valuable when stated and actual may differ
  • Limitation: point-in-time snapshot only
Try yourself

Alex Chen interviews Meridian Corp's change board chair, who describes a peer review step that occurs before every production deployment. When Alex observes the next change advisory board meeting, no peer review occurs for three of the five changes reviewed. What specific audit value does the discrepancy between the interview and observation create, and which of the two evidence types has higher competence?

— Pause to recall —
The discrepancy creates a finding: stated procedure does not match observed practice. Observation evidence is more competent than interview evidence — it is directly obtained by the auditor rather than self-reported by the auditee. The interview established what management claims the control does; the observation tests whether it actually does it.

Interviewing and observing are core audit evidence collection techniques. Effective audit interviews require advance organization: the auditor must communicate the interview's objectives to the interviewee beforehand. The interview must follow a fixed outline or checklist to ensure all required topics are covered consistently. After the interview, the auditor must document the discussion in formal interview notes, which become part of the work papers. Observation is a complementary technique: the IS auditor watches personnel performing their actual duties to verify that stated procedures match actual practice. Observation is particularly valuable when stated procedures may differ from real behavior. The IS auditor must document what was observed, when, and under what conditions. Observation is a point-in-time snapshot — it may not reflect behavior when the auditor is not present.

Why this matters: Interview and observation techniques are tested as structured evidence collection methods — not casual conversations. The exam tests that interviews must be pre-organized and documented, and that observation captures actual behavior but has a limitation: it only captures behavior at the moment of observation.
🎯
Exam tip

Observation captures actual behavior at the moment of observation — not general practice. The exam tests this limitation: if an auditor only observed a procedure once, they cannot conclude it is always performed correctly. Interview notes must be formal documentation — verbal conversations without notes do not constitute audit evidence.

📰Real World

Wirecard's collapse in 2020 (€1.9 billion "missing" cash) is the textbook example of weak evidence. For years EY accepted auditee-provided documents and screenshots of bank balances instead of obtaining independent confirmations directly from the Philippine banks. When external auditors finally asked the banks directly, the banks replied they had no relationship with Wirecard at all. Independence of the evidence source is not a formality — it's the firewall.

See also: 1.7 1.5.4 1.6.1
Section 1.8 Must-know

Audit Data Analytics

By the end of this card, you should be able to
Explain how data analytics enhances IS audit by enabling analysis of full data sets, and identify the primary uses of data analytics in an IS audit context.
Scenario

Alex Chen is reviewing Meridian Corp's 300,000 annual loan transactions. His sampling plan covers 60 records — valid, documented, and defensible for compliance testing. Then Priya Rao stops by his desk: 'Before you finish, I want you to run an analytics pass on the full population. Flag any loans where the origination fee was waived and the approver was the same person who processed the application.' Alex pauses. A 60-record sample wouldn't catch that pattern unless one of the 60 happened to be a matching case. He opens the analytics tool. The question is what he'll find — and whether the sample-based work plan he already filed can accommodate what comes next.

Audit Data Analytics
4 capabilities = analytics advantage. Full population (no sampling), Continuous (real-time), Anomaly detection, Risk quantification — all beyond what manual testing provides.
How it works

Data analytics is an IS audit capability that uses technology to analyze full data sets — entire populations of transactions or records — rather than relying on samples. Through Computer-Assisted Audit Techniques (CAATs) and purpose-built analytics platforms, an IS auditor can test every transaction in a population for compliance with policies or detection of anomalies, monitor key organizational data continuously for variances that signal risk, identify patterns that indicate control failures (such as duplicate payments, missing sequences, or self-approvals), and quantify the scope and financial impact of identified issues across the full data set. Data analytics does not replace professional judgment — the IS auditor must interpret the analytical output and determine whether flagged items represent actual control failures or legitimate business exceptions.

🧠 Mnemonic
Analytics = Full Population + Continuous + Anomaly Detection
Data analytics adds three capabilities beyond manual testing: Full population testing (not just samples), Continuous monitoring (not just periodic), and Anomaly detection (not just checking compliance). Three upgrades, one tool.
At a glance
📊

Full Population Testing

How does data analytics change population testing?

  • Test 100% of transactions — no sampling required
  • Every record analyzed, not just a subset
  • Finds low-frequency anomalies samples would miss
  • Quantifies impact across the full population
📡

Continuous Monitoring

What does continuous monitoring with analytics provide?

  • Near-real-time analysis of key data
  • Ongoing rather than periodic review
  • Issues flagged as they occur
  • Reduces time between event and detection
🔍

Anomaly Detection

What anomalies can data analytics identify?

  • Duplicate transactions
  • Missing sequence numbers
  • Transactions outside normal hours/patterns
  • Self-approvals and segregation-of-duties violations
📏

Risk Quantification

How does analytics quantify risk?

  • Dollar value of all exceptions
  • Frequency of control failures
  • Trend analysis over time
  • Comparative benchmarking across data sets
Try yourself

Meridian Corp's IS audit team can manually test about 60 of 300,000 annual loan transactions. Alex Chen asks about using audit data analytics. What single capability does full-population data analytics provide that sampling fundamentally cannot — and why does this matter for finding fraud indicators?

— Pause to recall —
Full-population analysis can identify every transaction that meets a specific pattern or threshold — including rare anomalies that would be statistically invisible in a 60-record sample. For fraud indicators, the entire value lies in finding the outlier that doesn't look like the rest of the population. Sampling has a calculated probability of missing any specific outlier; analytics eliminates that probability for the tested population.

Data analytics is an important IS audit tool that enables auditors to select and analyze full data sets rather than relying solely on sampling. Through technology tools (such as CAATs — Computer-Assisted Audit Techniques), an IS auditor can continuously audit or monitor key organizational data for abnormalities or variances, identify and evaluate organizational risk based on data patterns, and achieve greater coverage with fewer manual testing hours. Key capabilities include: testing 100% of transactions in a population instead of a sample; identifying outliers, duplicates, missing sequences, or unusual patterns; performing continuous auditing by monitoring data in near-real-time; and quantifying risks or control failures across the full data set rather than extrapolating from a sample.

Why this matters: The exam tests data analytics as a technique that extends IS audit coverage beyond what sampling allows. Full population testing, anomaly detection, and continuous monitoring are all exam-tested capabilities. CAATs are the toolset that enables analytics in IS audit.
🎯
Exam tip

Data analytics enables full population testing — eliminating the need for sampling in many situations. The exam tests that data analytics increases coverage and detects low-frequency anomalies that sampling would miss. CAATs are the primary tool category. Professional judgment is still required to interpret results.

See also: 1.8.1 1.8.2 1.6
Section 1.8.1 Must-know

Computer-Assisted Audit Techniques

By the end of this card, you should be able to
Explain what Computer-Assisted Audit Techniques (CAATs) are, describe the major tool categories, and identify the key capabilities that GAS provides to an IS auditor.
Scenario

Priya Rao assigns Alex Chen to audit MERIDIA-1's loan-processing data. The legacy system has a flat-file format — standard SQL queries won't work, and the system's own summary reports aggregate by loan category rather than individual record. The IT team offers to run a custom extract: 'We can pull whatever fields you need.' Alex thanks them and opens his laptop. He has the CAAT software and the raw data file. He could use the IT team's extract and be done in an hour. He could build his own extraction and take the afternoon. He opens the blank extraction script and thinks about why the choice matters.

Computer-Assisted Audit Techniques
GAS unseals the data. Six medallions = six core functions. Auditor-produced evidence, independent of management reports.
How it works

Computer-Assisted Audit Techniques (CAATs) are software tools that enable IS auditors to extract, analyze, and test data directly from client systems without relying on management-produced reports. This independence strengthens the reliability of audit evidence, especially when systems use varied hardware, software, or file formats that make manual review impossible. The most commonly tested CAAT category is Generalized Audit Software (GAS), which reads multiple database and flat-file formats and supports six core functions: file access (read diverse record structures), file reorganization (sort, index, merge), data selection (filter by criteria), statistical functions (sampling, stratification, frequency analysis), arithmetic functions (recalculate totals and ratios), and duplicate or gap detection. Other CAAT types include utility software, debugging and scanning tools, test data, application software tracing and mapping, and expert systems. From an auditor's perspective, CAATs convert raw system data into independently verified evidence.

At a glance
🔧

What CAATs Do

Why are CAATs essential?

  • Extract data independently of IT staff
  • Analyze large populations, not just samples
  • Work across different file formats and databases
  • Produce auditor-controlled evidence
  • Enable reproducible audit procedures
📊

GAS Core Functions

What can GAS do with a data file?

  • File access — read diverse record structures
  • File reorganization — sort, index, merge
  • Data selection — filter by conditions
  • Statistical functions — sampling, stratification
  • Arithmetic recomputation — verify totals
  • Duplicate and sequence checking
🗂️

Other CAAT Types

What CAAT tools exist beyond GAS?

  • Utility software — system-level data analysis
  • Debugging and scanning — code-level testing
  • Test data — input fabricated transactions
  • Application tracing and mapping — execution flow
  • Expert systems — rule-based decision support
🔍

Audit Advantage

What makes CAAT evidence reliable?

  • Auditor controls the extraction, not management
  • Can test 100% of transactions, not just samples
  • Flat-file and ASCII support covers legacy systems
  • Results are documented and reproducible
Try yourself

Priya Rao assigns Alex Chen to audit MERIDIA-1's loan-processing data. The legacy system uses a flat-file format that standard reports cannot parse. Alex needs to independently extract every loan record and test for duplicate loan IDs. What category of tool does Alex need, and what is the critical independence advantage that distinguishes auditor-operated CAAT extraction from relying on system-generated reports?

