SteadyCert
Domain 2 · Governance & Management of IT Card 1 / 55

CISA Domain 2: Governance & Management of IT — Free Visual Study Notes

Section 2.1 Must-know

Laws, Regulations and Industry

By the end of this card, you should be able to
Identify the types of laws, regulations, and industry standards that shape IT governance and explain the IS auditor's responsibility to stay current on applicable compliance requirements.
Scenario

Sarah Lin drops a printed regulatory summary on Alex Chen's desk before the quarterly governance review. Meridian has just expanded its mortgage-data service to EU retail clients, and three lines are highlighted in yellow: GDPR now applies. Alex scans the IT governance charter — last updated four years ago — and finds no mention of data-subject rights, cross-border transfer controls, or a designated privacy officer role. The charter was current when written. It is not current now. The compliance review meeting starts in ten minutes. Should Alex raise the charter gap as a finding, request a scope extension, or simply note it as a background observation?

Laws, Regulations and Industry
3 columns = 3 compliance pillars. An outdated charter cannot support any of them.
How it works

IT governance must account for the legal and regulatory environment in which an enterprise operates. Laws and regulations differ by country and industry, but three compliance categories are recognized globally: the protection of privacy and confidentiality of personal data, intellectual property rights, and the reliability of financial reporting. Because these requirements evolve continuously, the IS auditor must ensure the enterprise's governance framework is reviewed and updated regularly. Enterprises operating across multiple jurisdictions face layered obligations — a regulation enacted in one region may impose requirements on any organization that handles data related to individuals in that region, regardless of where the enterprise is headquartered. The IS auditor's role is to identify which rules apply, verify the enterprise is meeting them, and flag gaps when the governance framework has fallen out of date.

🧠 Mnemonic
P·I·F
Privacy, Intellectual property, Financial reliability — the three globally recognized IT compliance pillars every IS auditor must verify.
At a glance
🔒

Privacy & Confidentiality

How is personal data protected across its lifecycle?

  • Receipt and collection controls
  • Processing and storage requirements
  • Transmission restrictions
  • Destruction standards
©️

Intellectual Property

Are software and data assets properly licensed?

  • Software licensing compliance
  • Open-source usage controls
  • Data usage rights
  • Creative asset authorization
📊

Financial Reliability

Is financial information produced accurately and auditably?

  • Accurate financial reporting
  • Auditable IT controls (SOX)
  • Integrity of financial systems
  • Management sign-off requirements
📋

Auditor's Obligation

What must the IS auditor do continuously?

  • Track evolving regulations
  • Identify applicable rules by jurisdiction
  • Flag outdated governance frameworks
  • Document consciously accepted noncompliance risk
Try yourself

Meridian Corp operates in the US banking sector and processes customer data for EU clients. The IS auditor is scoping the compliance review. The team debates whether GDPR applies because Meridian is US-headquartered. What is the legal basis for including EU regulatory requirements in the scope, regardless of Meridian's headquarters location?

— Pause to recall —
The three globally recognized categories are: protection of privacy and confidentiality of personal data, intellectual property rights, and reliability of financial information. Meridian cannot ignore EU rules because regulations like GDPR apply to any enterprise handling EU individuals' data, regardless of where the company is headquartered.

IT governance must account for laws and regulations that vary by geography and industry but converge on three globally recognized compliance pillars:

  1. Privacy and confidentiality of personal data — protecting how data is received, processed, stored, transmitted, and destroyed
  2. Intellectual property rights — ensuring software, data, and creative assets are used with proper authorization
  3. Reliability of financial information — satisfying requirements around accurate, auditable reporting

Beyond these universal pillars, industry-specific rules (such as regulations on electronic communication in brokerage firms) add further obligations. The IS auditor must track which rules apply to the enterprise's specific geography and industry and flag when compliance posture is outdated.

Why this matters: The exam does not test memorization of specific statutes — it tests whether candidates understand the IS auditor's obligation to monitor regulatory evolution and the enterprise's option to consciously accept noncompliance risk and penalties.
🎯
Exam tip

The CISA exam does NOT test knowledge of specific statutes. It tests whether you recognize (a) the three globally recognized compliance pillars, (b) that regulations can apply to enterprises outside the jurisdiction of enactment, and (c) that an enterprise may consciously choose to accept noncompliance risk — but that decision must be documented and approved.

See also: 2.1.1 2.1.2 2.6
Section 2.1.1 Must-know

Impact of Laws, Regulations and Industry Standards on IS Audit

By the end of this card, you should be able to
Explain how specific laws and multi-jurisdictional regulations trigger IS audit obligations and describe the IS auditor's approach when an enterprise operates across legal boundaries.
Scenario

Janet Holloway chairs the audit planning session for Meridian's new EU mortgage-data service. She places two lists on the whiteboard: one column for US regulations, one for non-US. Maya Vargas adds GDPR to the non-US column and underlines it. Alex Chen raises a hand: 'We're a US bank — GDPR applies to us?' Maya turns from the board. 'The data belongs to EU residents. Headquarters location is irrelevant.' The engagement scope document is open in front of Alex. The current version covers only GLBA. Should Alex update it to add a GDPR compliance lane, defer that decision to legal counsel, or note it as a management risk outside audit scope?

Impact of Laws, Regulations and Industry Standards on IS Audit
2 banners = 2 regulation types. Universal rules follow the data, not the company's address.
How it works

Enterprises may be required to submit to audits that verify compliance with specific laws, regulations, or industry standards. These audit obligations arise from two distinct sources. Some regulations are universal in reach: they apply to any organization that handles covered data or activity, regardless of where the enterprise is incorporated or headquartered. GDPR is the most prominent example — it governs any enterprise processing personal data of individuals in the European Union. Other regulations are jurisdiction-specific, applying only within defined geographic or industry boundaries: GLBA applies to US financial services firms, HIPAA applies to US healthcare entities, SOX applies to US public companies. The IS auditor must determine which rules apply to the specific enterprise and engagement, map the compliance obligations, and test whether the enterprise meets them. Knowledge of the precise statutory text is not required; understanding of the category and jurisdictional reach is.

At a glance
🌐

Universal Reach Laws

Which laws follow the data, not the company's location?

  • GDPR (EU data subjects, global reach)
  • Cross-border transfer rules
  • Data-subject rights requirements
  • Privacy-by-design obligations
🇺🇸

US Jurisdiction Laws

Which US laws commonly trigger IS audits?

  • SOX (public company financial controls)
  • GLBA (financial institution data privacy)
  • HIPAA (healthcare data)
  • FISMA (federal information security)
🔍

IS Auditor's Approach

How does the IS auditor handle multi-jurisdictional scope?

  • Map all applicable laws by data type and geography
  • Engage legal/compliance early in planning
  • Document which rules were tested and which were scoped out
  • Do not assume home country rules are the only rules
Try yourself

Meridian Corp, a US bank, stores loan data for EU customers on AWS servers in Ireland. The audit committee asks whether the IS auditor must master every clause of GDPR to complete the engagement — or whether a different level of familiarity is sufficient. What level of regulatory knowledge does ISACA expect of the IS auditor in this context?

— Pause to recall —
GDPR governs the EU customer data because GDPR applies to any enterprise handling EU individuals' data regardless of where the enterprise is headquartered. The IS auditor does not need to memorize specific statute text — the CISA exam tests recognition of the category (data protection) and the cross-jurisdictional principle, not statutory detail.

Laws that trigger IS audit obligations fall into two categories. Universal regulations — such as GDPR — apply to any organization that processes data belonging to individuals in the covered jurisdiction, even if the enterprise is headquartered elsewhere. This means Meridian's US charter does not exempt it from GDPR for its EU customer data. Jurisdiction-specific regulations apply within defined geographic or industry boundaries: GLBA covers US financial institutions, HIPAA covers US healthcare entities, SOX covers US public companies, and so on. An IS auditor does not memorize statute text; the CISA exam tests whether the auditor can identify the applicable compliance category and recognize when a law extends beyond its home jurisdiction.

Why this matters: Multi-jurisdictional exposure is the most commonly tested IS audit complication. The correct approach is to identify which rules apply to the specific data type and geography — not to assume only the enterprise's home country rules matter.
🎯
Exam tip

The CISA exam will present a scenario with a multi-jurisdiction enterprise and ask which regulation applies. Always select the answer that reflects the regulation tied to the data subject's location or the data type — not just the enterprise's home country. GDPR is the canonical trap: US enterprises are not exempt if they handle EU individuals' data.

📰Real World

In 2020, Marriott received a £18.4 million fine from the UK Information Commissioner's Office following a breach that exposed records for approximately 339 million guests. Data had been compromised within Starwood Hotels' systems, which Marriott acquired in 2016 without performing adequate security due diligence. The ICO's July 2019 notice had signalled a proposed fine of £99.2 million; the final October 2020 figure reflected mitigating factors including Marriott's cooperation and the economic impact of COVID-19. The regulator's concern was not that Marriott engineered the attack — it was that compliance due diligence had not been performed on the inherited systems before or after the acquisition. Auditing against the applicable legal framework, from day one, is exactly the kind of Domain 2 discipline that might have changed that outcome.

See also: 2.1 2.1.2 2.6
Section 2.1.2 Must-know

Governance, Risk and Compliance

By the end of this card, you should be able to
Define the three components of GRC, explain why they are treated as an integrated discipline rather than separate silos, and identify the functional areas where GRC is most commonly applied.
Scenario

Marcus Webb calls the quarterly review to order. On one side of the table sits the risk committee with a red-flagged cloud migration risk. On the other side sits the compliance officer with a green GLBA status report. Neither team has shared data with the other. Alex Chen, reviewing both sets of documents, notices that the cloud migration risk — flagged by risk management — affects a GLBA-covered data transfer that compliance rated green. The gap exists only because the two functions did not speak. The data is in front of Alex before the exit meeting. What should Alex document as the root cause — a process failure, a structural design flaw, or a data-sharing gap?

Governance, Risk and Compliance
3 shields = 3 GRC disciplines. Disconnected, they protect nothing. Linked, they achieve Principled Performance.
How it works

Governance, Risk, and Compliance — collectively known as GRC — are three overlapping assurance disciplines that enterprises increasingly manage as a unified function. Governance encompasses the policies, processes, and decision-making structures that direct the enterprise. Risk management identifies, evaluates, and responds to threats that could prevent the enterprise from achieving its objectives. Compliance ensures that the enterprise meets the requirements imposed by laws, regulations, and internal policies. Because these three disciplines share data, affect each other's conclusions, and cover the same underlying activities, operating them in separate silos creates blind spots. The GRC model holds that integrated oversight — sharing data and conclusions across governance, risk, and compliance functions — produces more reliable outcomes than parallel but disconnected programs. In practice, GRC is most commonly implemented across financial, IT, and legal domains.

🧠 Mnemonic
G·R·C = Guard, Respond, Confirm
Guard the enterprise through governance, Respond to threats through risk management, Confirm requirements are met through compliance — all three must operate together.
At a glance
🏛️

Governance

What does governance manage?

  • Enterprise policies and standards
  • Decision-making structures
  • Direction-setting for business units
  • Board and executive accountability
⚠️

Risk Management

What does risk management do?

  • Identify vulnerabilities and threats
  • Assess likelihood and impact
  • Select risk treatment strategies
  • Monitor residual risk continuously

Compliance

What does compliance verify?

  • Adherence to external laws and regulations
  • Conformance with internal policies
  • Standards implementation (ISO, NIST, etc.)
  • Regulatory reporting obligations
🔗

Why Integrated?

Why must GRC operate as a single function?

  • Risk decisions affect compliance posture
  • Compliance requirements shape governance policies
  • Silos create overlapping blind spots
  • Principled Performance requires holistic view
Try yourself

Meridian Corp has a risk management committee, a legal compliance team, and a governance committee — each reporting separately to a different executive, with no shared reporting or shared data. Alex Chen reviews both sets of documents and finds a cloud migration risk flagged by risk management that affects a GLBA-covered transfer rated green by compliance. What is the root governance failure that allowed this gap to exist undetected?

— Pause to recall —
The three disciplines — Governance (managing policies and decisions), Risk Management (identifying and treating risk), and Compliance (adhering to laws and standards) — are being siloed. The design flaw is that GRC is intended to be an integrated, holistic function; isolated operation causes overlapping blind spots and gaps between the three disciplines.

GRC stands for Governance, Risk, and Compliance. Governance covers the management of enterprise policies, processes, and decisions. Risk management covers the identification, assessment, and treatment of potential threats to objectives. Compliance covers adherence to laws, regulations, standards, and internal policies. These three functions overlap significantly — a risk decision affects compliance posture; a policy (governance) shapes how risk is identified; a compliance requirement drives governance structure. When they operate in independent silos, each function makes decisions without full visibility into the others, creating gaps and duplicated effort. The GRC model — formalized by OCEG — captures this as an 'integrated collection of capabilities' aimed at achieving 'Principled Performance': reliably meeting objectives while addressing uncertainty with integrity. GRC is most commonly applied in financial, IT, and legal domains.

Why this matters: The exam tests whether candidates recognize that integrated GRC is not just a buzzword — it is a specific design principle that prevents assurance gaps. A siloed structure is an audit finding, not an organizational preference.
🎯
Exam tip

When the exam presents a GRC scenario, the correct answer almost always involves integration. If one of the three functions (governance, risk, or compliance) is operating without input from the other two, that is a control gap. The CISA exam also distinguishes GRC from internal audit — internal audit is an independent assurance function, not a GRC component.

See also: 2.1 2.5 2.2
Section 2.2 Must-know

Organizational Structure, IT

By the end of this card, you should be able to
Explain what corporate IT governance is, identify who is accountable for it, and describe the role of a governance framework in building trust, transparency, and accountability.
Scenario

Sarah Lin presents Meridian's cloud roadmap to the board for the first time in two years. Marcus Webb asks for the IT governance charter. Sarah hands over a document with a revision date of four years ago — before the AWS migration began. Janet Holloway, seated at the far end of the table, notes that the charter does not address cloud ownership, vendor risk, or data residency. The board had delegated governance to Sarah and stopped reviewing it. Alex Chen, observing from the gallery, weighs two possible findings: (a) IT governance not updated to reflect strategy, or (b) board oversight of IT governance absent. Both may be true — but which one is the root cause finding?

Organizational Structure, IT
3-tier dais = 3 governance levels. Accountability sits at the top — it cannot be delegated away from the board.
How it works

Corporate governance is the framework of relationships, structures, and processes by which an enterprise is directed and controlled. It encompasses a company's management, board of directors, shareholders, and other stakeholders. IT governance is the application of governance principles specifically to the IT function — ensuring that IT leadership, structures, and processes keep IT aligned with the enterprise's strategic objectives. The board of directors holds ultimate accountability for governance, including IT governance. Senior management is responsible for implementing the structures the board defines. A corporate governance framework establishes how enterprise objectives are set, how they will be achieved, and how performance will be monitored. Well-functioning frameworks produce trust, transparency, and accountability. When the framework is outdated or the board disengages from review, governance effectiveness erodes regardless of how capable individual managers are.