— Pause to recall —
Alex needs a Computer-Assisted Audit Technique (CAAT) — specifically a generalized audit software tool (e.g., ACL/Galvanize, IDEA) capable of reading flat-file formats. The independence advantage: CAAT extractions are produced by the auditor directly from source data, not filtered through the system's own reporting logic. System reports can be configured to exclude or reformat records that would reveal anomalies; CAAT extractions cannot be similarly filtered without the auditor's knowledge.

CAATs (Computer-Assisted Audit Techniques) are software tools that allow IS auditors to gather and analyze data independently of the client's IT staff. Within CAATs, Generalized Audit Software (GAS) is the most relevant tool here: it reads different record formats and file structures (including flat files and ASCII), allows the auditor to filter and select records by criteria, perform stratification and statistical sampling, check for duplicates, and recompute arithmetic. Because GAS operates independently, its output is audit evidence with high reliability—the auditor was not dependent on management-produced reports.

Why this matters: CAATs and GAS are CISA exam staples. The key audit principle is independence: GAS lets the auditor produce evidence directly from source systems rather than relying on reports prepared by the auditee, which is a lower-assurance source.
🎯
Exam tip

Test-takers often confuse GAS with test data. GAS reads production data to analyze it; test data introduces fabricated transactions to test how the system responds—they serve different purposes. A second common trap: CAATs do NOT eliminate the need for auditor judgment on findings—they produce evidence, not conclusions. Wrong-answer distractors will claim CAATs require IT staff assistance or that results lack independence; in fact, independent operation is their defining value.

See also: 1.8 1.8.2 1.7
Section 1.8.2 Must-know

Continuous Auditing and Monitoring

By the end of this card, you should be able to
Describe the difference between continuous auditing and continuous monitoring, explain how they combine to deliver continuous assurance, and identify the independence implication that auditors must manage.
Scenario

Devon Park has built a real-time Splunk dashboard that fires alerts whenever privileged access is granted outside business hours. He sends the dashboard documentation to Priya Rao with a note: 'This is effectively continuous auditing — we're monitoring controls in real time. I'd like to get credit for this in the annual audit plan as a reduced-scope area.' Priya reads the request. The dashboard is well-designed — she's already seen it catch three incidents. But Devon's team built the system, operates it, and reviews the alerts. She drafts a response.

Continuous Auditing and Monitoring
Two torches, one assurance. Left pillar = management monitoring; right pillar = independent auditing. Both must burn — but never merge.
How it works

Continuous auditing and continuous monitoring are related but distinct activities that an IS auditor must not conflate. Continuous auditing is performed by the IS audit function: auditors execute tests and assessments in real-time or near-real-time, dramatically shortening the gap between an event occurring and an audit opinion being issued. Continuous monitoring is performed by management or operations: the organization watches its own systems, processes, and data streams on an ongoing basis—examples include real-time antivirus scanning and intrusion detection alerts. The critical difference is independence. Monitoring lacks it; auditing depends on it. When an organization runs both simultaneously, continuous assurance becomes possible: management catches issues quickly (monitoring) while the auditor independently validates that the monitoring is effective (auditing). A common progression is for the audit function to develop monitoring techniques and then hand them off to the business, but the auditor must then step back from operating those tools to preserve objectivity.

At a glance
🔍

Continuous Auditing

Who does it and what does it produce?

  • Performed by IS auditors — independent
  • Near-real-time testing and assessment
  • Produces audit opinions quickly
  • Shorter lag from event to report
  • Auditor controls the procedures
📡

Continuous Monitoring

Who does it and what does it produce?

  • Performed by management / operations
  • Watches processes, systems, and data streams
  • Examples: IDS, AV, Splunk alert dashboards
  • Lacks independence — same team monitors itself
  • Valuable but not a substitute for auditing
🔄

Continuous Assurance

How do both combine?

  • Auditing + monitoring running simultaneously
  • Management catches issues in real-time
  • Auditor independently validates monitoring quality
  • Highest combined assurance level
  • Requires both functions to stay separate
⚠️

Independence Risk

What must the auditor avoid?

  • Owning or operating monitoring controls
  • Designing production alert thresholds
  • Being the first responder to monitoring alerts
  • Handing off techniques is fine — operating them is not
Try yourself

Devon Park's real-time Splunk dashboard fires alerts whenever privileged access is granted outside business hours. He asks Priya Rao: 'Does this count as continuous auditing?' What is the key distinction that determines whether Devon's activity is continuous monitoring or continuous auditing?

— Pause to recall —
Devon's activity is continuous monitoring — a management control function. Continuous auditing requires IS audit independence from the processes being monitored. Devon's team monitors the systems they operate; the IS audit function would independently assess whether those controls are effective. The distinction: monitoring is performed by management; auditing is performed independently of management.

Continuous auditing is an IS auditor function: the auditor independently tests and assesses controls in near-real-time and reports findings quickly. Continuous monitoring is a management activity: the organization itself observes processes and systems on an ongoing basis (e.g., Devon's Splunk alerts). The key distinction is independence—monitoring is performed by the same function being monitored, so it cannot substitute for auditing. When both operate simultaneously, continuous assurance is possible. However, if an IS auditor designs or owns the monitoring tools, independence is compromised. The audit function often transfers its techniques to the business once validated, which is how continuous monitoring programs are seeded.

Why this matters: CISA questions regularly test whether candidates can distinguish these two terms. The most important audit principle is independence: the moment the auditor owns a live monitoring control, objectivity is threatened.
🎯
Exam tip

The most common wrong answer conflates continuous monitoring with continuous auditing and credits monitoring with providing independent assurance. It does not—only the audit function provides independent assurance. A second trap: if the IS auditor builds and operates the continuous monitoring system, that auditor's independence on related audit work is impaired. The exam will present this as a seemingly efficient arrangement; recognize it as an independence violation.

See also: 1.8 1.8.3 1.4.6
Section 1.8.3 Good-to-know

Continuous Auditing Techniques

By the end of this card, you should be able to
Define continuous auditing techniques and explain their primary application in high-transaction, low-paper-trail environments.
Scenario

Meridian Corp's payment processing system handles 50,000 transactions per day. Alex Chen's current audit approach: extract a sample every six months and test sixty records. He finds two exceptions per cycle — but by the time he reports them, the underlying control gap has been open for months. Priya Rao drops a briefing note on his desk: 'The audit committee wants exception detection within four hours of a threshold breach. Tell me how we get from six months to four hours — and be specific about where the detection mechanism needs to sit in the processing flow.'

Continuous Auditing Techniques
3 techniques = continuous coverage. Embedded (inside the system), Monitor (daily controls), Alert (instant notification). Together they replace periodic auditing with perpetual assurance.
How it works

Continuous auditing techniques are IS audit tools designed to provide ongoing evaluation of controls in systems that process large volumes of transactions in real time. These techniques allow the IS auditor to assess operating controls in near-real-time without interrupting live transaction processing. Three principal approaches are: embedded audit modules, which insert monitoring logic directly into application systems to capture and flag transactions matching predefined audit criteria as they occur; continuous controls monitoring, which uses automated tools to test controls against defined parameters throughout the business day rather than at period-end; and exception reporting and alerting, which notify the IS auditor immediately when a transaction or control deviation falls outside acceptable boundaries, enabling rapid investigation. Continuous auditing enables IS audit to move from a periodic, backward-looking mode to an ongoing, forward-looking assurance posture.

🧠 Mnemonic
Embedded + Monitor + Alert = Continuous Audit
Three techniques together deliver continuous auditing: Embedded modules (capture in real-time), Controls monitoring (ongoing parameter testing), Alerts (immediate notification). Together they replace periodic with perpetual.
At a glance
💻

Embedded Audit Modules

What are embedded audit modules?

  • Monitoring code inserted in application systems
  • Flags transactions meeting audit criteria in real-time
  • Captures data without disrupting processing
  • Example: flag single-approval transactions above threshold
📡

Continuous Controls Monitoring

What does continuous controls monitoring do?

  • Tests controls against parameters throughout the day
  • Not just at period-end
  • Automated — no manual daily review required
  • Dashboard-driven visibility into control status
🔔

Exception Reporting & Alerts

What do exception reports and alerts provide?

  • Immediate notification of threshold breaches
  • Rapid follow-up before the issue expands
  • Reduces detection-to-response time
  • Configurable for each control parameter
🏦

Designed For

What environment is continuous auditing designed for?

  • High transaction volume systems
  • Limited paper trail environments
  • Time-sharing and real-time processing systems
  • Digital banking, payment processing
Try yourself

Meridian Corp's payment processing system handles 50,000 transactions per day. Traditional sampling covers 60 records every six months. Priya Rao asks Alex Chen to redesign the audit approach so that a threshold breach triggers an alert within four hours instead of six months. Which specific continuous auditing technique makes this possible, and where in the transaction processing flow does it operate?

— Pause to recall —
Embedded audit modules (EAMs) — code inserted directly into the application that captures transactions meeting predefined criteria in real time. They operate at the application layer, within the transaction processing flow itself, enabling exception alerts without requiring the auditor to periodically extract and analyze data. The audit module identifies the exception; the monitoring dashboard surfaces it; the alert delivers it within the defined time window.