🧠 Mnemonic
B·S·E
Board sets direction, Senior management Structures the implementation, Execution happens in IT operations — accountability flows upward, not downward.
At a glance
👑

Board of Directors

What is the board's governance role?

  • Ultimate accountability for governance
  • Approves governance framework
  • Oversees management performance
  • Signs off on risk appetite
🏢

Senior Management

What does management implement?

  • IT governance structures and processes
  • Internal controls aligned to board direction
  • IT strategy execution
  • Performance reporting to the board
💻

IT Organization

What does the IT function execute?

  • IT operations within governance framework
  • Performance measurement and reporting
  • Compliance with IT standards
  • Risk identification and escalation
⚖️

Framework Goals

What does a governance framework produce?

  • Trust among stakeholders
  • Transparency in decision-making
  • Accountability across all levels
  • Aligned IT and business strategy
Try yourself

Meridian's board has delegated all IT decisions to the CIO, Sarah Lin, and has not reviewed the IT governance framework in three years. The framework no longer reflects the enterprise's cloud-first strategy or current regulatory requirements. When the IS auditor asks who is ultimately responsible for the IT governance framework, the CIO points to herself. Why is this answer incorrect?

— Pause to recall —
The board of directors is ultimately responsible for governance of the enterprise, including IT governance. Delegating all IT decisions to the CIO without board-level oversight or periodic framework review is an accountability gap — governance cannot be fully delegated away from the board.

Corporate governance is the system by which enterprises are directed and controlled. IT governance is a subset of corporate governance: it consists of the leadership, organizational structures, and processes that ensure the enterprise sustains and extends its strategies and objectives through IT. The board of directors is responsible for overall governance; senior management implements the structures and controls the board sets. A corporate governance framework defines how the company's objectives are set, how they are pursued, and how performance is monitored. Three outcomes the framework targets are trust, transparency, and accountability — all of which suffer when the framework is stale. When the board has not reviewed the IT governance framework in years, it is not meeting its stewardship obligation, regardless of how capable the CIO is.

Why this matters: The exam consistently tests who owns governance accountability. The answer is always the board of directors — not the CIO, not the audit committee, and not senior management. Senior management implements; the board is responsible.
🎯
Exam tip

The most common trap in governance questions is assigning accountability to the wrong role. The board of directors owns governance — they cannot fully delegate it. The CIO owns IT management. The audit committee monitors; it does not govern. When the exam asks 'who is responsible for IT governance?', the answer is the board, not the CIO.

See also: 2.2.1 2.2.9 2.2.3
Section 2.2.1 Must-know

Enterprise Governance of Information and Technology

By the end of this card, you should be able to
Define EGIT, state who is responsible for it, and identify the three core EGIT management processes and the COBIT distinction between governance and management.
Scenario

Sarah Lin walks Alex Chen through Meridian's EGIT dashboard during the annual governance review. Three panels glow on the conference room screen: an asset inventory feed from the AWS environment, a KPI scorecard, and a regulatory compliance calendar. Sarah points to each: 'Resource management, performance, compliance — all covered.' Alex nods, then asks to see who approved the EGIT framework itself. Sarah hesitates — the framework was built by her team and never formally reviewed by the board. Alex has the performance dashboard, compliance calendar, and asset register in front of him. Before writing the finding, he needs to decide: is the critical gap a missing management process, or something above management altogether?

Enterprise Governance of Information and Technology
3 stone tablets = 3 EGIT management processes. The board on the balcony governs; the CIO below manages.
How it works

Enterprise Governance of Information and Technology (EGIT) is the system through which all stakeholders — including the board, senior management, internal departments, and external parties — provide input into IT decision-making. EGIT is the responsibility of the board of directors and executive management; it is about stewardship of IT resources on behalf of everyone who depends on them. The purpose of EGIT is to ensure that IT supports enterprise objectives, delivers promised benefits, uses resources responsibly, and manages risk appropriately. Three core management processes support EGIT: IT Resource Management (maintaining an up-to-date inventory of IT assets and addressing risk); Performance Measurement (tracking whether IT resources deliver expected business value); and Compliance Management (ensuring legal, regulatory, and contractual requirements are met). COBIT, the most widely used EGIT framework, distinguishes governance (evaluate, direct, monitor) from management (plan, build, run, monitor) — governance is a board function; management is an operational function.

🧠 Mnemonic
R·P·C
Resource management, Performance measurement, Compliance management — the three operational pillars that the EGIT framework must run simultaneously.
At a glance
🗄️

IT Resource Management

What does resource management track?

  • Up-to-date IT asset inventory
  • Risk associated with each resource
  • Resource allocation alignment with strategy
  • Disposition and lifecycle management
📈

Performance Measurement

How is IT performance evaluated?

  • KPIs aligned to value delivery
  • Early deviation detection
  • Benchmarking against targets
  • Reporting to board and executives
⚖️

Compliance Management

What compliance obligations does EGIT address?

  • Legal and regulatory requirements
  • Internal policy conformance
  • Contractual obligations
  • Privacy and data protection standards
🏛️

Governance vs. Management (COBIT)

How does COBIT separate governance from management?

  • Governance = Evaluate, Direct, Monitor (board)
  • Management = Plan, Build, Run, Monitor (operations)
  • Board cannot delegate governance accountability
  • CIO operates within governance framework set by board
Try yourself

Meridian's EGIT framework has a performance dashboard, a compliance calendar, and an IT asset register. Sarah Lin claims these three tools cover all EGIT management processes. Alex Chen verifies that the framework was never formally reviewed or approved by the board. Which single gap is most critical — a missing management process or a missing governance layer?

— Pause to recall —
The three core EGIT management processes are IT Resource Management, Performance Measurement, and Compliance Management. All three are present. However, the IS auditor should also verify that the COBIT distinction between governance (board/executive) and management (operational) is preserved — EGIT is the board's responsibility, not the CIO's alone.

Enterprise Governance of Information and Technology (EGIT) is the board-level stewardship of IT resources on behalf of all stakeholders. It ensures that IT aligns with enterprise objectives and realizes promised benefits, that IT enables new opportunities, that IT resources are used responsibly, and that IT-related risk is managed appropriately. The three core EGIT management processes are:

  1. IT Resource Management — maintaining an updated inventory of all IT resources and managing associated risk
  2. Performance Measurement — ensuring IT resources perform as expected to deliver business value, using indicators optimized for value delivery
  3. Compliance Management — implementing processes that address legal, regulatory, policy, and contractual compliance requirements

COBIT makes a clear distinction between governance (evaluate, direct, monitor — a board/executive function) and management (plan, build, run, monitor — an operational function). The IS auditor verifies both layers.

Why this matters: EGIT and COBIT's governance-vs-management distinction is high-frequency exam content. The board governs; management executes. Conflating the two is a common exam trap.
🎯
Exam tip

The exam frequently tests the COBIT governance-vs-management split. Governance belongs to the board and executive leadership; management belongs to operational functions. When a question asks who is 'responsible' for EGIT, the answer is the board of directors and executive management — not the IT department. The CIO implements EGIT; the board is accountable for it.

See also: 2.2 2.2.2 2.2.9
Section 2.2.2 Must-know

Good Practices for EGIT

By the end of this card, you should be able to
Identify the key drivers that have made EGIT significant and explain the three evaluation dimensions — conformance, system of internal controls, and compliance with external requirements — that governance monitoring addresses.
Scenario

Janet Holloway opens the board's annual EGIT review with three questions written on the whiteboard: 'Are we performing as governed? Are our controls working? Are we meeting external obligations?' Priya Rao presents the internal audit findings: performance against the IT plan — mostly green; control effectiveness — two gaps in vendor access management; external compliance — a PCI-DSS self-assessment overdue. Janet has identified two dimensions — external compliance is overdue and performance data exists. Marcus Webb asks whether the framework is doing everything it should. The third dimension — internal controls evaluation — has not come up yet. Janet pauses. Should she mark this as a full EGIT gap or only a monitoring gap?

Good Practices for EGIT
3 panel boards = 3 governance monitoring dimensions. All three must be open and reviewed before the session closes.
How it works

An IT governance system exists to satisfy stakeholder needs and generate value from IT investments — balancing benefits, risk, and resources. EGIT has become a board-level priority because of several converging pressures: shareholders and boards demanding measurable IT returns, concerns about escalating IT expenditures, regulatory requirements for IT controls in areas such as financial reporting and data privacy, the complexity of managing cloud and outsourced services, and growing acceptance of frameworks like COBIT as benchmarks for comparing governance maturity. Good EGIT practice requires that governance processes continuously evaluate, direct, and monitor three dimensions. Conformance and Performance assesses whether the enterprise is meeting its own governance targets. The System of Internal Controls examines whether controls are well-designed and functioning. Compliance with External Requirements verifies adherence to laws, regulations, and contractual obligations. An effective governance framework integrates all three dimensions into a single end-to-end process.

🧠 Mnemonic
C·I·E
Conformance, Internal controls, External compliance — the three things every EGIT monitoring cycle must evaluate, direct, and report.
At a glance
📊

Conformance & Performance

Is the enterprise performing as governed?

  • IT strategy execution tracking
  • KPI attainment vs. targets
  • Board direction vs. actual outcomes
  • Governance framework self-assessment
🔒

Internal Controls

Are controls well-designed and operating?

  • Control design adequacy
  • Operating effectiveness testing
  • Remediation of control gaps
  • Management attestation
⚖️

External Compliance

Are external obligations being met?

  • Regulatory compliance status
  • Contractual obligation tracking
  • Audit findings from external regulators
  • Industry standard adherence (PCI, ISO)
🚀

EGIT Adoption Drivers

Why did EGIT become a priority?

  • Board demand for IT ROI
  • Rising IT expenditure concerns
  • Regulatory pressure (SOX, GDPR, Basel)
  • Cloud outsourcing complexity
  • COBIT and framework maturity
Try yourself

Meridian's board adopted a new EGIT framework two years ago in response to pressure from regulators and shareholders. The IS auditor's ongoing monitoring review shows the framework evaluates IT performance and regulatory compliance but has never been used to evaluate the effectiveness of internal controls. Which of the three EGIT governance monitoring dimensions is missing from the review cycle?

— Pause to recall —
The three evaluation dimensions are: Conformance and Performance, System of Internal Controls, and Compliance with External Requirements. Rising IT expenditure concerns reflect the driver of boards demanding better returns from IT investments.

Good EGIT practice requires that the governance system continuously evaluate, direct, and monitor three dimensions:

  1. Conformance and Performance — whether the enterprise is performing as expected and conforming to its own governance framework
  2. System of Internal Controls — whether controls are well-designed and operating effectively
  3. Compliance with External Requirements — whether legal, regulatory, and contractual obligations are being met

These three dimensions are the output of an integrated governance process, not separate checks. EGIT became strategically significant because of several converging drivers: boards demanding better IT ROI, concern over rising IT expenditure, regulatory requirements for IT controls (SOX, GDPR, Basel), the complexity of managing outsourced and cloud services, and growing acceptance of frameworks like COBIT as benchmarking tools.

Why this matters: The exam tests whether candidates can name both the EGIT adoption drivers and the monitoring dimensions. Questions often present a governance review scenario and ask which dimension was not evaluated.
🎯
Exam tip

Questions about EGIT monitoring will present a governance review scenario and ask which of three dimensions was omitted. Know all three: Conformance/Performance, System of Internal Controls, and External Compliance. A common distractor adds 'financial reporting accuracy' as a fourth dimension — it is not; it falls under external compliance.

See also: 2.2.1 2.2.3 2.10
Section 2.2.3 Must-know

Audit's Role in EGIT

By the end of this card, you should be able to
Explain how internal audit contributes to EGIT implementation, describe the three-lines-of-defense model, and identify the prerequisites for audit to conduct an EGIT engagement.
Scenario

Priya Rao assigns Alex Chen to review Meridian's EGIT implementation — an engagement that will require access to the treasury division, the AWS cloud team, and the vendor management office. Before Alex can begin, Priya places two documents face-down on the desk. 'Without these, we are guests in those rooms, not auditors,' she says. 'Do you know what they are?' Alex needs to name both documents and explain what each one authorizes before turning them over.

Audit's Role in EGIT
3 fortress tiers = 3 lines of defense. Audit at the third tier holds its authority in two scrolls — without them, no engagement begins.
How it works

Internal audit plays a distinct and irreplaceable role in Enterprise Governance of Information and Technology. The three-lines-of-defense model identifies three layers of accountability: the first line (business operations) owns and executes controls; the second line (risk management and compliance functions) monitors those controls and advises management; the third line (internal audit) provides independent assurance to the board and audit committee. Only audit operates independently of management — that independence is what makes its assurance credible. Audit's EGIT role includes monitoring compliance with governance initiatives, providing leading-practice recommendations to senior management, and giving the board an objective view of governance effectiveness. Because EGIT reviews may cross divisional and departmental boundaries, two foundational documents must be in place before any engagement begins: an audit charter approved by the audit committee granting authority to move freely within the enterprise, and specific terms of reference defining the engagement's scope, objectives, and authority.

🧠 Mnemonic
Own → Monitor → Assure
First line Owns controls, Second line Monitors them, Third line (Audit) provides independent Assurance — each layer is distinct and cannot substitute for the others.
At a glance
🔧

First Line of Defense

Who owns controls?

  • Business unit managers
  • IT operations staff
  • Process owners
  • Front-line employees executing procedures
👁️

Second Line of Defense

Who monitors controls?

  • Risk management function
  • Compliance function
  • Information security team
  • Legal and regulatory affairs
⚖️

Third Line of Defense

Who provides independent assurance?

  • Internal audit (reports to audit committee)
  • Independent of management
  • Cross-divisional authority via audit charter
  • Reports to board, not to CIO or CFO
📜

EGIT Engagement Prerequisites

What must exist before an EGIT audit begins?

  • Audit charter approved by audit committee
  • Cross-enterprise access authority granted
  • Terms of reference for the specific engagement
  • Defined scope, objectives, and functional areas
Try yourself

Meridian's CIO argues that internal audit should not review EGIT because the risk and compliance team already monitors IT controls. Alex Chen is about to enter the CIO's division for an EGIT engagement. Priya has placed two documents on the desk and said 'without these, we are guests, not auditors.' What are the two documents, and what does each one authorize?

— Pause to recall —
Audit occupies the third line of defense — it provides independent assurance, not operational monitoring like the second line. Two prerequisites for an EGIT engagement are: (1) an audit charter approved by the audit committee that grants authority to move freely across the enterprise, and (2) defined terms of reference specifying scope, objectives, and authority for the specific engagement.

The three-lines-of-defense model clarifies accountability: the first line is business operations, which owns and executes controls; the second line is risk management and compliance, which monitors those controls and advises management; the third line is internal audit, which provides independent assurance to the board and audit committee. These lines are distinct — the second line cannot replace the third line because it is not independent of management. Audit's role in EGIT is to monitor compliance with EGIT initiatives, provide leading-practice recommendations to senior management, and give the board an independent view of governance quality. Because EGIT audits can cross divisional and departmental boundaries, two documents must be in place: an audit charter approved by the audit committee that grants authority to operate across the enterprise, and specific terms of reference for each engagement that state scope, objectives, functional areas, and the audit's authority.

Why this matters: The exam tests whether candidates can distinguish the three lines of defense and identify audit's unique independence requirement. The audit charter and terms of reference are prerequisite documents — without them, the EGIT engagement has no authorized scope.
🎯
Exam tip

The CISA exam will present a scenario where management tries to substitute the compliance function (second line) for internal audit (third line). The correct answer identifies that only internal audit is independent of management. Also know: the audit charter comes from the audit committee, not from the CIO or CFO.

See also: 2.2.1 2.2.9 1.1.1
Section 2.2.4 Must-know

Information Security Governance

By the end of this card, you should be able to
Define information security governance, identify the five elements of an information security governance framework, and explain how the CISO role relates to each element.
Scenario

Devon Park walks into Janet Holloway's office with a printed architecture diagram. Meridian's AWS environment has expanded by 60 percent since the CISO vacancy began eight months ago, but the security policy still references only on-premises systems. Devon points to three gaps on the diagram: no policy coverage for cloud workloads, no monitoring integration for AWS CloudTrail events, and no clear ownership of the cloud security team. Janet has identified three gaps on the diagram. Before she circles them, she asks Devon: 'If you had to prioritize — no policy, no monitoring, or no ownership — which governance element failure has the highest immediate risk?' Devon needs to answer before she marks the finding.

Information Security Governance
5 pillars = 5 governance framework elements. One cracked pillar compromises the entire structure.
How it works

Information security governance is a component of corporate governance that sets strategic direction for an enterprise's security activities. Its purpose is to ensure that security strategies support business objectives, comply with laws and regulations, and assign clear responsibility for managing security risk. A complete information security governance framework has five elements: a comprehensive security strategy intrinsically tied to business objectives; governing security policies that address every dimension of strategy, controls, and regulation; a set of standards for each policy that ensures procedures and guidelines meet policy requirements; an effective security organizational structure without conflicts of interest; and institutionalized monitoring processes that verify compliance and feed effectiveness data back into the framework. These five elements together form a cost-effective information security program. When any element is absent — especially executive security leadership — the remaining elements lose coherence and the framework degrades over time.

🧠 Mnemonic
S·P·S·O·M
Strategy, Policies, Standards, Organization, Monitoring — the five elements of an information security governance framework, from direction to oversight.
At a glance
🎯

Security Strategy

What does the strategy link?

  • Business objectives and security goals
  • Risk appetite and control investment
  • Long-term security direction
  • Executive security sponsorship
📜

Security Policies

What do governing policies address?

  • All aspects of security strategy
  • Control requirements
  • Regulatory obligations
  • Behavioral expectations for all staff
📐

Standards

What do standards define?

  • Technical and procedural baselines
  • Compliance criteria for each policy
  • Minimum acceptable configurations
  • Boundaries for procedures and guidelines
🏗️

Organizational Structure

What makes the security org structure effective?

  • No conflicts of interest in security roles
  • CISO with executive authority
  • Clear ownership of each security domain
  • Separation of duties across sensitive functions
📡

Monitoring

What do institutionalized monitoring processes provide?

  • Continuous compliance monitoring
  • Effectiveness feedback loops to governance
  • Detection of deviations from policy and standards
  • Input for framework improvement and strategy refresh
Try yourself

Meridian's CISO role has been vacant for eight months. During that time, security policies have not been reviewed, the security organizational structure has not been updated for the AWS environment, and monitoring is ad hoc. As the IS auditor, which of the five information security governance framework elements are most clearly compromised?

— Pause to recall —
At minimum: Governing Security Policies (unreviewed), Effective Security Organizational Structure (not updated for AWS), and Institutionalized Monitoring Processes (ad hoc). All five elements depend on executive security leadership to function as a coherent framework.

Information security governance is a subset of corporate governance that provides strategic direction for security activities and ensures objectives are met, security risk is managed, and information resources are used responsibly. A well-functioning information security governance framework has five elements:

  1. A comprehensive security strategy linked to business objectives
  2. Governing security policies that address all aspects of strategy, controls, and regulation
  3. A complete set of standards for each policy, ensuring procedures comply with policy
  4. An effective security organizational structure free of conflicts of interest
  5. Institutionalized monitoring processes that verify compliance and provide effectiveness feedback

All five elements require active executive leadership — typically a CISO — to remain current and coherent. When that leadership is absent, the framework degrades.

Why this matters: The CISA exam tests whether candidates can identify all five elements and recognize that information security governance requires executive-level ownership. A security program without governance-level direction is a control gap, regardless of how many technical tools are in place.
🎯
Exam tip

Know all five framework elements. The exam often presents a security program with technical controls but no governance structure — the correct finding is missing governance, not missing technology. Also note: information security governance reports to the board/executive management, not to the IT department.

See also: 2.2.3 2.8.7 2.2.5
Section 2.2.5 Good-to-know

Information Systems Strategy

By the end of this card, you should be able to
Explain why board-level involvement in IS strategy is mandatory and identify what IS strategic processes must provide to the enterprise.
Scenario

Janet Holloway places an org chart on the conference table in the stone-vaulted boardroom. Meridian's IS strategy document lists the CIO as sole owner — no board sponsor, no executive sign-off. Alex Chen notes that MERIDIA-1 processes 94 percent of daily transactions yet no director has ever reviewed its strategic roadmap. 'The dependency is total,' Janet says. 'The governance has to match it.' She sets down the red marker. MERIDIA-1's strategic roadmap has never been reviewed by any director. Alex is about to write the finding. Is the issue missing IS strategy, missing board oversight of IS strategy, or both — and which is the root cause finding?

Information Systems Strategy
IS strategy flows downward from the board — not upward from IT. Three-tier hierarchy: Board → IS Strategic Processes → Business Goals.
How it works

Information systems are no longer a back-office support function — they are the primary vehicle through which enterprises operate, grow, and compete. Because of this near-total operational dependence, governing boards and senior management can no longer delegate IS strategy exclusively to functional IT managers. IS strategic processes must sit inside the enterprise's governance structure and must provide reasonable assurance that both current and future business objectives will be met. They must also address the full spectrum of IS-related threats: resource abuse, cybercrime, fraud, errors and omissions. Auditors assess whether IS strategy is explicitly owned at board level, aligned to business goals, and treated as a core governance input rather than a technical afterthought.

At a glance
🏛️

Why Board Involvement

Why can't IS strategy be left to functional management?

  • Near-total operational dependence on IS
  • Threats include cybercrime, fraud, resource abuse
  • IS strategy is a governance — not just technical — responsibility
  • Boards are accountable for enterprise risk
🎯

What IS Strategy Must Deliver

What must IS strategic processes assure?

  • Attainment of existing business goals
  • Support for emerging business objectives
  • Competitive advantage through IS
  • Alignment of IS with enterprise governance
⚠️

Threats Driving the Shift

What threats make passive board governance unacceptable?

  • IS resource abuse
  • Cybercrime
  • Fraud
  • Errors and omissions
🔍

Auditor's Test

What does the IS auditor check?

  • Board-level IS strategy ownership
  • Alignment between IS and business goals
  • Governance structures include IS oversight
  • IS treated as strategic, not just operational
Try yourself

Meridian Corp's board has historically left all IS direction to functional IT managers. Janet Holloway flags this to the audit committee. As the IS auditor, what is the core argument for why this governance gap is now unacceptable?

— Pause to recall —
Both problems are present, but missing board oversight of IS strategy is the root cause finding. Without board-level governance, IS strategy cannot be properly owned, resourced, or aligned to business goals — the absence of strategy is a downstream effect. The auditor's finding should state that Meridian's board has abdicated its IS governance responsibility, and that the gap in IS strategy ownership flows directly from that failure.

The scenario presents two related deficiencies: no IS strategy document owned at board level, and no board oversight of IS direction. Both are findings, but the IS auditor must identify the root cause. The root cause is missing board oversight of IS strategy. The source establishes that enterprises are now near-totally dependent on IS for day-to-day operations and growth, and that this dependency makes it no longer acceptable for boards to delegate IS strategy entirely to functional management. IS strategic processes are integral components of enterprise governance — not a subordinate technical function. When the board has never reviewed or owned the IS strategic roadmap, it has failed its governance duty. The lack of an IS strategy aligned to business goals is the visible symptom; the structural failure of board governance is the cause. The auditor's root cause finding should read: 'The board of directors has not established or maintained oversight of IS strategy, in violation of its governance responsibilities.' The absence of an IS strategy document is a secondary finding traceable to that root cause. Wrong answers would identify 'missing IS strategy' as the primary finding without tracing it to board-level governance failure.

Why this matters: CISA exams test that IS strategy is a governance responsibility, not just a technical one. Candidates who treat IS strategy as purely an IT-department concern will pick the wrong answer.
🎯
Exam tip

The exam frequently presents scenarios where IS strategy decisions are made by IT management alone and asks whether this is an acceptable governance practice. The correct answer is always that board and senior management involvement is required. Wrong answers often suggest that delegating IS strategy to the CIO or IT steering committee is sufficient — it is not if the board has no oversight role. Remember: IS strategy is a governance issue, not a management issue.

See also: 2.2 2.2.6 2.2.1
Section 2.2.6 Good-to-know

Strategic Planning

By the end of this card, you should be able to
Explain the purpose of IT strategic planning, identify who is responsible for developing strategic IT plans, and describe how planning frequency should respond to environmental dynamism.
Scenario

Sarah Lin presents Meridian's three-year IT strategic plan to the steering committee. Marcus Webb points out that the plan still refers to the enterprise as 'primarily on-premises,' though Meridian migrated 40 percent of workloads to AWS last year. The plan's cloud section runs to one paragraph. Priya Rao, reviewing the steering committee minutes, notes that the plan was last formally reviewed twenty-six months ago. The strategy committee never reconvened after the cloud migration started. Alex Chen looks at the draft finding sheet. Should the finding be 'plan not updated' or 'planning governance structure failed'?

Strategic Planning
3 planning stages = Assess, Align, Adapt. The map must be redrawn when the territory changes.
How it works

IT strategic planning defines the enterprise's long-term direction for applying technology to improve business processes and achieve enterprise objectives. Three organizational bodies share responsibility: IT department management, which sets technical direction; the IT steering committee, which aligns IT priorities with business needs; and the strategy committee, which contributes stakeholder value inputs. Plans must be fully aligned with the enterprise's overall goals. The traditional planning horizon of three to five years was designed for stable environments. In industries characterized by rapid technology change, regulatory shifts, or market disruption, longer static cycles are insufficient. Enterprises in these conditions benefit from strategic agility — shorter planning windows with more frequent reviews — allowing timely adjustments when significant changes occur. The IS auditor should verify that the planning cycle is appropriate to the enterprise's environment and that the plan reflects the current operational and regulatory reality.

🧠 Mnemonic
Assess → Align → Adapt
Assess the current environment, Align the IT plan with enterprise goals, then Adapt the planning frequency to how fast the environment changes.
At a glance
🧭

Purpose of IT Strategic Planning

What does IT strategic planning achieve?

  • Long-term IT direction aligned to business
  • Identifies cost-effective IT solutions
  • Action plans for resource acquisition
  • Sets the basis for IT investment decisions
👥

Responsible Bodies

Who develops IT strategic plans?

  • IT department management
  • IT steering committee
  • Strategy committee (stakeholder value input)
  • Top management oversight
🗓️

Planning Frequency

How often should plans be reviewed?

  • Traditional: every 3-5 years
  • Dynamic environments: more frequently
  • Strategic agility: continuous with short horizons
  • Triggered by: regulation change, tech disruption, market shift
🔍

IS Auditor's Check

What does the auditor verify?

  • Plan reflects current environment
  • Alignment with enterprise objectives documented
  • Appropriate bodies participated in planning
  • Frequency matches environmental dynamism
Try yourself

Meridian's IT strategic plan was written three years ago when the bank was on-premises only. Sarah Lin wants to skip the annual planning cycle because 'strategy doesn't change that fast.' As the IS auditor reviewing this claim in the context of Meridian's recent hybrid cloud migration, what specific governance risk does skipping the planning cycle create?

— Pause to recall —
Traditional IT strategic plans span three to five years, but must be reviewed and adapted more frequently in dynamic environments. Three bodies responsible: IT department management, the IT steering committee, and the strategy committee. In a fast-changing hybrid cloud environment, a static three-year plan is insufficient — strategic agility or continuous planning may be required.

IT strategic planning sets the enterprise's long-term direction for using IT to improve business processes. Top management is responsible for it, and three bodies collaborate in developing plans: IT department management (technical execution direction), the IT steering committee (alignment between IT and business functions), and the strategy committee (stakeholder value input). Plans must be fully aligned with enterprise goals and objectives. Traditional planning horizons of three to five years are insufficient in industries where disruptive technologies or market shifts change the competitive landscape rapidly — banks migrating to hybrid cloud are a textbook example. Enterprises in volatile environments should adopt strategic agility: shorter planning horizons with more frequent reviews, enabling faster response to regulatory changes, technology shifts, and customer preference changes. The IS auditor should verify that planning frequency matches environmental dynamism.

Why this matters: The exam tests whether candidates know who develops IT strategic plans and that the correct planning horizon depends on environmental volatility — a fixed three-year cycle is not always appropriate.
🎯
Exam tip

When the exam asks about IT strategic planning frequency, the correct answer is context-dependent. Three to five years is the traditional standard, but volatile or fast-moving industries require more frequent updates. Know the three bodies responsible: IT management, IT steering committee, and strategy committee.

See also: 2.2.5 2.2.1 2.9
Section 2.2.7 Good-to-know

Business Intelligence

By the end of this card, you should be able to
Define business intelligence in the context of IT governance and strategic planning, identify the four decision-support benefits BI provides to management, and describe typical application areas.
Scenario

Marcus Webb sits at the head of the strategy committee table with three printed reports: a product revenue breakdown, a mobile app usage heatmap, and an IT cost-per-transaction trend line. He passes them to Sarah Lin. 'I need to know which of these is reliable enough to base a capital allocation decision on.' Sarah confirms that all three feeds come from Meridian's data lake, which Alex Chen's team audited last quarter for data integrity. Marcus nods. Before he marks them as inputs for the next IT strategic plan, he asks Alex Chen: 'We trust these because the data lake was audited last quarter — but is that enough to rely on them for a capital allocation decision?' Alex needs to give a one-sentence answer.