Continuous auditing techniques are IS audit tools designed for environments that process large volumes of transactions with sparse paper trails. They permit an IS auditor to evaluate operating controls continuously without disrupting real-time transaction processing. Three primary techniques: embedded audit modules insert monitoring code into application systems to capture and flag transactions meeting defined audit criteria as they process in real time; continuous controls monitoring uses automated tools to test controls against defined parameters throughout the day rather than at period-end; exception reporting and alerts notify the IS auditor immediately when a transaction or event falls outside expected parameters, enabling rapid follow-up. Together, these techniques enable near-real-time assurance in high-volume environments.

Why this matters: Continuous auditing is specifically designed for time-sharing environments with high transaction volumes and minimal paper trails — exactly the scenario most IS auditors face with modern digital banking and payment systems. The exam tests that continuous auditing does not disrupt operations and enables ongoing (not just periodic) control evaluation.
🎯
Exam tip

Continuous auditing techniques are specifically designed for high-volume, low-paper-trail environments. The exam tests that these techniques operate without disrupting live processing. Embedded audit modules are the most specific technique — monitoring code lives inside the application.

See also: 1.8 1.8.2 1.8.4
Section 1.8.4 Good-to-know

Artificial Intelligence in IS Audit

By the end of this card, you should be able to
Explain how AI and machine learning are applied in IS audit, identify the key risks of AI-based audit tools, and describe what the IS auditor must assess when AI is used.
Scenario

Meridian Corp's IS audit team is piloting an AI fraud-detection tool on loan applications. The vendor's demonstration is impressive: the model flagged seventeen high-risk applications in a test set, twelve of which turned out to be fraud cases. Priya Rao reviews the demo materials. 'The recall rate looks good,' she says. She turns to Alex: 'Before we let this tool's output into a working paper as primary evidence, what do you need to know about it — and what do you need to test?' Alex has read the vendor documentation. He's not sure which part of it is the relevant question.

Artificial Intelligence in IS Audit
4 validation checks before AI is trusted. Algorithm, training data, back-test, explainability — all required.
How it works

Artificial intelligence and machine learning are applied in several IS audit-relevant business functions: detecting fraudulent transactions, performing automated data quality checks, screening for negative news, and processing large data sets. When an IS audit team uses or evaluates AI-based tools, the IS auditor must critically assess the tool's reliability rather than accepting its outputs at face value. Key assessment dimensions include: the algorithm's design and underlying logic; the quality and representativeness of the training data (biased training data produces biased outputs); the availability of result validation against known outcomes; and the explainability of individual decisions — regulators may require that automated decisions be explained. Key risks include algorithmic bias, lack of transparency in model decision-making, and over-reliance on automated results without applying professional human judgment. Audit conclusions cannot rest solely on unvalidated AI outputs.

🧠 Mnemonic
AI in Audit = Powerful Tool, Not Final Word
AI accelerates fraud detection, data screening, and pattern recognition. But the IS auditor must validate the algorithm, training data, and outputs before relying on results. AI output is input to judgment — not a substitute for it.
At a glance
🤖

AI Applications in IS Audit

How is AI used in IS audit contexts?

  • Fraud transaction detection
  • Data quality screening
  • Negative news and watchlist screening
  • Pattern recognition in large data sets
⚙️

Algorithm Assessment

What must the IS auditor assess about an AI algorithm?

  • Logic and decision criteria
  • Is it auditable and explainable?
  • Regulatory explainability requirements
  • Vendor transparency about the model
⚠️

Training Data Risks

What risks arise from AI training data?

  • Biased training data = biased outputs
  • Unrepresentative data misses real patterns
  • Historical data may not reflect current conditions
  • Data quality issues propagate through the model

Output Validation

How must AI outputs be validated in IS audit?

  • Back-test against known outcomes
  • Independent verification of flagged items
  • Cannot rely solely on unvalidated AI output
  • AI results = corroborating input, not standalone evidence
Try yourself

Meridian Corp's IS audit team is considering relying on an AI tool's fraud flags as primary audit evidence. Priya Rao says the tool outputs must be validated before use. What is the specific risk that makes AI outputs insufficient as standalone audit evidence, and what validation step addresses it?

— Pause to recall —
The specific risk is model opacity and training data bias: the AI tool may produce outputs based on patterns in historical data that reflect past fraud behaviors but miss novel patterns, or may incorporate biases from training data that produce systematic false positives or negatives. Validation requires back-testing the model's outputs against known fraud cases and non-fraud cases — confirming that the model's logic produces reliable, auditable conclusions before relying on its flags as evidence.

AI and machine learning are increasingly used in business functions relevant to IS audit, including fraud detection, data quality checks, negative news screening, and automated data processing. When an IS audit team uses or evaluates AI tools, the IS auditor must assess several dimensions. First, the algorithm and its logic: does the model make decisions in a defensible, auditable way? Second, training data quality: if the model was trained on biased or unrepresentative data, its outputs will reflect those biases. Third, result validation: can outputs be independently verified against known outcomes? Fourth, explainability: can the model explain why it flagged a particular item (regulators may require this)? Risks include algorithmic bias, black-box decision-making, over-reliance on automated results without human review, and errors in the training data propagating into audit conclusions.

Why this matters: The CISA exam increasingly tests AI in audit contexts. The IS auditor's role is not just to use AI tools but to critically evaluate their reliability. An audit conclusion based solely on an unvalidated AI output is not supported by sufficient competent evidence.
🎯
Exam tip

AI outputs are not automatically competent audit evidence — they must be validated. If an exam scenario shows an IS auditor relying solely on an AI tool's flags without independent validation, that is an evidence quality failure. Algorithmic bias and explainability are the two most-tested AI risk areas.

📰Real World

In 2020 the New York Times reported on Robert Williams, a Detroit man wrongly arrested after a facial-recognition algorithm matched a blurry still to his driver's license photo. The Detroit Police Department relied on the algorithm's output without independent corroboration — Williams was arrested, held overnight, and interrogated before investigators acknowledged the match was wrong. The case illustrates the IS auditor's core AI validation obligation: AI and ML results can appear authoritative while being factually incorrect, and the duty to validate inputs and interpret outputs does not transfer to the machine.

See also: 1.8 1.8.1 1.7
Section 1.9 Must-know

Reporting and Communication

By the end of this card, you should be able to
Explain the IS auditor's reporting and communication responsibilities and identify the elements of effective audit communication to stakeholders.
Scenario

Alex Chen has completed fieldwork for the MERIDIA-1 access review and drafted five findings. Lila Okafor, the technical lead, disputes finding #3 — she claims the access exception flagged is a valid system processing account, not a terminated employee's credential. Marcus Webb, the auditee manager, emails Alex directly: 'We're past the comment period. Issue the report as-is — the audit committee meeting is Monday and we need this off our plate.' Alex looks at finding #3 in the draft. He hasn't independently confirmed whether the account is a system account or a user account. The report is scheduled for distribution Friday at noon. Priya Rao is copied on Marcus's email but hasn't responded.

Reporting and Communication
4-step flow = Communicate → Draft review → Responses → Report. Skip step 2 = process gap, not shortcut.
How it works

Effective communication is central to IS audit quality at every stage of the engagement, not just at report issuance. During fieldwork, the IS auditor communicates preliminary observations to the auditee to validate factual accuracy and surface any misunderstandings before they harden into disputed findings. Before the final report is issued, draft findings are formally reviewed with auditee management, who provide factual corrections and document their planned responses to each finding. This auditee review process validates the accuracy of findings, secures management commitment to corrective actions, and prevents post-report disputes. The formal audit report then communicates findings, conclusions, and recommendations to all relevant stakeholders — including management, the audit committee, and the board as appropriate. The IS auditor must remain objective and clear throughout all communication, ensuring that findings are supported by evidence cited in the work papers.

🧠 Mnemonic
Communicate Early, Often, and Formally
IS audit communication has three stages: During fieldwork (preliminary observations), Before report (draft findings + auditee responses), After fieldwork (formal report to all stakeholders). Never skip the middle stage.
At a glance
🗣️

During Fieldwork

What communication happens during fieldwork?

  • Preliminary observations shared with auditee
  • Factual validation before findings solidify
  • Clarification of ambiguous evidence
  • Avoids surprise at report stage
📝

Draft Finding Review

Why must draft findings be reviewed with the auditee?

  • Validates factual accuracy of findings
  • Auditee corrects factual errors
  • Secures management responses to each finding
  • Prevents post-report disputes
📄

Formal Report

What does the formal audit report communicate?

  • Findings and conclusions
  • Recommendations for corrective action
  • Management responses
  • Issued to management + audit committee + board
🤝

Auditee Buy-In

Why is auditee buy-in important?

  • Validates finding accuracy
  • Commits management to corrective actions
  • Improves report quality and credibility
  • Reduces audit disputes post-issuance
Try yourself

Alex Chen has completed fieldwork and drafted five findings for the MERIDIA-1 access review. He is ready to issue the final report. What is the IS auditor's obligation before finalizing and distributing the report — and what is the governance risk if he skips this step at management's request?

— Pause to recall —
Before finalizing the report, Alex must share draft findings with the auditee management for review and response. This draft-finding review is a required communication step — it allows management to correct factual errors and provide formal responses. Skipping it at management's request (e.g., to meet a deadline) creates governance risk: the final report may contain errors, management's position is unrecorded, and the audit committee receives an incomplete picture.

Effective and clear communication significantly improves audit quality. The IS auditor must communicate at multiple points: during fieldwork, preliminary observations should be discussed with the auditee to confirm factual accuracy and avoid surprises; before the final report, draft findings must be reviewed with auditee management to obtain their factual agreement and management responses (what they will do to address each finding). The formal audit report then communicates findings, conclusions, and recommendations to all relevant stakeholders — including the audit committee and board as appropriate. Auditee buy-in on draft findings is important because it: validates factual accuracy, secures commitment to corrective actions, and prevents disputes after the report is issued.