Business Intelligence
4 scrolls = 4 BI benefits. Governance decisions are only as reliable as the data beneath them.
How it works

Good governance does not end when the board approves an IS strategy — it requires ongoing visibility into whether that strategy is being executed and producing results. Business intelligence (BI) is the mechanism that provides this visibility: it translates raw operational data into the reports, trend analyses, and performance indicators that allow the board and senior management to measure strategy execution and course-correct. Without reliable BI, governance is directionally blind — strategies are approved but never verifiably tracked. BI is directly relevant to IT governance and strategic planning because it provides the information base on which decisions about IT investment, resource allocation, and strategy adjustment are made. BI supports management in four ways: identifying trends and patterns that are not apparent in standard reports; understanding customer behavior — including preferences, needs, and profitability drivers; assessing organizational performance against key indicators; and enabling better-informed decisions by synthesizing data from across the enterprise. Typical BI application areas include process cost and efficiency analysis, customer satisfaction measurement, customer profitability modeling, and tracking staff and business unit achievement of KPIs. The quality of BI outputs depends on the quality and completeness of the underlying data — a dimension the IS auditor should evaluate when reviewing strategic planning inputs.

🧠 Mnemonic
T·C·P·D
Trends, Customer behavior, Performance assessment, Decision support — the four management benefits that business intelligence delivers to strategic planning.
At a glance
📈

Trends & Patterns

What does trend analysis reveal?

  • Signals not visible in routine reports
  • Emerging opportunities and risks
  • Product and market trajectory
  • Input for new strategy development
👤

Customer Behavior

What does customer BI tell management?

  • Customer needs and preferences
  • Product usage patterns
  • Profitability drivers by customer segment
  • Marketing effectiveness signals
🎯

Performance Assessment

What does BI measure in operations?

  • KPI achievement by business unit
  • IT cost per transaction trends
  • Process efficiency metrics
  • Progress toward strategic targets
🧠

Decision Support

How does BI improve decisions?

  • Synthesizes data from multiple sources
  • Reduces reliance on intuition alone
  • Provides documented evidence for capital allocation
  • Enables scenario comparison
Try yourself

Meridian's strategic planning committee is debating IT investments for the next planning cycle. Marcus Webb wants data on which products are most profitable, how customer usage patterns have shifted since the mobile app launch, and whether IT operational costs are trending in the right direction. Which BI capability addresses each of Marcus's three data needs?

— Pause to recall —
Product profitability = Identify trends and patterns. Customer usage shifts = Understand customer behavior. IT operational cost trends = Assess performance. All three are standard BI application areas that feed strategic planning.

Business intelligence (BI) provides management with organized data and analytical insights to support strategic decision-making. BI capabilities address four management needs:

  1. Identify trends and patterns — uncovering signals in data that are not visible through routine reporting, enabling new strategy development
  2. Understand customer behavior — profiling customer needs, preferences, and profitability to improve products, services, and marketing
  3. Assess performance — measuring business unit and IT KPI achievement against targets, identifying improvement areas, and tracking progress
  4. Make better decisions — synthesizing data from multiple sources to improve the quality and confidence of future-oriented choices

BI is applied across process cost, efficiency, and quality analysis; customer satisfaction measurement; customer profitability modeling; and staff and business unit KPI tracking.

Why this matters: BI appears in CISA content as a strategic planning enabler, not as a technology tool. The IS auditor verifies that BI outputs are reliable, complete, and actually used in governance and planning decisions.
🎯
Exam tip

BI questions on the CISA exam focus on its role in governance and strategic planning — not on specific BI technologies. The IS auditor's concern is data quality and reliability: BI outputs are only as trustworthy as the underlying data. If the data lake has integrity gaps, the strategic plan built on BI outputs is compromised.

See also: 2.2.6 2.10 2.2.1
Section 2.2.8 Good-to-know

Organizational Structure

By the end of this card, you should be able to
Distinguish the roles of the IT strategy committee and the IT steering committee within enterprise governance, and list the types of IT governing committees an enterprise may have.
Scenario

Alex Chen pulls up the governance charter in ServiceNow ticket CHG-4471. Meridian lists a single 'IT Steering Committee' chaired by the CIO and assumes it covers both strategic and operational IT decisions. Priya Rao flags the gap. The two committee charters are missing. Before she can write the finding, she needs Alex to confirm the distinction: 'Strategy committees report to whom, and steering committees report to whom?' Alex must answer before the finding is finalized.

Organizational Structure
Two committees, two levels. Strategy = board advisory (left). Steering = executive operational (right). Never merge them.
How it works

Organizational structure identifies the key decision-making entities within enterprise governance. For IT, most enterprises should maintain two distinct committees. The IT strategy committee sits at board level — its members include board directors and external specialists, and its role is advisory: it provides the board with insight on strategic IT matters such as business alignment, investment value, and IT-related risk. The IT steering committee sits at the executive level and is operational: it decides IT spending levels, approves project plans and budgets, assigns resources, and monitors delivery against plan. Larger enterprises may add further committees — an IT executive committee, IT investment committee, or IT management committee. The IS auditor checks that both committee types exist, that their charters are distinct, that membership is appropriate, and that neither committee absorbs functions it should not own.

🧠 Mnemonic
S·S Split
Strategy committee → board (Sets direction). Steering committee → management (Steers execution). Split the two or governance collapses.
At a glance
♟️

IT Strategy Committee

What does the IT strategy committee do?

  • Board-level advisory body
  • Advises on IT alignment with business direction
  • Reviews IT investment risk and return
  • Members include board directors and specialists
⚙️

IT Steering Committee

What does the IT steering committee do?

  • Executive-level operational body
  • Approves project budgets and plans
  • Allocates IT resources and resolves conflicts
  • Monitors delivery and project performance
🏛️

Other Governing Committees

What other IT committees may exist?

  • IT executive committee
  • IT governance committee
  • IT investment committee
  • IT management committee
🔍

Auditor's Check

What does the IS auditor verify about these structures?

  • Both committees exist with separate charters
  • Membership matches the committee's level
  • Roles do not overlap or conflict
  • Committees produce documented reports
Try yourself

During an IT governance audit at Meridian Corp, Alex Chen finds two committees — one chaired by a board member, one chaired by the CIO — but the committee charters were shredded in an office move. The only remaining clue is their activity logs: one approved the AWS cloud migration budget and monitored delivery milestones; the other reviewed the ten-year digital banking vision and recommended it to the board. Which activity log belongs to the strategy committee and which belongs to the steering committee?

— Pause to recall —
The IT strategy committee is board-level and advisory — it provides strategic direction to the board. The IT steering committee is executive-level and operational — it approves plans, budgets, and monitors performance.

Organizational structure is a key governance component because it identifies who makes what decisions. Enterprises typically maintain two distinct IT committees. The IT strategy committee operates at board level: its members include board directors and outside specialists; it advises the board on strategic IT matters including alignment with business direction, IT investment risk and return, and achievement of strategic objectives. The IT steering committee operates at the executive level: it makes operational decisions — approving budgets, aligning architecture, assigning resources, and monitoring project delivery. Confusing the two committees, or allowing one to absorb the other's role, is a governance gap that IS auditors should flag.

Why this matters: CISA exams directly test the distinction between strategy committee (board advisory) and steering committee (executive operational). These are classic distractor pairs on governance questions.
🎯
Exam tip

The most common exam trap is a scenario where one committee handles both strategic and operational IT decisions — this is a governance gap. Know that the strategy committee advises the BOARD while the steering committee reports to MANAGEMENT. Wrong answers often claim it is acceptable for the CIO to chair both committees, or that a single committee can perform both functions in a medium-sized enterprise.

See also: 2.2 2.2.1 2.2.9
Section 2.2.9 Must-know

Auditing IT Governance Structure and Implementation

By the end of this card, you should be able to
Identify the warning indicators of IT governance problems and the key governance documents an IS auditor should review.
Scenario

Alex Chen opens governance fieldwork with a single spreadsheet. Meridian's IT function shows six yellow flags in one column: three projects overdue, a help-desk backlog of 430 open tickets, two critical systems supported by one engineer each, and no succession plan on file. Priya Rao hands Alex the document request list. The steering committee reports are 14 months old and the HR manual has not been updated since the last org restructure. Alex looks at the document dates. Priya asks: 'Are outdated documents a finding on their own, or only a finding if you can show a specific control failed because of them?'

Auditing IT Governance Structure and Implementation
Left wall = red flags (cracks in governance). Right wall = documents to inspect. Missing scroll = a finding in itself.
How it works

When auditing IT governance, IS auditors look for two things: warning indicators that suggest the IT function is not well controlled, and a set of governance documents that should exist, be current, and be management-authorized. Warning indicators include excessive costs, budget overruns, late or cancelled projects, high staff turnover, inexperienced or undertrained staff, frequent hardware and software errors, large user-request backlogs, slow system response, unsupported or unauthorized hardware and software purchases, and a lack of succession planning. Documents to request and review include IT strategies, plans and budgets; security policy documentation; organizational and functional charts; job descriptions; IT steering committee reports; system development and change procedures; operations procedures; HR manuals; and QA procedures. For each document, the auditor assesses two things: whether it was created as management intended, and whether it is current. Outdated or missing documents are themselves governance control deficiencies.

At a glance
💸

Cost & Delivery Red Flags

What cost and delivery signs indicate governance problems?

  • Excessive costs / budget overruns
  • Late or suspended projects
  • Slow computer response time
  • Extensive or unfollowed exception reports
👥

People & Skills Red Flags

What people-related signs indicate governance problems?

  • High staff turnover
  • Inexperienced or inadequately trained staff
  • Reliance on one or two key personnel
  • Lack of succession plans
🖥️

Technology Red Flags

What technology signs indicate governance problems?

  • Frequent hardware/software errors
  • Frequent HW/SW upgrades
  • Unsupported or unauthorized HW/SW purchases
  • Excessive user-request backlog
📄

Documents to Review

Which governance documents must the IS auditor request?

  • IT strategies, plans and budgets
  • Security policy; org charts; job descriptions
  • IT steering committee reports
  • Change procedures; HR manuals; QA procedures
Try yourself

Alex Chen begins an IT governance audit at Meridian Corp. Steering committee reports are 14 months old and the HR manual has not been updated since the last org restructure. Priya Rao hands Alex the document request list. Before Alex begins document review, what category of red flag do outdated governance documents represent, and what does ISACA guidance say an IS auditor should conclude from a policy document that has not been reviewed in over a year?

— Pause to recall —
Red flags include excessive costs, budget overruns, late projects, high turnover, frequent errors, large user-request backlogs, and reliance on key personnel. Documents to review include IT strategies, security policies, org charts, job descriptions, steering committee reports, change procedures, HR manuals, and QA procedures.

When auditing IT governance, IS auditors look for indicators that the IT function is poorly managed. Key red flags span cost overruns, chronic project delays, high staff turnover and skill gaps, frequent hardware/software errors, excessive backlogs, unsupported or unauthorized purchases, suspension of development projects, and a lack of succession planning. On the documentation side, auditors request IT strategies and budgets, security policies, organizational charts, job descriptions, IT steering committee reports, system development and change procedures, operations procedures, HR manuals, and QA procedures. Documents are assessed on two criteria: whether they were created as management authorized, and whether they are current and up to date. Missing, outdated, or unauthorized documents are themselves governance findings.

Why this matters: CISA exams test both the red flags and the documentation checklist. Candidates often miss that 'exception reports that were not followed up' and 'reliance on one or two key personnel' are explicit governance indicators in the official manual.
🎯
Exam tip

Questions often present a scenario with one or two red flags and ask what the auditor should investigate first. The correct answer focuses on obtaining and reviewing the relevant governance documentation before drawing conclusions. A common wrong answer is to immediately escalate to management — auditors gather evidence first. Also note that exception reports that were never followed up are themselves a red flag, separate from the existence of the reports.

📰Real World

When the SEC investigated Knight Capital Group following its August 1, 2012 trading incident — in which a software deployment error caused the firm to lose approximately $440 million in 45 minutes — the SEC's October 2013 administrative order found that Knight lacked adequate IT governance documentation across multiple dimensions: no written procedures requiring supervisory review of algorithmic code before deployment, no documented change management process that verified all servers were running the same software version, and no written protocols requiring a manual kill-switch or automated volume threshold to halt aberrant trading. These governance document gaps were not discovered during Knight's own internal reviews because the absence of procedures was not itself being audited — there were no steering-committee-level reports tracking deployment governance compliance, and the IT operations manual had not been updated to reflect the firm's shift to high-frequency algorithmic trading. The SEC order found Knight violated Rule 15c3-5 (the Market Access Rule), which requires, among other things, documented supervisory procedures. The case illustrates the IT governance audit checklist directly: missing, outdated, or unauthorized governance documents — not just failed controls — are themselves findings. An IS auditor who reviews only whether controls executed correctly, without checking whether governance documentation exists and is current, will miss the underlying structural gap.

See also: 2.2 2.2.1 2.2.8
Section 2.3 Must-know

IT Policies, Standards, Procedures

By the end of this card, you should be able to
Distinguish among policies, standards, procedures, and guidelines in terms of ownership layer, purpose, and relationship to IT governance and operations.
Scenario

Alex Chen reviews Meridian's information security documentation library. In a single folder, four documents are filed together: a two-page executive statement on access control expectations, a table of mandatory encryption key lengths, a twelve-step process for provisioning user accounts, and a supplementary guide explaining common pitfalls and workarounds. Alex has four documents on the desk: a password length rule, a step-by-step provisioning workflow, a statement of IT principles, and a tips guide for interpreting role changes. The filing system has labeled all four 'Policy.' Before Alex writes the finding, he needs to correctly relabel each one.

IT Policies, Standards, Procedures
4 tiers = 4 documentation layers. Governance at the top, operations at the base — each tier derives authority from the one above.
How it works

IT governance relies on a four-level documentation hierarchy, and the terms in this hierarchy have specific, distinct meanings. Policies are high-level statements of management intent, expectation, and direction. They are tools of governance and set the tone for the enterprise. Standards are mandatory requirements, specifications, or codes of practice that define measurable criteria for whether processes and systems meet policy requirements. They are tools of management. Procedures are documented, step-by-step instructions for achieving specific policy objectives; they are formulated by process owners and are the responsibility of operations. Guidelines are advisory documents that help individuals execute procedures more effectively, providing context, examples, and background information. They are also operations-level but are not mandatory. The hierarchy flows from governance (policy) through management (standard) to operations (procedure and guideline). Understanding this hierarchy is essential for IS auditors reviewing the adequacy and currency of an enterprise's governance documentation.

🧠 Mnemonic
P·S·P·G = Govern → Manage → Operate → Support
Policy (Govern), Standard (Manage), Procedure (Operate), Guideline (Support) — four layers, two governance tools and two operations tools.
At a glance
👑

Policy

What is a policy?

  • High-level statement of management intent
  • Tool of governance
  • Sets the tone for the enterprise
  • Can remain static in mature enterprises
📐

Standard

What is a standard?

  • Mandatory requirement or specification
  • Tool of management
  • Measures whether procedures meet policy
  • Sets security baselines and risk boundaries
📋

Procedure

What is a procedure?

  • Documented step-by-step instructions
  • Operations responsibility
  • Derived from parent policy
  • More dynamic than policies; updated frequently
💡

Guideline

What is a guideline?

  • Advisory, not mandatory
  • Supports procedure execution
  • Provides context, examples, suggestions
  • Created by process owners for operational staff
Try yourself

Meridian's compliance team finds a document titled 'Minimum Password Length = 12 characters — mandatory.' The document references the information security policy and specifies a measurable, enforceable criterion. At which layer of the governance hierarchy does this document sit, and who is the appropriate owner?

— Pause to recall —
A mandatory minimum specification ('12 characters') is a standard — it is a mandatory requirement used to measure whether procedures meet policy requirements. Standards are management tools. The policy above it would state the intent (e.g., 'access to systems must be controlled through strong authentication'); the standard operationalizes that intent with a measurable criterion.

Four terms describe the layers of IT governance documentation. Policies are high-level statements of management intent and direction — tools of governance. Standards are mandatory requirements or specifications that define the criteria used to measure whether procedures and processes meet policy requirements — tools of management. Procedures are documented, step-by-step instructions for achieving specific policy objectives — the responsibility of operations. Guidelines are advisory information created to help individuals execute procedures more effectively, providing context, examples, and suggestions — also operations-level, but non-mandatory. The hierarchy flows: policy sets direction, standard sets measurable criteria, procedure executes the standard, guideline supports the procedure. The mandatory password length requirement is a standard.

Why this matters: The CISA exam frequently tests this four-level hierarchy, particularly the distinction between 'mandatory' (standard) and 'advisory' (guideline). Misclassifying a document type leads to wrong conclusions about accountability and enforceability.
🎯
Exam tip

The exam distinguishes mandatory (policy, standard) from advisory (guideline) and governance-level (policy) from operations-level (procedure, guideline). When a question asks 'who is responsible?' — policy is governance, procedure is operations. When it asks 'is this enforceable?' — standards and policies are mandatory; guidelines are not.

See also: 2.3.1 2.3.2 2.3.3
Section 2.3.1 Must-know

Policies

By the end of this card, you should be able to
Define IT policy, explain the IS auditor's responsibilities when reviewing policies, and identify the key characteristics that make a policy effective and auditable.
Scenario

Alex Chen pulls Meridian's cloud usage policy as part of the EGIT engagement. The header reads: 'Information Security Committee — Approved.' No individual name. No date. The body text references 'servers in the data center' without mentioning AWS, despite the fact that Meridian migrated sixty percent of workloads to the cloud two years ago. Alex sets the policy next to the current IT architecture diagram. The mobile banking app, cloud workloads, and AWS infrastructure are absent from the policy text. Alex is about to mark 'policy out of date' as the finding. Is that sufficient — or is there a more precise finding about which of the four policy characteristics has failed?

Policies
4 policy hallmarks = alignment, approval, currency, hierarchy. Missing any one of them is an audit finding.
How it works

IT policies are high-level statements of management intent and direction. They are the foundation of the governance hierarchy — the constitution against which all standards, procedures, and guidelines are measured. For policies to be effective and auditable, they must have four characteristics. First, they must be clearly aligned with the enterprise's current strategic objectives — a policy written for a purely on-premises environment does not govern a hybrid cloud operation. Second, they must be formally approved by named individuals with authority, and that approval must include a review date so the IS auditor can verify currency. Third, they must be updated regularly to reflect technological changes, shifts in the regulatory environment, and significant changes in business processes. Fourth, high-level enterprise policies and lower-level divisional or departmental policies must be consistent — lower-level policies must support, not contradict, their enterprise-level counterparts. When any of these characteristics is absent, the IS auditor flags a governance documentation deficiency.

🧠 Mnemonic
A·A·C·H
Aligned with strategy, Approved with named owner and date, Current with the environment, Hierarchically consistent from enterprise to department.
At a glance
🎯

Strategic Alignment

What must the policy align to?

  • Enterprise strategic objectives
  • Current operational environment
  • Regulatory obligations
  • Both high-level and unit-level business goals

Approval & Currency

What does the auditor check on the policy header?

  • Named approver (not just a committee name)
  • Review date present
  • Date is recent enough to reflect current environment
  • Signature or formal approval evidence
🔄

Periodic Review

What triggers a policy update?

  • New technology deployment
  • Changes in risk or control environment
  • Regulatory compliance requirement changes
  • Significant business process changes
🏛️

Policy Hierarchy

How must policy levels relate?

  • Lower-level policies support high-level policies
  • No contradiction between levels
  • Divisional policies apply locally but stay consistent
  • IS auditor checks both enterprise and unit policies
Try yourself

Alex Chen reviews Meridian's mobile banking acceptable-use policy during fieldwork. The document states 'approved by the Information Security Committee' but has no date, no named approver, and has not been updated since mobile banking launched. As the IS auditor, what four policy characteristics are missing or deficient?

— Pause to recall —
Four deficiencies: (1) No named approver — must identify who approved; (2) No review date — auditor cannot confirm currency; (3) Not updated to reflect new technology (mobile banking) — policy is not current; (4) Possibly misaligned with current strategic objectives — currency check is required.

Policies are high-level statements of management intent, expectation, and direction. They are the constitution of governance and must be clearly aligned with the enterprise's strategic objectives. Effective policies are approved by named management individuals and include a review date — the IS auditor checks both to confirm authority and currency. Policies must be updated regularly to reflect new technology, changes in the risk and control environment, regulatory changes, and significant business process changes. High-level enterprise policies set the tone; lower-level divisional policies must be consistent with and support the high-level policies. The IS auditor's role includes testing policies for compliance, reviewing whether another assurance function already tested them (enabling potential reliance), and confirming that policies reflect the current operational reality.

Why this matters: Policy review is a standard IS audit procedure. The exam tests what the auditor looks for: named approver, review date, currency, and alignment. An undated, unnamed policy approval is a finding even if the policy text is sound.
🎯
Exam tip

Policy review is a frequent exam topic. The IS auditor must verify: named approver, review date, and currency relative to current technology and regulation. An anonymous approval ('Information Security Committee') without a named individual is insufficient. Also note: if another assurance function has already tested a policy for compliance, the IS auditor may rely on that work — they do not have to duplicate it.

See also: 2.3 2.3.2 2.8.7
Section 2.3.2 Must-know

Standards

By the end of this card, you should be able to
Define IT standards, explain their role as mandatory policy compliance criteria, and distinguish professional standards from internal enterprise standards.
Scenario

Priya Rao opens the access control audit workpaper for Meridian's AWS environment. There is no standard specifying how access must be controlled. The cloud team implemented MFA on eight of fourteen services, with no consistency criterion defining which services required it. Priya scans fifteen AWS services: no two have the same authentication controls. The policy says 'access must be controlled' but specifies nothing measurable. Before Priya writes the workpaper finding, she needs to name the type of document that is missing and explain precisely what it would need to contain.

Standards
2 standards types = internal criteria and external frameworks. Both are mandatory — advisory documents are guidelines, not standards.
How it works

A standard is a mandatory requirement, code of practice, or specification approved by a recognized authority — either internal management or an external standards body. Within an enterprise, standards translate high-level policy intent into specific, measurable compliance criteria. If a policy states that access to systems must be controlled, the corresponding standard specifies exactly how — for example, by requiring multi-factor authentication on all production systems. Standards also set security baselines and define the boundaries within which procedures must operate. When procedures are designed, they must stay within the parameters the standards define. External or professional standards, issued by recognized organizations such as ISACA, the IIA, or ISO, provide trusted reference frameworks that enterprises use to inform and validate their own internal standards. Like policies, standards must be updated as technology and risk evolve.

🧠 Mnemonic
Policies = Constitution, Standards = Laws
Policies are the enterprise's constitution — they set direction. Standards are the laws — they define the measurable criteria for whether the constitution's requirements are being met.
At a glance
📐

Internal Standards

What do internal standards define?

  • Mandatory compliance criteria for each policy
  • Security baselines (minimum controls)
  • Acceptable risk appetite boundaries
  • Allowable limits on processes, people, and technology
🏛️

Professional/External Standards

What do external standards provide?

  • Recognized frameworks for standard-setting (ISO, ISACA)
  • Industry benchmarks for comparison
  • Guidance that enterprises adopt and adapt
  • Third-party validation of internal standards
⚖️

Standards vs. Guidelines

How does a standard differ from a guideline?

  • Standards are mandatory; guidelines are advisory
  • Standards are enforceable; guidelines are informational
  • Standards set boundaries; guidelines provide context
  • Procedures must comply with standards, not guidelines
🔍

IS Auditor's Check

What does the auditor verify about standards?

  • Standards exist for each policy
  • Standards are measurable and testable
  • Procedures are designed within standard boundaries
  • Standards are current with technology and risk environment
Try yourself

Meridian's information security policy states: 'Access to systems must be controlled.' The cloud team implements different authentication controls on each of fifteen AWS services. As the IS auditor, what is the specific governance document that should bridge this policy statement to consistent, testable controls — and what makes it different from the policy itself?

— Pause to recall —
Internal standards define the mandatory criteria that procedures must meet to satisfy the policy — for example, 'all AWS services must enforce multi-factor authentication.' They set measurable compliance boundaries. Professional standards are issued by recognized external bodies (ISACA, IIA, ISO) and provide frameworks that enterprises adopt to inform their own standards.

Standards are mandatory requirements, codes of practice, or specifications approved by a recognized authority. Within an enterprise, standards serve as the criteria for determining whether procedures, processes, or systems meet policy requirements. If policies are the enterprise's constitution, standards are the laws. They set boundaries on processes, people, and technologies — defining allowable limits, security baselines, and the risk appetite management has authorized. Standards govern how procedures and guidelines are created, keeping them within defined compliance bounds. External or professional standards — issued by bodies such as ISACA, IIA, or ISO — provide frameworks that enterprises adopt as reference points for their own standards-setting. Internal standards must be updated as technology evolves and new risk emerges.

Why this matters: Standards questions on the CISA exam test whether candidates understand the mandatory nature of standards versus the advisory nature of guidelines, and the distinction between internally created standards and external professional standards.
🎯
Exam tip

The CISA exam distinguishes mandatory (policy, standard) from advisory (guideline). When a question describes something that can be enforced and used to measure compliance, it is a standard. When it describes something helpful but not required, it is a guideline. Professional standards from ISACA and IIA are external; enterprise-specific requirements are internal.

See also: 2.3 2.3.1 2.3.3
Section 2.3.3 Must-know

Procedures

By the end of this card, you should be able to
Define IT procedures, explain how they are derived from and relate to policies and standards, and describe what the IS auditor looks for when reviewing them.
Scenario

Alex Chen interviews three members of Meridian's IT provisioning team during the access control audit. All three describe a slightly different process for creating new user accounts. There is no documented procedure — the team was trained through shadowing. Alex searches ServiceNow for a procedure reference document and finds nothing. The embedded access approval control — the one the policy requires — exists in the memory of one senior team member who is planning to retire next month. Alex has the ServiceNow ticket queue open and can see 47 provisioning requests processed last quarter. Before marking the finding, he needs to state precisely what the risk is — not 'undocumented process' but its specific control consequence.

Procedures
3 banners = 3 procedure requirements. Three different methods at three benches signals none of them were met.
How it works

Procedures are documented, defined sequences of steps designed to achieve specific policy objectives. They occupy the third level of the governance hierarchy, below policies and standards. Effective procedures have three essential characteristics. First, they must be derived from the parent policy and operate within the boundaries set by applicable standards — they translate policy intent into executable actions without circumventing standards requirements. Second, they must be written clearly enough to be understood and consistently executed by anyone in the role, including new employees. Third, they must be actively communicated to those responsible for executing them — a procedure is only effective when the people who need it know it. Procedures document embedded controls: the IS auditor reviews them to identify what controls exist, evaluate whether the control design is adequate, and test whether the controls operate as designed. Where procedures are absent or inconsistently followed, embedded controls cannot be reliably identified or tested — a material audit finding.

🧠 Mnemonic
Derive → Execute → Communicate
A procedure must be Derived from policy, Executable within standard boundaries, and Communicated to those who carry it out — all three or it is not a procedure.
At a glance
🔗

Derivation from Policy

How must a procedure relate to its policy?

  • Reflects policy intent and spirit
  • Operates within standard boundaries
  • Traceable linkage to parent policy
  • Does not contradict policy or standard
📋

Documentation Requirements

What makes a procedure documentable?

  • Clear, step-by-step written instructions
  • Understandable by all executors including new staff
  • Embeds controls explicitly within steps
  • Version-controlled and date-stamped
📣

Communication

What makes a procedure effective in practice?

  • Known by all who execute it
  • Deployed through reliable communication methods
  • Automation used to enforce awareness
  • Reviewed during onboarding of new staff
🔍

IS Auditor's Review

What does the auditor examine in procedures?

  • Embedded controls identification
  • Control design adequacy
  • Consistency between documentation and practice
  • Currency — reflects current systems and regulations
Try yourself

Meridian's user provisioning process is executed differently by three different teams, each following informal tribal knowledge. The IS auditor cannot locate a documented procedure. The access approval control — required by policy — exists only in the memory of one senior team member planning to retire. What is the specific control risk created by the absence of a documented procedure?

— Pause to recall —
Three requirements violated: (1) Procedures must be documented — tribal knowledge is not a procedure; (2) Procedures must be derived from the parent policy — no documentation means no traceable link; (3) Procedures must be known by and communicated to those who execute them. The control risk: embedded controls in undocumented procedures cannot be identified, evaluated, or tested.

Procedures are documented, step-by-step instructions for achieving specific policy objectives. They must meet three requirements: they must be derived from the parent policy and reflect its spirit while operating within the standard's boundaries; they must be written clearly enough to be understood and consistently executed by all users, including newly onboarded staff; and they must be actively communicated — a procedure unknown to those executing it is effectively absent. Procedures document business and IT processes along with embedded controls. The IS auditor reviews procedures to identify those embedded controls, evaluate control design, and test whether controls function as intended. When procedures are undocumented or inconsistently followed, it is impossible to determine whether controls exist or operate effectively.

Why this matters: Procedures are the primary mechanism through which governance-level policies translate into operational-level control execution. Undocumented procedures are a material finding because they make control identification and testing impossible.
🎯
Exam tip

The CISA exam tests whether candidates recognize that undocumented procedures are a material control gap — not just an administrative inconvenience. When a process relies on tribal knowledge rather than written procedures, the auditor cannot identify, evaluate, or test embedded controls. Also know: procedures are more dynamic than policies and require more frequent updates.

See also: 2.3 2.3.2 2.8.4
Section 2.3.4 Good-to-know

Guidelines

By the end of this card, you should be able to
Define guidelines, explain how they relate to procedures and standards in the governance hierarchy, and distinguish their advisory nature from the mandatory nature of policies and standards.
Scenario

Lila Okafor writes a supplementary document for Meridian's database access provisioning procedure. The three-page document explains how to interpret job titles when granting database roles, lists common edge cases the team has encountered, and provides a decision tree for ambiguous requests. It is appended to the official procedure but clearly marked 'Reference: Advisory.' Priya Rao reviews both documents during the audit. The employee skipped the guideline's recommended field check and approved a borderline request. Priya asks Alex: 'Can we cite this as a control violation in the audit report?' Alex needs to answer before Priya decides whether to include it.