Why this matters: The exam tests that IS audit reporting is a multi-step communication process — not just writing a final report. Draft-finding review with the auditee is a required step that validates accuracy and secures management responses. A report issued without auditee review is a process control gap.
🎯
Exam tip

Draft finding review with the auditee is a required step before the final report is issued — not optional. The exam may present scenarios where this step is skipped; the correct response is that the process is incomplete. Auditee review does not compromise independence — it validates accuracy.

See also: 1.9.1 1.9.2 1.9.3
Section 1.9.1 Must-know

Communicating Audit Results

By the end of this card, you should be able to
Explain the purpose of the exit interview, describe how an IS auditor should handle disagreements with auditee management, and identify the independence risk when auditors are asked to help implement recommendations.
Scenario

Alex Chen is in the exit interview for Meridian Corp's cloud access-control review. The IT manager disputes finding #2: 'That access configuration has been in place for three years with zero incidents. It's immaterial — I'm asking you to remove it from the report.' Lila Okafor, the technical lead, backs him up: 'If it goes to the audit committee with that finding, we'll spend the next quarter on remediation work that won't change our risk profile.' Alex looks at him working paper. The finding is technically valid — the access scope exceeds the documented role requirement. There have been no incidents. He has twenty minutes before Priya Rao expects his draft response memo.

Communicating Audit Results
The exit interview: facts are tested, not feelings. Finding stays until facts are wrong — not until management disagrees.
How it works

The exit interview is the structured meeting at the end of an IS audit where the auditor reviews findings and recommendations with auditee management before issuing the formal report. It serves four purposes: confirming that all facts are accurate and material, verifying that recommendations are realistic and cost-effective, recommending implementation dates for agreed-on recommendations, and surfacing any disputes before the report is final. When management disagrees with a finding, the IS auditor should clarify the risk, document the disagreement if it persists, and escalate to senior management if needed—not silently remove a valid finding. A separate independence risk arises when management asks the auditor for help implementing a recommendation. Providing substantive assistance compromises the auditor's future objectivity on that control area. The auditor should clearly communicate the distinction between the auditor's advisory role and a consultant's implementation role, and decline requests that would impair independence.

At a glance
📋

Exit Interview Duties

What must the IS auditor do at the exit interview?

  • Confirm facts in the report are correct and material
  • Verify recommendations are realistic and cost-effective
  • Recommend implementation dates for agreed-on recommendations
  • Discuss disagreements before the report is issued
⚖️

Handling Disagreements

What if auditee management disputes a finding?

  • Elaborate on the risk and impact of non-correction
  • Correct genuine factual errors — not risk assessments
  • Document management's position if dispute continues
  • Escalate to senior management if unresolved
  • Never suppress a valid finding due to pressure
🚧

Independence Boundary

What happens if the auditor drafts remediation?

  • Auditor becomes effectively management's consultant
  • Future independence on that control is impaired
  • Must disclose impairment if assistance is given
  • Refer implementation work back to management
📈

Escalation Path

Who does the auditor ultimately report to?

  • Senior management and the audit committee
  • Not solely to the auditee department
  • Denial of access by middle management = reportable
  • Auditor has right to communicate up the chain
Try yourself

Alex Chen has completed fieldwork on Meridian Corp's cloud access-control review. During the exit interview, the IT manager disputes a finding, calling it immaterial and asking Alex to remove it. Alex believes the finding is valid. Separately, the IT manager asks Alex to draft the remediation plan. How should Alex handle each situation?

— Pause to recall —
On the dispute: elaborate on the risk and effect of not correcting it; do not remove a valid finding. On the remediation request: decline or clearly flag that assisting with implementation threatens auditor independence.

During the exit interview, the auditor's duties are to confirm facts are accurate and material, ensure recommendations are realistic, and recommend implementation dates for agreed-on recommendations. When the auditee disputes a finding, the auditor should not simply remove it—instead, elaborate on the significance, the risk exposure, and the effect of leaving the weakness uncorrected. If genuine factual errors exist, correct them; if it is a disagreement on risk, document both positions. Regarding implementation assistance: an IS auditor who helps management design or build a remediation control may no longer independently audit that control. The auditor should communicate this independence boundary clearly, refer the task back to management, or obtain explicit acknowledgment of the impairment.

Why this matters: CISA tests the tension between being helpful and maintaining objectivity. The correct auditor behavior is to maintain independence even when it disappoints the auditee—removing valid findings or drafting controls both compromise the audit's value.
🎯
Exam tip

Wrong answers will offer 'the auditor should remove the finding if management provides a reasonable explanation' — this is incorrect; audit findings are only corrected when facts are wrong, not when management dislikes the conclusion. A second trap: 'the auditor should help draft the remediation to add value' sounds collaborative but is an independence violation. The CISA exam strongly favors independence over helpfulness when they conflict.

See also: 1.9 1.9.3 1.10.1
Section 1.9.2 Must-know

Audit Report Objectives

By the end of this card, you should be able to
Describe the six objectives of an IS audit report and explain how audit scope and objectives shape the report's required content.
Scenario

Janet Holloway distributes Meridian Corp's completed cloud-security audit report to the board's audit committee. The report is technically accurate — every finding is supported by working-paper evidence. But a committee member sets it down after three pages: 'I can't tell from this report whether the cloud environment is adequately controlled or not. The findings are here, but what are you telling me to do with them?' Another member adds: 'And the executive summary reads like a field notes log — I need to understand the risk level, not the audit timeline.' Janet looks at the report. Alex Chen's fieldwork was thorough. The problem is somewhere else.

Audit Report Objectives
Six seals, one report. Every seal must hold — a broken credibility seal cracks all the others.
How it works

An IS audit report serves six distinct objectives that extend well beyond simply documenting findings. First, it formally presents audit results to the auditee and to the audit client when those are different parties. Second, it serves as the official closure of the engagement. Third, it provides a statement of assurance and, where needed, identifies control gaps with recommendations. Fourth, it functions as a durable reference document for any party that later researches the auditee or the topic. Fifth, when findings were identified, the report becomes the baseline for a future follow-up audit. Sixth, a well-constructed, professionally written report actively promotes the credibility of the audit function itself. The scope and objectives of the audit—shaped by risk assessments, materiality judgments, and regulatory requirements established during planning—determine what the report must address and how conclusions are drawn.

🧠 Mnemonic
P·C·A·R·F·C — 'Properly Close Audits: Reference, Follow-up, Credibility'
Present results formally, Close the engagement, Assure (statements of assurance + corrective action), Reference (valued reference document), Follow-up (basis for follow-up audit), Credibility (well-written report promotes audit credibility). Six objectives — exam distractors drop #4 or #6; memorize all six.
At a glance
📜

Objectives 1–2

What administrative roles does the report serve?

  • Formally presents results to auditee (and audit client)
  • Serves as official closure of the engagement
  • Marks the defined end of audit fieldwork

Objectives 3–4

What substantive value does the report deliver?

  • Statements of assurance over controls reviewed
  • Identifies areas requiring corrective action
  • Recommendations tied to specific control gaps
  • Serves as a reference for future researchers
🔁

Objectives 5–6

How does the report support future work?

  • Baseline for follow-up audit if findings were raised
  • Follow-up tracks whether remediation was implemented
  • Promotes audit credibility through quality writing
  • Poor presentation undermines all other objectives
🗂️

Report Shaping Inputs

What determines what the report must address?

  • Auditee management requirements
  • Oversight / regulatory body requirements
  • IS audit standards (ISACA 1401)
  • Risk, materiality, and scope established at planning
Try yourself

Janet Holloway distributes Meridian Corp's completed cloud-security audit report to the board's audit committee. A committee member asks: 'Why does the report need to be well-written and professionally presented? Isn't the content what matters?' Janet has a precise answer rooted in audit standards. What is it, and what are all six purposes the report must serve?

— Pause to recall —
Presentation quality directly supports audit credibility — objective six. A poorly written report undermines confidence in all five other purposes: formally presenting results, closing the engagement, providing assurance, serving as a reference, and enabling follow-up.

The six objectives of an audit report are:

  1. formally present audit results to the auditee (and audit client where different)
  2. serve as formal closure of the audit engagement
  3. provide statements of assurance and identify areas requiring corrective action with recommendations
  4. serve as a valued reference for parties researching the auditee or audit topic
  5. serve as the basis for a follow-up audit when findings were presented; and
  6. promote audit credibility, which depends directly on the report being well developed and well written

Objectives are shaped by requirements from auditee management, oversight organizations, and IS audit standards.

Why this matters: CISA tests that candidates know all six objectives—not just the obvious ones. Exam distractors will list five and drop either the 'reference' or 'credibility' objective. The follow-up audit basis (objective 5) is also frequently omitted in wrong-answer choices.
🎯
Exam tip

Exam distractors routinely list only four or five objectives and drop either 'serve as a reference for researchers' or 'promote audit credibility.' Memorize all six. A second trap: the report's scope and conclusions must align with the audit objectives set during planning — a report that extends beyond the defined scope is as problematic as one that falls short of it. Wrong answers will present 'the auditor may include any relevant findings regardless of scope' as correct; this is not consistent with ISACA standards.