Guidelines
4 advisory scrolls = 4 types of guideline content. The lighter shade at the bottom signals advisory, not mandatory.
How it works

Guidelines are the fourth and lowest level of the IT governance documentation hierarchy. They are advisory documents typically created by process owners to help those executing procedures do so more effectively and consistently. Guidelines contain clarification of policies and standards as they apply in specific situations, identification of dependencies between steps or systems, suggestions and worked examples for common scenarios, narrative background explaining the intent of procedures, and descriptions of tools that can be used. Unlike policies and standards, guidelines are not mandatory. Deviation from a guideline alone is not an audit finding, because guidelines carry no enforcement authority. They exist to improve the quality and consistency of procedure execution, particularly where the procedure text alone leaves room for ambiguous interpretation. The IS auditor notes the presence and usefulness of guidelines when reviewing procedures but tests compliance against the procedure, not the guideline.

At a glance
💡

Content of Guidelines

What do guidelines contain?

  • Clarification of policies and standards
  • Dependency maps between steps
  • Worked examples and common scenarios
  • Background context and tool suggestions
⚖️

Advisory vs. Mandatory

Are guidelines enforceable?

  • No — guidelines are advisory only
  • Non-compliance is not a disciplinary finding
  • Guidelines help, they do not compel
  • Enforcement authority rests with policies and standards
🔗

Relationship to Procedures

How do guidelines relate to procedures?

  • Guidelines support, not replace, procedures
  • Procedure is the binding document
  • Guideline is the supplementary reference
  • Process owners create both
🔍

IS Auditor's Approach

How does the auditor handle guidelines?

  • Notes their presence and usefulness
  • Tests compliance against the procedure, not the guideline
  • Non-compliance with guideline alone is not a finding
  • May reference guidelines when evaluating procedure clarity
Try yourself

Meridian's process owner has written a document explaining common approval scenarios, how to interpret borderline job title changes, and which system fields to check first. It is appended to the official procedure but marked 'Reference: Advisory.' An employee ignores it and approves a borderline access request without checking the recommended fields. Can the IS auditor cite this as a control violation?

— Pause to recall —
It is a guideline — advisory, non-mandatory, and designed to help executors follow the procedure more effectively. Non-compliance with a guideline is not disciplinary; guidelines help people apply procedures, they do not create binding obligations.

Guidelines are advisory documents created by process owners to help individuals execute procedures more effectively. They contain: clarification of how policies and standards apply in specific situations; identification of dependencies; suggestions and examples for common scenarios; narrative that explains the intent behind procedure steps; background context; and tools that can be used. Guidelines are the lowest level of the governance hierarchy and are non-mandatory. Non-compliance with a guideline alone is not a disciplinary or audit finding. They are distinguished from procedures by their advisory nature and from standards by their lack of enforcement authority. When a process owner wants guidance to travel with a procedure document, a guideline is the correct format.

Why this matters: The CISA exam tests whether candidates recognize that guidelines are advisory and non-enforceable. A common exam trap presents a 'best practice guide' and asks whether deviation is a finding — for guidelines, it is not.
🎯
Exam tip

Whenever the CISA exam describes a 'best practice reference document,' 'advisory guide,' or 'supplementary checklist,' it is describing a guideline — advisory, not mandatory. The binding documents are policies and standards. Procedures are mandatory instructions; guidelines help execute them better. Deviation from a guideline without any related policy or procedure violation is not a reportable finding.

See also: 2.3 2.3.3 2.3.1
Section 2.4 Good-to-know

Enterprise Architecture and Considerations

By the end of this card, you should be able to
Define enterprise architecture, explain the purpose of the Zachman Framework, and describe how EA transparency supports IT investment management and IS audit.
Scenario

Marcus Webb places a single printed page on the conference table: a list of thirty-seven IT systems at Meridian, with no description of how they interact. 'This is what we have for EA,' he says. Sarah Lin's team is proposing to replace MERIDIA-1 with a modern core. Janet Holloway asks Alex Chen to assess the documentation. Alex finds no architecture diagrams, no data flow maps, no owner registry. The board has already approved the $15M modernization budget. Alex has fifteen minutes before the steering committee meeting. The question is whether to raise the missing EA documentation as a blocking risk or as a finding that can be remediated in parallel with the programme.

Enterprise Architecture and Considerations
6 × 5 grid = Zachman Framework. Empty cells mark undocumented architecture — investment decisions made on empty cells carry unknown risk.
How it works

Enterprise architecture (EA) is the practice of documenting an enterprise's IT assets — systems, data flows, technology components, processes, and their interrelationships — in a structured way that supports planning, governance, and investment decisions. EA provides transparency: it allows management to understand how a proposed investment will affect the existing environment and to estimate the returns or risks associated with change. The Zachman Framework, developed by John Zachman in the 1980s, is the most widely recognized foundation for EA projects. It organizes documentation as a two-dimensional matrix: six interrogatives (What, How, Where, Who, When, Why) across five levels of abstraction from high-level scope to detailed technical representation. Each cell captures a distinct aspect of the enterprise from a specific stakeholder perspective. The IS auditor uses EA documentation to scope engagements, identify systems within the audit boundary, map controls to assets, and assess whether change initiatives are adequately documented.

🧠 Mnemonic
6 × 5 = Zachman
Six interrogatives (What, How, Where, Who, When, Why) times five abstraction levels (Scope to Detail) equals the Zachman Framework matrix — each cell is a documentation target.
At a glance
🏗️

EA Purpose

Why does EA matter for governance?

  • Transparency on what IT assets exist
  • Supports investment impact assessment
  • Enables return/loss estimation
  • Provides scope boundary for audits

Zachman: Interrogatives

What six questions does Zachman answer?

  • What (data/objects)
  • How (processes/functions)
  • Where (locations/networks)
  • Who (people/roles) | When (timing) | Why (motivations)
🎚️

Zachman: Abstraction Levels

What five levels does Zachman use?

  • Scope (executive view)
  • Enterprise model (business view)
  • Systems model (architect view)
  • Technology model (engineer view) | Detailed representation (builder view)
🔍

IS Auditor's EA Use

How does the auditor use EA documentation?

  • Scope: identify systems in audit boundary
  • Risk mapping: link assets to controls
  • Change impact: assess what breaks if architecture changes
  • Gap detection: empty Zachman cells = undocumented areas
Try yourself

Meridian Corp is planning a major core banking modernization. Marcus Webb asks for documentation showing what systems exist, how they connect, who owns them, and what breaks if they change. The IS auditor assesses the EA documentation and finds the Zachman matrix cells almost entirely empty. What specific risk does an empty Zachman matrix create for the modernization programme?

— Pause to recall —
Enterprise architecture (EA) is the structured documentation of an enterprise's IT assets to support planning, investment management, and governance. The Zachman Framework is the classic EA reference: a matrix of six interrogatives (What, How, Where, Who, When, Why) across five audience abstraction levels.

Enterprise architecture involves documenting an enterprise's IT assets in a structured manner to facilitate understanding, management, and planning for IT investments. It provides transparency: management can assess how their IT environment will be impacted by additional investment and determine expected returns or losses. The Zachman Framework, first published by John Zachman in the late 1980s, is the foundational EA reference. It organizes EA documentation as a matrix: six columns representing fundamental questions (What, How, Where, Who, When, Why) and five rows representing levels of audience abstraction (Scope, Enterprise model, Systems model, Technology model, Detailed representation). Each cell in the matrix addresses a specific aspect of the enterprise's architecture from a specific stakeholder's perspective. Completing all cells is the goal of a comprehensive EA project.

Why this matters: EA documentation is an IS auditor prerequisite for many engagements. Without an accurate EA, the auditor cannot map systems to risks, assess the impact of changes, or verify that controls cover all critical components.
🎯
Exam tip

The CISA exam tests awareness of the Zachman Framework as the classic EA reference — know it as a matrix of interrogatives (What/How/Where/Who/When/Why) and abstraction levels. The IS auditor's key concern is whether EA documentation is complete enough to support risk mapping and investment assessment. Incomplete EA is an audit finding.

See also: 2.2.5 2.2.6 2.8.2
Section 2.5 Must-know

Enterprise Risk Management

By the end of this card, you should be able to
Define ERM from an IT perspective, distinguish risk appetite from risk tolerance, and explain ERM's role as a management advisory function distinct from internal audit.
Scenario

Devon Park presents the quarterly risk report to the board risk committee. One metric is flagged amber: cloud environment sprawl has pushed unregistered AWS accounts to thirty-two, against an approved tolerance of no more than ten. Marcus Webb looks up: 'Is this an audit finding?' Janet Holloway and Devon Park exchange a glance. That same sprawl has driven cloud spend eighteen percent above the approved budget. The board appetite statement said 'moderate.' The question is whether the overrun breaches appetite — or merely tests the tolerance range within that appetite. Alex needs to advise Janet before she responds to Marcus.

Enterprise Risk Management
2 measures = appetite (ceiling) and tolerance (range). ERM monitors both; audit provides independent assurance at year-end.
How it works

Enterprise Risk Management (ERM) is the process of identifying vulnerabilities and threats to an enterprise's information resources, assessing their potential impact, and deciding what countermeasures to apply to reduce risk to an acceptable level. The residual risk that remains after countermeasures are applied must fall within the enterprise's defined risk parameters. ERM is a management advisory function — it advises senior leaders on which risk treatment strategy to pursue. It is not an independent function like internal audit. Two related but distinct concepts govern ERM: risk appetite — the amount of risk the enterprise is strategically willing to accept in pursuit of its objectives, set at the board level; and risk tolerance — the acceptable tactical deviation from that appetite, representing the amount of variance the enterprise can absorb without compromising strategic goals. ERM monitors actual risk exposure against both appetite and tolerance, and communicates when either boundary is being approached.

🧠 Mnemonic
Appetite = Strategic ceiling, Tolerance = Tactical range
Risk Appetite is the board's strategic decision on how much risk to accept. Risk Tolerance is the operational range of acceptable deviation below that ceiling.
At a glance
🎯

Risk Appetite

What is risk appetite?

  • Amount of risk enterprise will accept for strategic objectives
  • Set at board level
  • Strategic concept
  • Applies enterprise-wide
📊

Risk Tolerance

What is risk tolerance?

  • Acceptable deviation from risk appetite
  • Tactical concept (operational range)
  • Can be set at department level
  • Represents maximum absorb-able variance
⚖️

ERM vs. Internal Audit

How do ERM and audit differ?

  • ERM = management advisory function (not independent)
  • Audit = independent assurance to the board
  • ERM monitors in real-time; audit provides periodic assurance
  • ERM cannot substitute for audit independence
🔭

ERM Scope

What does ERM encompass?

  • Identifying vulnerabilities and threats
  • Analyzing and evaluating risk
  • Selecting and implementing risk treatment
  • Monitoring residual risk continuously
Try yourself

Meridian's board sets a risk appetite statement: 'We will accept moderate IT risk in pursuit of cloud-first strategy.' Cloud spending has exceeded budget by 18% due to uncontrolled experimentation. Devon's ERM team flagged this through monitoring. The CFO asks whether this is a risk appetite violation or a risk tolerance issue. What is the correct answer, and what distinguishes the two concepts?

— Pause to recall —
This is a risk tolerance issue — the deviation from approved spending exceeded the acceptable range. ERM should have caught it first, because ERM is the management advisory function that monitors risk against appetite and tolerance. Internal audit is independent and provides assurance, not real-time monitoring.

Enterprise Risk Management (ERM) from an IT perspective is the process of identifying vulnerabilities and threats to information resources and deciding what countermeasures to apply to reduce risk to an acceptable level (residual risk). ERM operates as a management function — it advises senior leaders on risk treatment strategies. It is not an independent audit function. Risk appetite is the amount of risk the enterprise is willing to accept to achieve its strategic objectives — a deliberate board-level strategic decision. Risk tolerance is the acceptable deviation from that risk appetite — the tactical range within which the enterprise can operate without jeopardizing strategic goals. ERM monitors performance against both appetite and tolerance and communicates when either is being approached or exceeded.

Why this matters: The CISA exam tests the appetite-vs-tolerance distinction and the ERM-vs-audit independence distinction. ERM is management; audit is independent. Confusing the two leads to wrong answers about accountability for monitoring ongoing risk.
🎯
Exam tip

The CISA exam will present scenarios testing risk appetite vs. risk tolerance, and ERM vs. internal audit. Key distinctions: Appetite is strategic (set by the board); Tolerance is tactical (acceptable deviation). ERM is a management function and cannot provide independent assurance — that is internal audit's role.

See also: 2.5.1 2.5.2 2.10.2
Section 2.5.1 Must-know

Developing a Risk Management Program

By the end of this card, you should be able to
Identify the key steps in developing an IT risk management program, explain what must be established before risk management planning begins, and describe the governance roles responsible for program direction.
Scenario

Devon Park is handed the mandate to build Meridian's new IT risk management program. His first instinct is to run a risk workshop. Priya Rao intercepts him in the corridor: 'Before you identify a single risk, you need to answer three questions — what is this program for, who owns it, and how will we know it is working?' Devon pauses. The board mandate says 'identify and manage IT risk' but sets no objectives, assigns no owner, and defines no metrics. The mandate is on the table. Priya asks him: 'Before you identify even one risk, what governance question must you be able to answer?' Devon needs to state what is missing before Priya marks the planning workpaper gap.

Developing a Risk Management Program
3 steps = program development sequence. Step 3 cannot begin until Steps 1 and 2 are complete.
How it works

Developing an IT risk management program requires a structured approach before any risk identification activity begins. The first step is establishing the program's purpose: determining why the enterprise needs the program, aligning that purpose with the overall strategy, and defining the key performance indicators (KPIs) and key risk indicators (KRIs) that will be used to evaluate whether the program is effective. Senior management, together with the board, sets the tone and goals. Without a defined purpose and measurement framework, risk identification produces a list that cannot be prioritized or reported in a way that drives decisions. The second step is assigning responsibility — naming an individual or team accountable for developing and implementing the program. A successful risk management program must be integrated across all organizational levels, with operational staff and board members participating in risk identification and in developing loss control strategies.

🧠 Mnemonic
Purpose → Owner → Integrate
Establish the Purpose (with KPIs/KRIs), assign the Owner (individual or team), then Integrate risk management across all levels — in that sequence.
At a glance
🎯

Step 1: Establish Purpose

What must be defined before risk ID begins?

  • Program purpose aligned to enterprise strategy
  • KPIs to measure program effectiveness
  • KRIs to signal emerging risk levels
  • Board and senior management tone-setting
👤

Step 2: Assign Responsibility

Who owns the risk management program?

  • Named individual or team designated
  • Accountable for development and implementation
  • Reports to senior management
  • Coordinates with board on risk appetite
🔗

Step 3: Integrate Across Levels

Who participates in the program beyond the risk team?