See also: 1.9 1.9.3 1.10.1
Section 1.9.3 Must-know

Audit Report Structure and Contents

By the end of this card, you should be able to
Identify the required structural components of an IS audit report and explain how findings are tailored to their intended recipient.
Scenario

Priya Rao hands Alex Chen a draft audit report on Meridian Corp's change-management process. The draft is sixty-two pages: findings about misconfigured test servers sit next to findings about board-level access control policy gaps. The executive summary is twelve pages long. The board presentation is Thursday. Alex reads the first twenty pages and sees the problem immediately. Priya asks: 'What's wrong with this document — and what are the two things you'd need to do to fix it before it goes to the committee?'

Audit Report Structure and Contents
Five chapters, two audiences. Findings split by materiality — the board stack is shorter for a reason.
How it works

An IS audit report is a structured document with components that serve distinct purposes. The introduction establishes context: it states the audit objectives, the scope and coverage period, any limitations encountered, the nature and extent of procedures performed, and the methodology followed. Audit findings are presented in separate sections, typically grouped by materiality level and by the intended recipient. The overall conclusion and opinion assesses the adequacy of the controls examined and identifies actual or potential risks arising from deficiencies. Reservations or qualifications acknowledge any constraints on the audit. Detailed findings and recommendations are then included selectively — a finding relevant only to local IT management should not appear in the audit committee report if it lacks broader organizational significance. The totality of evidence gathered during fieldwork must logically support the stated conclusions; the audit report and the working papers must be consistent.

🧠 Mnemonic
IFORD
Introduction, Findings, Opinion, Reservations, Detailed recommendations — the five components every IS audit report must contain.
At a glance
📄

Introduction

What does the introduction section cover?

  • Audit objectives and purpose
  • Scope and coverage period
  • Limitations on audit work
  • Procedures performed and processes examined
  • Methodology and standards applied
⚖️

Findings & Opinion

How are findings organized and what follows?

  • Grouped by materiality and/or recipient
  • Overall conclusion on control adequacy
  • Identifies actual and potential risk
  • Opinion must be supported by evidence gathered
  • Reservations / qualifications noted separately
📋

Detailed Recs

How are detailed findings selected?

  • Based on materiality of the finding
  • Based on the intended recipient
  • Board report: material, org-wide significance only
  • Operations report: may include lower-level findings
  • Every recommendation tied to a specific control gap
🔍

Evidence Standard

What must the report be consistent with?

  • Audit working papers from fieldwork
  • Scope and objectives set at planning
  • ISACA IS Audit Standards 1401 and 1402
  • Balance of evidence supports each conclusion
Try yourself

Priya Rao hands Alex Chen a single draft audit report containing both board-level findings and detailed IT team housekeeping items. The board presentation is in three days. What is the fundamental structural problem with this draft, and what is the IFORD sequence that should govern each report's organization?

— Pause to recall —
The fundamental problem is audience mismatch: board-level findings and operational housekeeping belong in separate, tailored reports. A single document serving both audiences will either overwhelm the board with technical detail or fail to give the IT team actionable specifics. The IFORD sequence for each tailored document: Introduction, Findings, Opinion, Reservations, Detailed recommendations.

A properly structured IS audit report contains five components:

  1. an introduction stating objectives, scope, period of coverage, limitations, procedures performed, and methodology
  2. audit findings grouped by materiality and/or intended recipient
  3. an overall conclusion and opinion on control adequacy, including actual and potential risks from identified deficiencies
  4. reservations or qualifications with respect to the audit; and
  5. detailed findings and recommendations, included selectively based on materiality and the intended audience

For example, a finding important only to local IT operations should not appear in the audit committee report if it lacks broader organizational significance. The overall evidence gathered during the audit must support the conclusions stated.

Why this matters: The CISA exam tests that candidates understand report tailoring: the same set of findings is not sent uniformly to all recipients. Materiality and audience determine what appears in each version of the report.
🎯
Exam tip

A frequent wrong-answer trap is 'all findings are included in all versions of the audit report.' This is false — the report is tailored to the recipient by materiality. Another trap: 'the opinion can go beyond the defined scope.' It cannot — the conclusion must stay within the audit scope. Finally, candidates often misidentify what belongs in the introduction; limitations and methodology are required there, not relegated to an appendix.

See also: 1.9 1.9.1 1.9.2
Section 1.9.4 Must-know

Audit Documentation

By the end of this card, you should be able to
Describe the minimum required contents of audit documentation, explain the standards for work-paper quality, and identify the rules governing custody, retention, and access to audit documentation.
Scenario

An external regulator sends Alex Chen a direct email: 'We require the complete working paper file from your most recent MERIDIA-1 access review by end of business Friday.' The email has a regulatory letterhead and a case reference number. Alex looks at the calendar — it's Wednesday. Janet Holloway is traveling. He has the work papers in the audit repository and the access to export them. The regulator's request looks legitimate. Sending the files would take ten minutes. He drafts a reply.

Audit Documentation
The vault stays locked until Legal and Senior Management sign the scroll. Seven quality marks on every work paper inside.
How it works

Audit documentation is the written record that supports every representation in the audit report and demonstrates that the engagement met professional standards.

🧠 Mnemonic
DRIP-CCS
Dated, Relevant, Initialed, Page-numbered — Clear, Complete, Self-contained. The seven quality marks every work paper must carry.
At a glance
📁

Minimum Content

What must every audit documentation file contain?

  • Planning: scope and objectives
  • Walkthroughs of audited area
  • Audit program
  • Steps performed and evidence gathered
  • Use of other auditors or experts
  • Findings, conclusions, and recommendations
  • Document ID and dates

Work Paper Quality

What makes a work paper acceptable?

  • Dated and initialed by preparer
  • Page-numbered and properly labeled
  • Relevant to audit objectives
  • Complete and self-contained
  • Clear and comprehensible to reviewer
  • Properly filed and secured
🔒

Custody & Access

Who owns audit documentation and who can see it?

  • Property of the IS audit function (not the auditee or management)
  • Accessible only to authorized personnel
  • External access requires senior mgmt approval
  • External access requires legal counsel approval
  • Policies define retention and custody rules
⚠️

External Release Rule

What must happen before releasing work papers externally?

  • Obtain written approval from senior management
  • Obtain approval from legal counsel
  • Do NOT respond to external requests unilaterally
  • Regulator requests are not automatic authorizations
Try yourself

An external regulator requests a copy of Meridian Corp's IS audit work papers from the MERIDIA-1 review. The request comes directly to Alex Chen by email. What must Alex do before releasing any work papers, and why can he not release them on his own authority even to a legitimate regulator?

— Pause to recall —
Alex must obtain authorization from audit leadership before releasing any work papers to an external party — including regulators. Work papers are the property of the audit function, not the individual auditor. Releasing them without authorization bypasses the audit function's confidentiality obligations and the organization's legal review process, which must assess scope of the request before disclosure.

Audit documentation is the evidentiary backbone of the audit report—it demonstrates that standards were followed and supports every conclusion reached. Before releasing documentation to any external party, the IS auditor must first obtain written approval from senior management and legal counsel; responding directly to external requests without that approval is improper. The work papers themselves must meet defined quality standards: dated, initialed by the preparer, page-numbered, relevant to the audit objectives, complete, clear and comprehensible, self-contained, and properly labeled and filed. The minimum required content includes: planning and preparation documentation, walkthroughs, the audit program, steps performed and evidence gathered, notation of any third-party experts used, findings and conclusions, and document identification with dates. Policies should also define retention periods and custody rules.

Why this matters: CISA exams test both the content requirements and the release rules. The most tested point is that the auditor cannot release work papers unilaterally—senior management and legal approval are mandatory.
🎯
Exam tip

The most commonly tested trap is that a regulator's request automatically entitles them to the work papers. It does not—the auditor must first obtain senior management and legal counsel approval regardless of who is asking. A second trap: candidates mix up 'recommended' vs. 'required' contents. The seven items (scope/objectives, walkthroughs, audit program, steps/evidence, expert use, findings/conclusions, document IDs) are minimum requirements; the copy of the issued report and supervisory review evidence are recommended additions, not mandatory minimums.

See also: 1.5.4 1.9.5 1.1.3
Section 1.9.5 Must-know

Follow-Up Activities

By the end of this card, you should be able to
Explain the purpose of IS audit follow-up activities and identify what the IS auditor must verify when following up on prior audit findings.
Scenario

Meridian Corp's IS audit issued a finding about missing segregation of duties in the batch process six months ago. Management agreed to remediate within 90 days. The 90-day mark has passed. The operations VP emails Alex Chen: 'We've implemented the compensating control — enhanced log review and independent reconciliation. Consider this finding closed.' Alex opens his follow-up calendar. The remediation is marked as complete by management. He has never independently verified the compensating controls are in place. The audit committee update is next week. Janet Holloway asks Alex to confirm the finding status before the meeting. He pulls up the email from the operations VP. It describes the controls but provides no evidence.

Follow-Up Activities
3-step flow = Prior finding → Management acts → Auditor verifies. Red flag = escalate to audit committee.
How it works

IS audit is an ongoing process, not a one-time event. After an audit report is issued and management has agreed to corrective actions, the IS auditor must follow up to verify that those actions have actually been implemented. A formal follow-up program tracks agreed corrective actions by due date, responsible owner, and implementation status. The IS auditor verifies not only that actions were taken but that they were effective in addressing the underlying control weakness. When corrective actions have not been implemented on time, the IS auditor documents the open finding, assesses the continuing residual risk, and escalates the situation to appropriate governance levels — typically the audit committee — when management is non-responsive. Open prior-year findings also feed into the next audit risk assessment as unresolved risk factors.

🧠 Mnemonic
Audit → Report → Follow-Up → Verify → Escalate if Needed
The audit cycle does not end at report issuance. Follow-up is the closing gate: verify corrective action was taken, was effective, and escalate to audit committee if management does not act.
At a glance

Purpose of Follow-Up

Why must IS audit follow up on prior findings?

  • Verify corrective actions were implemented
  • Ensure risk is actually reduced — not just actioned
  • Audit without follow-up leaves risk open
  • Required IS audit process phase
🔍

What IS Auditors Verify

What does follow-up verification check?

  • Was the agreed action taken?
  • Was it taken on schedule?
  • Is the control weakness actually resolved?
  • Is residual risk acceptable?
⚠️

When Corrective Action Is Incomplete

What happens when management fails to remediate?

  • Finding remains open in the tracker
  • Residual risk is documented and assessed
  • Escalated to audit committee if non-responsive
  • Feeds into next risk assessment as open risk
🗓️

Follow-Up Program

What does a formal follow-up program include?

  • Tracker of agreed actions by due date
  • Responsible owner per finding
  • Implementation status updates
  • Periodic reporting to audit committee
Try yourself

Meridian Corp's IS audit issued a finding about missing segregation of duties in the batch process six months ago. Management agreed to remediate within 90 days. What is the IS auditor's responsibility now, and what happens if corrective actions have not been implemented?

— Pause to recall —
The IS auditor must follow up to verify whether management implemented the agreed corrective actions on schedule. If actions were not taken or are incomplete, the IS auditor must report the open finding, explain the residual risk, and escalate as needed — including to the audit committee if management is non-responsive.

IS audit is an ongoing process — issuing a report without following up on corrective actions means audit findings may never be resolved, and risk continues unmitigated. IS auditors must maintain a follow-up program to determine whether agreed-on corrective actions have been implemented within agreed timelines. The follow-up process involves: verifying that each remediated finding has been addressed as agreed; assessing whether the implemented action actually reduces the risk (not just completes an action); and escalating unresolved findings to appropriate governance levels when management fails to act. If management has taken only partial corrective action, the IS auditor must assess whether the residual risk is acceptable. Open findings from prior audits feed into subsequent risk assessments and audit planning.

Why this matters: The exam tests that follow-up is a required phase of IS audit — not optional. An audit that reports findings but never verifies corrective action is ineffective. When management does not remediate, escalation to the audit committee is the required response.
🎯
Exam tip

Follow-up is a required IS audit phase, not optional. The exam often presents a scenario where a prior finding is unresolved — the correct IS auditor response is to document the open finding, assess residual risk, and escalate to the audit committee (not management) if the auditee is non-responsive.

See also: 1.9 1.9.1 1.10
Section 1.9.6 Good-to-know

Types of IS Audit Reports

By the end of this card, you should be able to
Identify the primary types of IS audit reports and explain when each type is used.
Scenario

Meridian Corp's regulator sends a detailed request to Janet Holloway: perform eleven specific control tests on the loan origination process, document results for each test, and provide the output by month-end. The request includes a line: 'No overall opinion or conclusion is required — document findings only.' Separately, the board's audit committee wants a full assurance report on the same loan origination process for the Q3 committee meeting. Janet calls Alex Chen in. 'Same system, two very different requests. One of them is a standard engagement. The other needs a different report structure entirely. Which is which — and what is the structural difference between them?'

Types of IS Audit Reports
4 report types = 4 engagement contexts. Standard (auditor opinion), AUP (specified procedures, no opinion), Examination (high-assurance), Improvement (recommendations). Match report to engagement.
How it works

The type of IS audit report issued at the end of an engagement is determined by the nature of the engagement and the applicable reporting requirements. The standard IS audit report is the most common: it presents the IS auditor's independent conclusions on the effectiveness of controls within the defined scope. An examination report provides a higher-assurance opinion on specific subject matter, similar to an attest engagement. An agreed-upon procedures (AUP) report is used when the requester defines the exact procedures to be performed; the IS auditor documents the procedures and results without forming an overall opinion. An improvement opportunity report presents recommendations for enhancing processes, controls, or the audit function itself, without expressing an opinion on current control effectiveness. In complex engagements, more than one report type may be applicable — for example, a standard audit report supplemented by an AUP for regulator-specified tests.

🧠 Mnemonic
Standard = Opinion; AUP = No opinion, specified procedures
The key distinction for the exam: Standard audit report = IS auditor expresses opinion. AUP report = no opinion, auditor only reports results of specified procedures. Know which engagement type requires which report.
At a glance
📄

Standard IS Audit Report

When is a standard IS audit report used?

  • Auditor expresses opinion on control effectiveness
  • Most common audit engagement output
  • Auditor determines scope independently
  • Issued to management and audit committee
📋

Agreed-Upon Procedures Report

What characterizes an AUP report?

  • Requester specifies exact procedures
  • No overall auditor opinion formed
  • Reports what was done and what was found
  • Common for regulatory-specified testing
🔬

Examination Report

When is an examination report used?

  • Higher-assurance opinion on specific subject matter
  • Similar to attest engagement
  • More rigorous evidence requirements
  • Specific subject matter focus
📈

Improvement Report

What is an improvement opportunity report?

  • Recommendations for process enhancement
  • No opinion on current control effectiveness
  • Can cover audit process or other processes
  • Improvement-focused deliverable
Try yourself

Meridian Corp's regulator requests a specific set of control tests to be performed and documented, but explicitly states it does not want the IS auditor to form an overall opinion. What report type is appropriate, and how does it differ from a standard IS audit report?

— Pause to recall —
An Agreed-Upon Procedures (AUP) report is appropriate. Unlike a standard IS audit report (which includes an overall opinion on the control environment), an AUP report documents only the specific procedures performed and the factual findings from each. The IS auditor forms no opinion — they report findings, not conclusions. The regulator specifies the procedures; the auditor executes and reports results.

The type of IS audit report is driven by the engagement type and reporting requirements. The standard IS audit report presents the auditor's independent opinion on the effectiveness of controls within the audit scope — it is the most common report type. An examination report provides a higher level of assurance on specific subject matter, similar to an attest engagement. An agreed-upon procedures (AUP) report documents the specific procedures performed and results obtained without the auditor forming an overall opinion — appropriate when the requester defines exactly what work should be done. An improvement opportunity or process improvement report presents recommendations for enhancing the audit process itself or other processes, without expressing an opinion on control effectiveness. In some engagements, more than one report type may be applicable.

Why this matters: The exam tests that the report type must match the engagement type. AUP reports are commonly tested: the auditor performs specified procedures and reports results — no overall opinion is formed. This is different from a standard audit report where the auditor independently determines scope and expresses an opinion.
🎯
Exam tip

AUP (Agreed-Upon Procedures) is the most-tested report type distinction. In AUP: the requester defines the procedures, and the IS auditor forms no overall opinion — only reports findings per the specified procedures. If the exam shows a regulator specifying exactly what to test, the output is an AUP report.

📰Real World

The 2015 Toshiba accounting scandal illustrates the difference between internal oversight and independent external review. Toshiba's internal audit committees had effectively no functioning controls and failed to surface or report improper accounting to the board over a period spanning fiscal years 2008 through 2014. In May 2015, an Independent Investigation Committee — composed of external lawyers and certified public accountants — was appointed and found that Toshiba had overstated operating profit by approximately ¥151.8 billion (~$1.22 billion USD). The committee's report identified a pervasive organisational culture of deferring to superiors and avoiding challenge as the root cause, meaning internal oversight never had the independence necessary to detect and escalate the problem. The contrast is direct: the internal review function existed on paper but could not provide genuine assurance; the external committee, operating independently, produced findings the internal function never could.

See also: 1.9 1.9.2 1.9.3
Section 1.10 Must-know

Quality Assurance and Improvement of the Audit Process

By the end of this card, you should be able to
Explain why continuous improvement of the IS audit process is essential and identify the mechanisms used to measure and enhance audit quality.
Scenario

Meridian Corp's audit committee receives a complaint from a business unit: 'Two different IS auditors reviewed the same system in the same quarter using different test procedures and reached different conclusions. How is that possible?' Janet Holloway reads the complaint. The audit function has no formal QAIP. Individual audit leads design their own programs. There's no periodic self-assessment and no external review on record. The audit committee chair looks across the table: 'Who audits the auditors?' Janet doesn't have an immediate answer. She asks for thirty minutes at the end of the meeting.

Quality Assurance and Improvement of the Audit Process
4-step cycle = audit quality loop. PAMI: Plan → Audit → Measure → Improve. External assessment validates the whole cycle.
How it works

Quality assurance and improvement programs (QAIPs) ensure that the IS audit function itself operates to a high standard. While IS auditors routinely assess controls in client systems, the audit team must also subject its own methods, outputs, and competencies to ongoing scrutiny. Internal monitoring checks day-to-day compliance with standards. Periodic internal assessments evaluate the overall effectiveness of the audit function. External assessments by qualified, independent reviewers validate that the function meets professional standards; ISACA requires at least one external assessment every five years. Metrics such as finding accuracy, timely delivery, and stakeholder satisfaction are tracked and fed back into methodology improvements. The QAIP forms a closed loop: audit outputs are measured, gaps are identified, and improvements are planned and implemented.

🧠 Mnemonic
PAMI
Plan audits → Audit controls → Measure outcomes → Improve the process — PAMI keeps the audit function healthy.
At a glance
🔄

What QAIP Is

What does a QAIP cover?