  • Operational staff (identify frontline risks)
  • Board members (set appetite, review reports)
  • Business unit managers (local risk owners)
  • IS auditors (provide independent assurance)
📊

Program Measurement

How is program effectiveness evaluated?

  • KPIs tracking program activities and outputs
  • KRIs signaling risk level changes
  • Regular reporting to board and management
  • Program review and continuous improvement
Try yourself

Meridian's board has asked the CRO to build a new IT risk management program from scratch. The CRO has already begun identifying risks. Devon reviews the mandate: it says 'identify and manage IT risk' but sets no objectives, assigns no owner, and defines no metrics. What is the single most critical governance prerequisite that was skipped — and why does skipping it make the risk identification work unreliable?

— Pause to recall —
Before identifying risks, the program must first establish its purpose — aligned to enterprise strategy — and define KPIs and KRIs that will measure program effectiveness. Without these, risk identification produces a list with no prioritization framework or performance benchmark.

Developing an IT risk management program follows a structured sequence. The first step is establishing the program's purpose — determining why the enterprise is creating the program, aligning that purpose with the enterprise's overall strategy, and defining the KPIs and KRIs that will measure program effectiveness. Senior management sets the tone and goals for the program with board input. Without this foundation, there is no framework for prioritizing identified risks or measuring whether the program is working. The second step is assigning responsibility — designating an individual or team accountable for developing and implementing the program. A successful program requires integration of risk management across all levels — operational staff and board members must participate in identifying risk and developing loss control strategies, not just the central risk team.

Why this matters: The CISA exam tests sequencing knowledge: purpose first, then responsibility assignment, then risk identification. A common trap presents a scenario where risk identification begins before purpose and KPIs are established — that is a program design flaw.
🎯
Exam tip

Sequencing is the key test topic for risk management program development. Purpose and KPI/KRI definition come before responsibility assignment, which comes before risk identification. The CISA exam will present out-of-order scenarios — identify what is missing at each stage.

See also: 2.5 2.5.2 2.10.2
Section 2.5.2 Must-know

Risk Management Life Cycle

By the end of this card, you should be able to
Describe the four steps of the IT risk management life cycle and explain what activities each step encompasses.
Scenario

Devon Park's team discovers thirty-two unregistered AWS accounts during a routine cloud inventory review. He sends an urgent all-stop directive to the cloud team: no new accounts until further notice. Janet Holloway reviews the incident report and stops him. 'You identified the risk. You jumped to response. What is the actual impact if any of those accounts were used maliciously?' Devon has no answer — no assessment was run. Janet looks at the lifecycle diagram on the whiteboard. The risk team went from step one directly to a response. She points to the gap and asks Devon: 'What step did you skip, and what question can you not now answer because you skipped it?'

Risk Management Life Cycle
4-segment wheel = 4 risk lifecycle steps. The wheel turns continuously — monitoring feeds back into identification.
How it works

The IT risk management life cycle is a four-step repeatable process that enterprises use to manage IT risk consistently and appropriately. Step 1 is IT Risk Identification: collecting data to identify information assets, the threats that could harm them, and the vulnerabilities those threats could exploit. Step 2 is IT Risk Assessment: analyzing identified risks by estimating the likelihood that a threat will materialize and the impact it would have, to prioritize risks for treatment. Step 3 is Risk Response and Mitigation: selecting and implementing countermeasures based on the assessed risk level — options include accepting, mitigating, transferring, or avoiding the risk. Step 4 is Risk and Control Monitoring and Reporting: continuously tracking residual risk and control effectiveness, and reporting results to management and the board. The cycle is continuous — monitoring outputs feed back into identification, ensuring that new risks are captured.

🧠 Mnemonic
I·A·R·M
Identify the risk, Assess its likelihood and impact, Respond with countermeasures, Monitor residual risk and report — the four steps of the IT risk management life cycle.
At a glance
🔎

Step 1: Identification

What is identified in step 1?

  • IT assets and information resources
  • Threats (circumstances that can cause harm)
  • Vulnerabilities (exploitable weaknesses)
  • Asset classification by criticality and sensitivity
📊

Step 2: Assessment

What is measured in step 2?

  • Likelihood of threat occurrence
  • Impact if threat materializes
  • Risk prioritization for treatment
  • Risk level relative to appetite and tolerance
🛡️

Step 3: Response

What are the risk response options?

  • Accept (residual within tolerance)
  • Mitigate (implement controls)
  • Transfer (insurance, outsourcing)
  • Avoid (discontinue the activity)
📈

Step 4: Monitor & Report

What does monitoring track?

  • Residual risk levels after treatment
  • Control effectiveness over time
  • New risks emerging from environment changes
  • Reporting to management and board
Try yourself

Meridian has identified thirty-two unregistered AWS accounts as an IT risk. The risk team immediately implements a cloud governance policy to block new account creation. Janet sends the finding back: 'Measure first, then decide.' Which specific step of the risk management life cycle was skipped, and what is the consequence of skipping it?

— Pause to recall —
The team skipped Risk Assessment — the step that analyzes likelihood and impact before selecting a response. Skipping assessment means the chosen response (blocking new accounts) may be disproportionate, insufficient, or misaligned with actual risk severity.

The IT risk management life cycle has four steps that must be executed in sequence as a repeatable cycle. Step 1 — IT Risk Identification — collects relevant data to identify information assets vulnerable to threats; threats are circumstances that can cause harm through destruction, disclosure, modification, or denial of service. Step 2 — IT Risk Assessment — analyzes identified risks for likelihood and impact, enabling prioritization. Step 3 — Risk Response and Mitigation — selects and implements countermeasures based on the assessed risk level, choosing from accept, mitigate, transfer, or avoid. Step 4 — Risk and Control Monitoring and Reporting — continuously tracks residual risk and control effectiveness, and reports to management and the board. Skipping assessment means the response is not grounded in evidence of actual severity.

Why this matters: The CISA exam frequently tests step sequencing. Identification comes before assessment; assessment comes before response. Skipping a step is a process control gap. The cycle then repeats — monitoring feeds back into identification.
🎯
Exam tip

The CISA exam tests sequencing: Identify → Assess → Respond → Monitor. Skipping assessment and jumping to response is the most common scenario-based trap. Also know: the cycle is continuous — monitoring feeds back into identification, making it a cycle not a linear process.

See also: 2.5 2.5.1 2.5.3
Section 2.5.3 Must-know

Risk Analysis Methods

By the end of this card, you should be able to
Compare qualitative, semiquantitative, and quantitative risk analysis methods, identify their respective advantages and limitations, and explain when each is most appropriate.
Scenario

Marcus Webb calls Devon Park into his office with three risk assessments on the table. The first is a hand-written 'medium' rating for a social engineering risk. The second is a scored matrix rating each vendor access risk from 1 to 15. The third is a spreadsheet showing ALE calculations for the MERIDIA-1 fraud exposure based on fifteen years of loss data. For each scenario — vague social engineering threat, vendor access risk, and $2M fraud exposure with 15 years of loss data — Devon must identify which risk analysis method was used and explain why it is or is not the most appropriate choice before anyone else in the room speaks.

Risk Analysis Methods
3 assay stations = 3 risk analysis methods. Match the station to the data you have — quantitative requires the ledger.
How it works

Risk analysis translates identified risks into prioritized decisions. Three methods are available, and each is appropriate in different circumstances. Qualitative risk analysis uses descriptive terms — such as high, medium, or low — to characterize likelihood and impact. It is the simplest and most widely used method, particularly when risk levels are low or when reliable numeric data is unavailable. Its limitation is subjectivity: different analysts may apply ratings inconsistently. Semiquantitative analysis addresses this by assigning numeric values to qualitative ratings, enabling more consistent scoring and aggregation. Quantitative analysis uses probability estimates and financial impact data to calculate numeric risk values — most commonly the Annual Loss Expectancy (ALE), calculated as Single Loss Expectancy (SLE) multiplied by the Annualized Rate of Occurrence (ARO). Quantitative analysis is most appropriate for high-value risks where a monetary business case for control investment must be made, and it requires reliable historical loss data. Both ERM risk analysis in this domain and IS audit risk analysis use the same likelihood-and-impact thinking — the difference is that audit risk analysis applies it to planning audit work, while here it is applied to enterprise risk management decisions.

🧠 Mnemonic
Q·SQ·Q = Words → Numbers-on-Words → Pure Numbers
Qualitative uses words, Semiquantitative maps words to numbers, Quantitative uses pure numeric probability and monetary impact — choose the method that matches your data quality.
At a glance
🔤

Qualitative

When is qualitative most appropriate?

  • Low risk levels
  • Insufficient historical data
  • Initial screening of risks
  • Simple/fast risk ranking needed
🔢

Semiquantitative

What does semiquantitative add?

  • Numeric weights to qualitative ratings
  • Consistent scoring across multiple assessors
  • Aggregation of mixed risk ratings
  • Middle ground when full data unavailable
💰

Quantitative

What does quantitative analysis require?

  • Reliable historical loss data
  • ALE = SLE × ARO calculation
  • Monetary impact estimates
  • Appropriate for high-value/high-frequency risks
🧮

ALE Formula

How is ALE calculated?

  • ALE = Single Loss Expectancy × Annualized Rate of Occurrence
  • SLE = Asset value × Exposure factor
  • ARO = Estimated frequency per year
  • ALE = annual expected monetary loss from a risk
Try yourself

Meridian's risk team is analyzing three risks: (1) a vague threat of data leakage with no historical data, (2) a vendor access risk they want to score consistently across teams, and (3) a potential $2M fraud exposure with actuarial data available. Which risk analysis method fits each scenario best, and why?

— Pause to recall —
(1) Qualitative — subjective high/medium/low rating suitable when historical data is unavailable; (2) Semiquantitative — numeric weighting of qualitative levels enables consistency across teams; (3) Quantitative — monetary and probabilistic data makes a full quantitative ALE calculation appropriate.

Three risk analysis methods address different levels of data availability and required rigor. Qualitative methods use descriptive rankings (high, medium, low) based on checklists, interviews, and subjective judgment. They are the simplest, most widely used, and most appropriate when risk levels are low or data is insufficient for numeric analysis. Their limitation is lack of rigor for management decision-making. Semiquantitative methods assign numeric weights to qualitative rankings (e.g., high=5, medium=3, low=1), enabling consistent scoring and aggregation across multiple assessors, while avoiding the need for full actuarial data. Quantitative methods use numeric probability and monetary impact — typically Annual Loss Expectancy (ALE = SLE × ARO) — to produce dollar-denominated risk estimates. They require reliable historical data and are most appropriate for high-value risks where a business case for control investment must be made.

Why this matters: The CISA exam frequently tests which method to apply in a given scenario. Know ALE = SLE × ARO for quantitative analysis. Know that qualitative is appropriate when data is scarce; quantitative requires actuarial data.
🎯
Exam tip

Know all three methods and when to apply each. The CISA exam will test the ALE formula: ALE = SLE × ARO. Qualitative is most common but least rigorous. Quantitative requires data. The exam will also ask which method is 'most appropriate' given the scenario — match the method to the data available.

📰Real World

Equifax 2017: a known Apache Struts vulnerability (CVE-2017-5638) went unpatched for approximately 66 days — announced March 7, breach entry May 13. The attack itself then ran for 76 days undetected (May 13–July 30). The risk had been identified, assessed, and a mitigation defined (patch within 48 hours), yet the vulnerable ACIS portal was never patched. The root cause was a stale asset inventory that prevented scans from finding the exposed system. The House Oversight Committee's 2018 post-mortem and a concurrent GAO audit both cited the lack of a comprehensive IT asset inventory and inadequate vulnerability scanning as root causes. Identification without monitoring does not work.

See also: 2.5 2.5.2 1.3.6
Section 2.6 Must-know

Data Privacy Program and Principles

By the end of this card, you should be able to
Describe the purpose of a data privacy governance program and identify the five core privacy management practice areas that support it.
Scenario

Maya Vargas presents Meridian's privacy governance overview to Janet Holloway. The slide deck has two panels: the privacy policy summary and a list of staff training sessions conducted last year. Janet asks about the three mortgage insurance partners who receive customer data. Maya pulls up a blank slide — vendor privacy monitoring is not covered. Janet adds two more gaps to her notes: no privacy audit plan, no incident response runbook. 'A policy and some training sessions are not a program,' Janet says. She has identified two pillars present — policy and training. 'Name the three that are missing and tell me which one creates the most immediate compliance exposure with the mortgage insurance partners.'

Data Privacy Program and Principles
5 banners = 5 privacy program pillars. Dark banners signal gaps — a program missing any pillar cannot demonstrate due care.
How it works

A data privacy governance program is a structured set of policies, controls, and activities that ensures all personal information held by the enterprise is identified, protected, and managed in compliance with applicable legal requirements and data subject rights. Personal data is broadly defined as any information that relates to an identifiable individual. Five practice areas form the operational foundation of the program. Privacy roles and responsibilities must be clearly assigned to designate ownership of data handling decisions. Privacy training and awareness must be provided to all personnel who handle personal information. Vendor and third-party management must include oversight of how partners and service providers handle personal data shared with them. A privacy audit process must be developed and executed to evaluate compliance with privacy policies, legal requirements, and controls. A privacy incident management capability must exist to detect, respond to, and report privacy violations. All five practice areas must be present and functioning for the program to demonstrate due care.

🧠 Mnemonic
R·T·V·A·I
Roles, Training, Vendor management, Audit process, Incident management — the five pillars of a data privacy governance program.
At a glance
👤

Privacy Roles & Responsibilities

What must be assigned?

  • Data ownership for each category of personal data
  • Privacy officer designation
  • Departmental privacy champions
  • Accountability for data subject rights fulfillment
📚

Privacy Training & Awareness

Who must be trained?

  • All staff handling personal information
  • IT teams processing personal data
  • Vendors with data access
  • Regular refresh training as laws change
🤝

Vendor/Third-Party Management

What does vendor management require?

  • Privacy requirements in vendor contracts
  • Monitoring vendor data handling practices
  • Due diligence before data sharing
  • Audit rights for key data processors
🔍

Privacy Audit & Incident Management

What do audit and incident management cover?

  • Annual privacy compliance audits
  • Privacy impact assessments for new systems
  • Incident detection and response procedures
  • Breach notification compliance
Try yourself

Meridian processes customer loan data and shares it with three mortgage insurance partners. The IS auditor asks for the privacy governance program documentation. The privacy officer presents a privacy policy and a data subject rights procedure, but there is no vendor management protocol, no annual privacy audit plan, and no privacy incident response process. Which of the five privacy management practice areas are missing?

— Pause to recall —
Three of the five practice areas are missing: Vendor/Third-Party Management (no protocol for the mortgage partners), Privacy Audit Process (no annual audit plan), and Privacy Incident Management (no response process). Only Privacy Roles/Responsibilities and the policy (covering Training/Awareness partially) are addressed.