  • Internal monitoring of daily audit work
  • Periodic internal assessments
  • External assessments (every 5 years)
  • Metrics-based performance measurement
📊

Key Metrics

How do you measure IS audit quality?

  • On-time engagement delivery
  • Recommendation acceptance and closure rates
  • Stakeholder satisfaction scores
  • Audit findings accuracy
🔍

External Assessment

Who performs an external quality assessment?

  • Independent, qualified reviewer
  • Not a member of the audit team
  • Required at least every five years
  • Validates conformance to ISACA standards
⬆️

Improvement Loop

What happens with QAIP findings?

  • Feed into training and development
  • Drive methodology updates
  • Inform resource and budget planning
  • Closed-loop — findings become inputs
Try yourself

Meridian Corp's audit committee asks: 'How do we know the IS audit process itself is any good?' What is the ISACA-mandated mechanism that answers this question, and what is the key distinction between an internal assessment and an external assessment within that mechanism?

— Pause to recall —
The Quality Assurance and Improvement Program (QAIP) is the ISACA-mandated mechanism. Internal assessments (ongoing supervision, periodic self-reviews) are performed by the audit function itself. External assessments must be performed by a qualified independent reviewer — someone outside the IS audit organization. A peer review from another audit team within the same organization does NOT qualify as an external assessment.

An IS audit function must assess and continuously improve its own quality, not just the quality of controls it reviews. This is achieved through a Quality Assurance and Improvement Program (QAIP) that includes ongoing internal monitoring, periodic internal assessments, and at least one external assessment every five years. Metrics such as on-time delivery, stakeholder satisfaction, and audit recommendation acceptance rates provide objective evidence of quality. Findings from quality assessments feed back into training, methodology updates, and resource planning, forming a closed improvement cycle.

Why this matters: CISA exams test that audit quality assurance applies to the audit function itself—not only to the IT controls being audited. Quality programs are mandatory under ISACA standards, and external assessments must be independent.
🎯
Exam tip

CISA questions often test that quality assurance applies to the audit function, not just client IT controls. External reviews must be independent—a peer review from another audit team within the same organization does NOT qualify as external.

See also: 1.10.1 1.10.2 1.1.1
Section 1.10.1 Must-know

Audit Committee Oversight

By the end of this card, you should be able to
Explain the audit committee's oversight role relative to the IS audit function and identify what happens when an audit committee does not exist.
Scenario

Janet Holloway presents Meridian Corp's IS audit plan to the audit committee. The CFO interrupts: 'IS audit should report to me — I manage the budget for the function. Reporting to the audit committee creates inefficiency.' He proposes a motion to restructure reporting. Two committee members seem uncertain. Janet asks for the floor. The CFO adds: 'The audit plan includes a review of financial system access controls — that's directly under my oversight. This creates a conflict-of-interest in the other direction.' Janet sets down her notes.

Audit Committee Oversight
3-level hierarchy = IS audit independence. IS Audit → CAE → Audit Committee (not management). Independence preserved by reporting above the auditee.
How it works

The audit committee is responsible for oversight of the IS audit function and for direct interaction with the Chief Audit Executive (CAE). This governance structure preserves IS audit independence: because the IS audit function evaluates management's controls and operations, it must have an oversight body that is independent of management itself. The audit committee — composed of independent board members — provides that independence, receiving audit findings objectively and holding management accountable for remediation. The audit committee approves the IS audit charter, reviews and approves the annual audit plan, and receives significant or high-severity findings directly. If an audit committee does not exist in the organization, a designated group or individual — independent of management — assumes the oversight responsibilities that the audit committee would otherwise fulfill.

🧠 Mnemonic
Audit Committee Oversight = Independence Preserved
IS audit reports to the audit committee (not management) because management is the auditee. Audit committee oversight = structural independence. No audit committee = a designated independent body must substitute.
At a glance
🏛️

Audit Committee Role

What is the audit committee responsible for?

  • Oversight of IS audit function
  • Direct interaction with Chief Audit Executive
  • Approve audit charter
  • Review annual audit plan and significant findings
⚖️

Why Not Management

Why must IS audit not report to operational management?

  • Management is subject to audit
  • Management could suppress unfavorable findings
  • Independence requires oversight above management
  • CFO/CIO oversight = compromise of independence
🔄

No Audit Committee Scenario

What happens if no audit committee exists?

  • A designated group or individual assumes oversight
  • Must be independent of management
  • Same responsibilities as audit committee
  • Board may directly assume the oversight role
📄

What IS Audit Reports Upward

What does IS audit communicate to the audit committee?

  • Significant and high-severity findings
  • Annual audit plan for approval
  • Charter amendments
  • Status of corrective actions on prior findings
Try yourself

Janet Holloway presents Meridian Corp's IS audit plan to the audit committee. A new board member asks: 'Why does IS audit report to the audit committee rather than directly to the CFO?' What is the audit committee's oversight role, and why is this structure important?

— Pause to recall —
The audit committee is responsible for oversight of the IS audit function and interaction with the Chief Audit Executive (CAE). Reporting to the audit committee (rather than to management) preserves IS audit independence — management is often the subject of audits, so audit must have an independent oversight body.

The audit committee is responsible for oversight of the IS audit function and for direct interaction with the Chief Audit Executive (CAE). This structure is essential to IS audit independence: if the IS audit function reported directly to operational management (such as the CFO or CIO), management could suppress or influence audit findings about its own operations. The audit committee — composed of independent board members — provides an oversight body that can receive audit findings objectively and hold management accountable for corrective actions. If an audit committee does not exist, a designated group or individual must assume these oversight responsibilities. The audit committee also approves the audit charter, reviews the annual audit plan, and receives significant audit findings directly.

Why this matters: The exam tests that the audit committee — not operational management — is the IS audit function's primary oversight body. Reporting to the CFO or CIO instead of the audit committee compromises independence. If no audit committee exists, a designated body must fulfill the same role.
🎯
Exam tip

IS audit must report to the audit committee — not to the CFO, CIO, or CEO. If an exam scenario shows IS audit reporting through operational management, that is an independence impairment. When no audit committee exists, a designated independent body must fulfill the same role — the oversight function cannot be vacant.

See also: 1.10 1.1.5 2.2.3
Section 1.10.2 Good-to-know

Audit Quality Assurance

By the end of this card, you should be able to
Explain who is responsible for IS audit quality assurance and what mechanisms ensure that documented audit procedures are followed.
Scenario

After completing the Meridian Corp access review, a quality assurance review of Alex Chen's work papers reveals that two procedures in the audit program — 'Verify privileged account recertification was completed' and 'Confirm terminated account deprovisioning logs' — have no evidence and no documented reason for being skipped. Alex explains: 'Those steps were informal; I covered the ground differently during fieldwork.' The QA reviewer marks both as blank procedures and flags the entire working paper set. Priya Rao gets the flag before the report is signed. She calls Alex in. The report is due to the audit committee in forty-eight hours.

Audit Quality Assurance
3 accountability levels = IS audit QA. Leadership accountable, project lead enforces, team executes. Undocumented skipped step at any level = QA finding.
How it works

The quality of individual IS audit engagements is the responsibility of audit leadership and the assigned project leads, who must ensure that documented audit procedures are followed throughout each engagement. Quality assurance mechanisms for IS audit include peer review and supervisory sign-off on work papers against the audit program, compliance checks verifying that documented standards were applied, and periodic internal or external QA assessments of audit quality across multiple engagements. When an audit procedure is not performed, it must be either completed, formally documented as not applicable with a justification, or carried forward as a scope limitation — an undocumented skipped step is itself a quality failure. Documented audit procedures may come in various forms: audit manuals, program templates, wikis, or sampling guides. All of these are subject to the same adherence requirement.

🧠 Mnemonic
QA = Leadership accountable, Project lead enforces, Team executes
Three levels of IS audit QA accountability. Leadership sets the quality standard. Project lead enforces compliance with procedures. Team executes. Gap in any level = QA finding.
At a glance
🏛️

Quality Accountability

Who is responsible for IS audit quality?

  • Audit leadership and assigned project leads
  • Not individual auditors alone
  • Leadership sets quality standards
  • Project lead enforces compliance for each engagement

QA Mechanisms

What mechanisms enforce IS audit quality?

  • Peer review of work papers against audit program
  • Supervisory sign-off on completed procedures
  • Compliance checks against documented standards
  • Periodic internal or external QA assessments
📋

Handling Skipped Steps

What happens when an audit procedure is not executed?

  • Must be completed, or
  • Documented as not applicable with justification, or
  • Carried forward as a formal scope limitation
  • Blank/undocumented skip = QA finding
📁

Sources of Documented Procedures

What counts as documented audit procedures?

  • Audit manuals
  • Program templates and checklists
  • Wikis and knowledge bases
  • Sampling guides — all subject to adherence
Try yourself

After completing the Meridian Corp access review, a quality assurance review of Alex Chen's work papers reveals that two procedures in the audit program were not executed and not documented as skipped. Who is responsible for this gap, and what should a QA process include?

— Pause to recall —
Quality responsibility rests with audit leadership and the assigned project lead — they must ensure documented audit procedures are followed. QA processes include work paper review, compliance checks against audit procedures, and confirmation that documented steps were either executed or explicitly acknowledged as not applicable.

The quality of individual IS audit engagements is the responsibility of audit leadership and the assigned project leads. These individuals are responsible for ensuring that documented audit procedures — from the audit manual, program, or wiki — are followed for each engagement. A quality assurance program for IS audit may include: peer review of work papers against the audit program; supervisory sign-off on completed procedures; compliance checks verifying that documented standards were applied; and periodic internal or external QA assessments. When procedures are not executed, they must be either completed or formally documented as not applicable with a justification. A gap between the audit program and the work papers — undocumented skipped steps — is itself a QA finding.

Why this matters: The exam tests that IS audit QA is the responsibility of audit leadership, not just individual auditors. A culture of QA means that work papers must match audit programs, deviations must be documented, and the project lead is accountable for reviewing before the report is issued.
🎯
Exam tip

IS audit QA accountability rests with audit leadership and project leads — not just the individual auditor. An undocumented skipped procedure is itself a QA finding. The exam may ask what the project lead should do when a work paper step is missing: the answer is require completion, documentation, or formal deferral with justification.

See also: 1.10 1.5.3 1.5.4
Section 1.10.3 Good-to-know

Audit Team Training and Development

By the end of this card, you should be able to
Explain the requirements for IS audit team training and development and identify what a formal development plan must include.
Scenario

Meridian Corp's IS audit team has no formal training plan. Alex Chen requests approval to attend a CISA review course. Janet Holloway approves it informally. Two weeks later, the annual QA review finds that team members have attended training based entirely on personal interest and availability — no role alignment, no documented budget, no plan. The reviewer asks Janet: 'How do you know your team has the competency required for the audit areas in your plan?' Janet doesn't have a documented answer. The QA reviewer marks a finding. Janet calls the team together.

Audit Team Training and Development
3 requirements = complete training program. Formal plan (for all members), Role-specific content, Leadership budget. Self-selection without structure is insufficient.
How it works

A formal development plan must be established for every member of the IS audit function. This plan must identify applicable training programs and professional certifications relevant to each team member's specific role within IS audit — a junior auditor's plan will differ from that of a data analytics specialist or audit manager. IS audit leadership holds responsibility for ensuring that a training budget is created and maintained to fund the planned development activities. Professional certification requirements — such as the continuing professional education (CPE) hours required to maintain the CISA designation — represent a minimum standard that the development plan must meet and exceed. Relying on team members to self-select training without a formal plan and budget creates competency gaps that affect audit quality and create professional compliance risk for individual credential holders.

🧠 Mnemonic
Plan + Role + Budget = Formal Training Program
Three required elements: a formal written Plan for all members, Role-specific training and certifications, and a Leadership-approved Budget. All three together — not just CPE minimums.
At a glance
📋

Formal Development Plan

What does the training requirement apply to?

  • All members of the IS audit function
  • Not just new hires or junior staff
  • Must be written and formal
  • Reviewed and updated regularly
🎯

Role-Specific Content

What must the development plan include?

  • Training programs applicable to each role
  • Professional certifications by role (e.g., CISA)
  • Competencies for planned audit engagements
  • Exceeds minimum CPE requirements
💰

Leadership Budget Obligation

What is audit leadership's training obligation?

  • Create and maintain training budget
  • Ensure budget supports development plan needs
  • Cannot rely on self-funded team development
  • Budget supports both training and certification
📏

Minimum Standard

What is the minimum training standard for IS auditors?

  • CPE hours required by professional certifications
  • CISA holders: ISACA CPE requirements
  • Formal plan must go beyond minimums
  • Certification maintenance is the floor, not the ceiling
Try yourself

Meridian Corp's IS audit team has no formal training plan. A QA review flags the absence. What are the three required elements of a formal IS audit training program, and why does the absence of a training structure itself constitute an internal audit finding?

— Pause to recall —
Three required elements: (1) a formal training plan tied to individual roles and audit requirements, (2) role-appropriate training assigned to each team member, (3) budget allocated to fund the training. The absence of a training structure is itself an audit finding because ISACA Standards require that IS audit functions maintain the competency of their staff — an informal, self-directed approach is not compliant with that requirement.

A formal development plan must be established for all members of the IS audit function — not just for new hires or senior staff. The plan must include applicable training programs and certifications that are specific to the role each team member holds within IS audit. For example, a junior IS auditor's development plan would differ from that of a senior specialist or audit manager. IS audit leadership is responsible for ensuring that a training budget is created and maintained to fund the development activities in the plan. Continuing professional education (CPE) hours required by professional certifications (such as CISA) are a minimum standard, but the development plan should go beyond just CPE compliance to address the specific competencies needed for the IS audit function's planned engagements.

Why this matters: The exam tests that training is a formal, leadership-funded obligation — not an optional self-directed activity. A development plan that covers all team members by role, and is backed by budget, is the required structure. Individual self-selection without a formal plan is insufficient.
🎯
Exam tip

The exam tests that training is a formal, budgeted, leadership-owned obligation — not individual self-direction. The required elements: formal plan for all team members, role-specific training and certifications, and a funded budget. A team that only tracks CPE hours has a minimum, not a complete training program.

See also: 1.10 1.10.2 1.1.3
Section 1.10.4 Memorize

Monitoring

By the end of this card, you should be able to
Explain the role of monitoring in maintaining IS audit function compliance and identify the key monitoring initiatives an IS audit function should maintain.
Scenario

Janet Holloway is reviewing the IS audit function's annual self-assessment at Meridian Corp. Three items catch her eye: the audit plan hasn't been updated to reflect Meridian's cloud migration (completed eight months ago), the regulatory compliance tracking sheet hasn't been updated since the GLBA guidance was revised, and two team members' professional development hours fall below the CPE requirements for CISA maintenance. The audit committee meeting is in two weeks. Janet needs to present the self-assessment results. Each of the three items falls under a different monitoring category — and she needs to know which one she can defer and which ones need immediate action before the presentation.

Monitoring
4 monitoring areas: QA, Regulatory, Performance, Risk Alignment. IS audit governs itself as rigorously as others.
How it works

Monitoring within the IS audit function refers to ongoing oversight of the audit function's own compliance, performance, and governance — not oversight of the systems it audits. The IS audit function must maintain monitoring initiatives across several dimensions. Audit QA monitoring tracks whether documented audit procedures are being followed consistently and whether audit work meets professional standards. Regulatory and compliance monitoring ensures that changes in laws, standards, and ISACA professional requirements are identified and incorporated into IS audit practice. IS audit program performance monitoring measures whether the audit function is achieving its planned objectives: coverage targets, finding closure rates, and report timeliness. Governance risk program monitoring confirms that the IS audit function's risk-based plan remains aligned with the organization's evolving risk profile. These monitoring activities ensure that the IS audit function governs itself as rigorously as it governs others.

🧠 Mnemonic
ARIG
Audit QA monitoring → Regulatory compliance monitoring → IS audit program performance monitoring → Governance risk alignment monitoring — ARIG: four dimensions of IS audit function self-monitoring.
At a glance

Audit QA Monitoring

What does audit QA monitoring track for the IS audit function?

  • Documented procedure compliance
  • Work paper quality and completeness
  • Supervisory sign-off adherence
  • QA findings and remediation
📋

Regulatory Monitoring

What regulatory changes must IS audit monitor?

  • New laws and regulations applicable to audit
  • ISACA standard and guidance updates
  • Changes in professional certification requirements
  • Industry-specific regulatory developments
📊

Program Performance Monitoring

How does IS audit monitor its own performance?

  • Coverage targets achieved?
  • Report timeliness — days from fieldwork to issuance
  • Finding closure rates from prior audits
  • Resource utilization vs. plan
🎯

Governance Risk Alignment

What does governance risk monitoring ensure?

  • Audit plan reflects current organizational risk profile
  • High-risk areas receive adequate coverage
  • Plan adjusts to new and emerging risks
  • Audit objectives remain aligned with enterprise strategy
Try yourself

Janet Holloway asks Alex Chen to explain what 'monitoring' means for the IS audit function itself — not for the systems it audits. What should the IS audit function monitor to ensure it remains compliant and effective?

— Pause to recall —
The IS audit function must monitor: audit QA results (procedure compliance and quality), applicable regulatory requirements, IS audit program performance (coverage, findings trends, timeliness), and governance risk program alignment. Monitoring ensures the audit function itself remains compliant and continues to add value.

Monitoring for compliance with applicable requirements is a critical element for the IS audit function's own governance and continuity. The IS audit function must monitor itself across several dimensions. Audit QA monitoring reviews the results of quality assurance procedures — are documented audit procedures being followed consistently? Regulatory compliance monitoring tracks changes in laws, standards, and regulations applicable to IS audit practice and the organization. IS audit program performance monitoring assesses whether the audit function is meeting its planned objectives — coverage targets, finding closure rates, report timeliness. Governance risk program monitoring ensures that the IS audit function's risk-based plan remains aligned with the organization's evolving risk profile. Together, these monitoring activities ensure that the IS audit function continues to operate in accordance with professional standards and adds measurable value to the organization.

Why this matters: The exam tests that monitoring applies to the IS audit function itself — not just to the systems it audits. An IS audit function that does not monitor its own QA results, regulatory compliance, and program performance has governance gaps of its own.
🎯
Exam tip

The most testable point: monitoring applies to the IS audit function itself — its own procedures, compliance, and performance. An IS audit function without self-monitoring has governance gaps. QA monitoring and regulatory update monitoring are the two most commonly tested sub-areas.

📰Real World

After Arthur Andersen's role in the Enron collapse (2001), the Sarbanes-Oxley Act created the PCAOB specifically to perform external quality assurance over audit firms that, until then, had been policing themselves. The lesson embedded in every CISA QA question is this: auditors who only audit themselves eventually stop catching their own errors.

See also: 1.10 1.10.1 1.10.2
Use ← / → to navigate