A data privacy governance program ensures that all personal information within the enterprise is identified and managed according to legal requirements, governing policies, and data subject rights. Personal data is generally any information that relates to an identifiable person. Five privacy management practice areas support the program: establishing privacy roles and responsibilities for all data-handling activities; fostering privacy training and awareness communications; monitoring vendor and third-party management practices to ensure partners handle personal data appropriately; developing a privacy audit process; and implementing a privacy incident management capability. Enterprises must design, implement, and operate controls that protect personal information throughout its full lifecycle — from collection through destruction.

Why this matters: Privacy governance is a high-frequency CISA topic. The exam tests whether candidates can identify all five practice areas and recognize that vendor management and incident management are required components — not optional additions.
🎯
Exam tip

The CISA exam tests all five privacy program practice areas. Vendor management is the most commonly missing element in scenario questions — watch for scenarios where the enterprise has a privacy policy but no vendor oversight. Incident management is also frequently omitted. Both are required for a complete program.

See also: 2.6.1 2.6.2 2.7
Section 2.6.1 Must-know

Privacy Documentation

By the end of this card, you should be able to
Identify the types of documentation required for an effective privacy governance program and explain why documentation is essential for demonstrating due care and legal compliance.
Scenario

Alex Chen requests Meridian's privacy documentation package during the annual privacy audit. Maya Vargas provides the internal data handling policy, the data subject rights procedure, and the vendor data processing agreement template. Alex then checks the public website. The mortgage product privacy notice still references the old loan categories from two years ago. Alex also notes that the website's EU-facing page has no GDPR-specific disclosure. Two well-maintained internal documents, two outdated external ones. Alex has four documents in front of him. Before marking the finding, he must answer: which of the four documents are deficient, and is this a policy gap, a process gap, or a documentation gap?

Privacy Documentation
2 documentation sides = internal and external. Both must be current — a polished internal policy cannot remedy a non-compliant privacy notice.
How it works

An effective data privacy governance program cannot function without comprehensive documentation. Documentation is the primary mechanism through which the enterprise demonstrates its data management practices, meets legal obligations, builds trust with customers and regulators, and shows a standard of due care. Privacy documentation requirements span two directions: inward-facing documentation — internal policies, procedures, standards, and operational guidelines — must be aligned with applicable laws, regulations, and contractual commitments. Outward-facing documentation — external privacy notices, website disclosures, social media statements, and partner-facing terms — must equally reflect current legal requirements and enterprise practices. Both sets of documents must be regularly reviewed and evaluated for continued alignment. Any industry standards the enterprise has adopted must be visibly reflected in its documentation. The overall breadth and depth of privacy documentation must meet or exceed the requirements imposed by all applicable laws and regulations.

🧠 Mnemonic
Internal + External = Complete
Privacy documentation is only complete when both Internal documents (policies, procedures) and External notices (website, partner terms) are current and aligned with applicable law.
At a glance
📋

Internal Documentation

What internal privacy documents must exist?

  • Data privacy policy
  • Data handling procedures
  • Data subject rights procedures
  • Vendor/partner data processing agreements
🌐

External Documentation

What external documents must be current?

  • Customer-facing privacy notices
  • Website privacy disclosures
  • Social media privacy statements
  • EU/GDPR-specific disclosures where applicable
🔄

Documentation Currency

When must documentation be updated?

  • When new products/services are launched
  • When applicable laws change
  • When data handling practices change
  • During regular periodic reviews
🔍

IS Auditor's Check

What does the auditor verify?

  • Alignment of internal and external docs with law
  • Both inward and outward-facing docs reviewed regularly
  • Industry standards reflected in practices
  • Breadth meets or exceeds legal minimums
Try yourself

Meridian's privacy officer shows the IS auditor a well-written internal privacy policy. However, the customer-facing website privacy notice has not been updated since a new loan product was launched, and Meridian's mortgage partners have not received updated privacy terms. Which side of the privacy documentation framework is deficient — internal or external — and what specific regulatory risk does an outdated EU-facing page create?

— Pause to recall —
Two gaps: external privacy notice not updated for the new product, and partner privacy terms not refreshed. Documentation is central because it is the primary mechanism for demonstrating due care, meeting legal obligations, building stakeholder trust, and enabling compliance verification. Inward-facing documents (internal policies) and outward-facing documents (privacy notices, websites) must both be kept current.

An effective privacy governance program requires comprehensive documentation across multiple dimensions. Internal policies and procedures must be aligned with applicable privacy laws, regulations, and contractual obligations. External privacy notices, website disclosures, social media pages, and related outward-facing documents must also reflect current legal requirements. Both inward-facing and outward-facing documentation must be regularly reviewed and updated. Any required or enterprise-adopted industry standards must be reflected in documentation and practices. The breadth and depth of the privacy program documentation must meet or exceed legal requirements. Documentation serves four purposes: demonstrating the enterprise's data management practices and objectives; meeting legal documentation obligations; building trust with stakeholders; and demonstrating due care in program management.

Why this matters: The CISA exam tests whether candidates recognize that documentation must cover both internal (policy/procedure) and external (privacy notice/website) dimensions. Outdated external notices are a compliance failure regardless of how good internal policies are.
🎯
Exam tip

Privacy documentation questions on the CISA exam test both internal and external coverage. An enterprise that has perfect internal policies but outdated external privacy notices is non-compliant. Also note: documentation is specifically required to demonstrate 'due care' — without it, even good practices cannot be proven to regulators.

See also: 2.6 2.6.2 2.7.2
Section 2.6.2 Must-know

Audit Process

By the end of this card, you should be able to
Explain the purpose and scope of data privacy audits, identify what a privacy audit framework must address, and describe how privacy audits demonstrate due care.
Scenario

Janet Holloway reviews Meridian's annual privacy audit scope with Alex Chen. Last year's audit covered only GLBA data security control testing. Janet circles four items on the planning whiteboard that were not addressed: whether the privacy program is actually effective, whether the new mobile app was built with privacy-by-design, whether AWS logging captures privacy incidents, and whether staff know how to report a privacy breach. Janet has the current GLBA review scope on the screen. She lists what it covers and what it does not. Before she tells Alex what is missing, he asks: 'If you had to audit privacy governance rather than data security — what four dimensions would your scope cover that this review ignores?'

Audit Process
4 audit tablets = 4 privacy audit dimensions. A compliance check fills one tablet — a complete audit fills all four.
How it works

Data privacy audits are structured evaluations that verify an enterprise's privacy policies, procedures, and practices comply with applicable laws, regulations, and internal standards. They also identify failures in enterprise and information architecture that prevent privacy from being supported by design — an architecture gap that creates business risk even when compliance is technically met. A comprehensive privacy audit framework must address four areas: the effectiveness of the overall privacy management program; the level of compliance with applicable privacy laws, policies, and regulations; whether enterprise architecture and information architecture adequately support privacy principles; and whether privacy incident detection and response capabilities are functioning. Annual data protection audits are a compliance baseline requirement. Conducting privacy audits demonstrates a standard of due care to regulators, customers, and the board.

🧠 Mnemonic
E·C·A·I
Effectiveness of the program, Compliance with laws/policies, Architecture supporting privacy, Incident detection and response — the four dimensions of a complete privacy audit framework.
At a glance
📊

Program Effectiveness

What does program effectiveness assessment cover?

  • Privacy management program goals vs. outcomes
  • Privacy training completion and impact
  • Data subject rights fulfillment rates
  • Vendor privacy compliance performance

Compliance

What compliance dimensions are tested?

  • Applicable privacy laws (GDPR, GLBA, etc.)
  • Internal privacy policies and procedures
  • Industry standards adoption
  • Regulatory reporting obligations met
🏗️

Architecture Review

What does the architecture assessment check?

  • Privacy-by-design in new systems
  • Data flow and storage architecture
  • Adequate controls for personal data protection
  • Failure points that create business risk
🚨

Incident Management

What does incident capability review cover?

  • Detection mechanisms for privacy events
  • Response procedures and runbooks
  • Breach notification timelines and processes
  • Reporting capability to regulators and data subjects
Try yourself

Meridian conducts an annual GLBA compliance review that covers data security controls but does not assess whether the data privacy management program is effective, whether privacy-by-design principles are embedded in new systems, or whether privacy incidents are being properly managed. As the IS auditor, what key elements of a privacy audit framework are missing?

— Pause to recall —
Three elements are missing from the audit framework: evaluation of privacy management program effectiveness, assessment of whether enterprise architecture supports privacy-by-design, and review of privacy incident detection and response capability. A compliance review of data security controls alone does not constitute a full privacy audit.

Data privacy audits, assessments, testing, and compliance reviews exist to verify that the enterprise's privacy policies, procedures, practices, and standards comply with applicable laws, regulations, and internal requirements. They also serve a broader purpose: identifying failures in enterprise architecture and information architecture that prevent privacy from being supported by design — a risk dimension beyond compliance. A privacy audit framework should establish monitoring and evaluation of four areas: the effectiveness of the data privacy management program; the level of compliance with applicable privacy policies, laws, and regulations; whether the enterprise architecture adequately supports privacy principles; and whether the privacy incident detection and response capability is functioning. Annual data protection audits are an essential compliance element. Conducting privacy audits demonstrates a standard of due care.

Why this matters: The CISA exam tests whether candidates recognize that privacy audits go beyond compliance checking to include program effectiveness evaluation, architecture review, and incident management assessment. A narrow compliance check is not a complete privacy audit.
🎯
Exam tip

The CISA exam tests whether candidates know that a privacy audit is broader than a compliance check. The four dimensions — program effectiveness, compliance, architecture, and incident management — must all be addressed. Also know: annual data protection audits are described as 'essential' — not optional — for compliance demonstration.

📰Real World

Meta was fined €1.2 billion by Ireland's Data Protection Commission on May 22, 2023 — the largest GDPR fine ever issued — for transfers of EU user personal data to the US that failed to meet the standard set by the CJEU's Schrems II judgment. Privacy Shield had been invalidated; Meta relied on Standard Contractual Clauses, but the DPC (guided by an EDPB binding decision) found those SCCs did not adequately protect EU users from US government surveillance under FISA 702. Transborder data flow is a specific focus of Domain 2 — not an edge case.

See also: 2.6 2.6.1 2.7
Section 2.7 Must-know

Data Governance and Classification

By the end of this card, you should be able to
Explain how data governance establishes accountability for information assets and how classification schemes drive appropriate access and protection controls.
Scenario

Alex Chen opens Meridian Corp's data asset register and finds three hundred tables with no owner listed. Priya Rao shakes her head. 'Before you can protect data, you have to know what you have and how sensitive it is.' The CISO has the classification policy. Alex opens the database registry — no ownership entries, no sensitivity tags. The policy lists four tiers: public, internal, confidential, restricted. But without something else, the tiers are meaningless. Alex needs to name what is missing before advising the CISO on remediation priority.

Data Governance and Classification
4-step hierarchy = governance foundation. ICOA: Inventory → Classify → Own → Control. Classification determines every downstream protection decision.
How it works

Data governance establishes who is accountable for information assets and ensures those assets are appropriately protected throughout their lifecycle. The first step is building a comprehensive inventory of all information assets—databases, files, applications, and physical records. Once inventoried, assets are classified by sensitivity and criticality: for example, public, internal, confidential, and restricted. Classification drives ownership assignment: each class of asset is assigned a data owner responsible for defining access rules, retention schedules, and handling requirements. Access controls, encryption standards, and monitoring are then calibrated to the classification level. The inventory and classification must be reviewed regularly because data sensitivity can change as business context evolves.

🧠 Mnemonic
ICOA
Inventory → Classify → Ownership → Access control — four steps that turn raw data into governed assets.
At a glance
📋

Asset Inventory

Why must organizations inventory data assets?

  • Foundation for all governance decisions
  • Identifies unknown or shadow data
  • Required for classification to begin
  • Must be reviewed and updated regularly
🏷️

Classification Scheme

What does data classification achieve?

  • Assigns sensitivity levels (e.g., public → restricted)
  • Determines required protection strength
  • Links data type to control requirements
  • Supports regulatory compliance mapping
👤

Data Ownership

Who is accountable for data protection decisions?

  • Data owner (business unit, not IT)
  • Defines access rules and handling standards
  • Accountable for classification accuracy
  • Approves access requests for their data
🔒

Access Controls

How does classification drive access control?

  • Higher classification = stricter access rules
  • Need-to-know principle applied per class
  • Encryption requirements tied to class
  • Monitoring intensity scales with sensitivity
Try yourself

Meridian Corp's new CISO finds that some database tables have no documented owner and access permissions vary widely. The data governance team has a classification policy in place but no inventory mapping. What is the foundational data governance step that makes a classification policy operationally useless without it?

— Pause to recall —
A complete data inventory. Without an inventory that maps every information asset, a classification policy has nothing to act on — there is no way to assign sensitivity tiers, designate owners, or apply controls to assets that have not been identified and recorded.

Effective data governance requires building a complete inventory of information assets, then classifying each asset by its sensitivity and criticality to business objectives. Classification drives the assignment of data owners who are accountable for each asset, and those owners define the access controls appropriate to that classification level. Without classification, protection decisions are ad hoc, access privileges grow unchecked, and auditors cannot assess whether controls match risk. The result is both a governance gap and a regulatory exposure.

Why this matters: CISA exams test the sequence: inventory → classify → assign ownership → apply controls. Classification is the foundation for access control, data loss prevention, and regulatory compliance decisions.
🎯
Exam tip

Data owners are business stakeholders—not IT staff—who are accountable for their data's classification and protection. The IS auditor verifies that owners have defined appropriate rules, not that IT has set them unilaterally.

See also: 2.7.1 2.6 2.8.4
Section 2.7.1 Must-know

Data Inventory and Classification

By the end of this card, you should be able to
Explain the role of a data inventory in privacy impact assessments, define the key attributes of an effective data inventory, and describe the governance relationship between privacy and data governance teams.
Scenario

Alex Chen begins scoping Meridian's PIA for the new mortgage origination system. The privacy officer hands over an inventory — three pages listing customer name, income, and credit data. Alex reviews the system's architecture diagram and identifies four additional data streams not in the inventory: geolocation from the mobile app, session behavior logs from the web portal, device fingerprints, and a marketing analytics feed. The PIA cannot proceed. Alex has the privacy officer's inventory on one side of the desk and a list of four unaccounted data streams — app location metadata, session behavior logs, device fingerprints, and marketing analytics — on the other. The PIA is scheduled to start tomorrow. Alex must decide: proceed with the partial inventory and flag gaps, or halt the PIA until the inventory is complete?

Data Inventory and Classification
4 empty shelves = 4 unaccounted data streams. A PIA built on incomplete inventory produces incomplete conclusions.
How it works

A data inventory is a structured registry of all personal and sensitive data held by the enterprise: what types of information are collected, how each type is used, where it is stored, and what compliance requirements apply to each category. The data inventory is the essential starting point for a Privacy Impact Assessment because a PIA's conclusions — about control adequacy and vulnerability — are only as complete as the inventory it is built on. For this reason, the inventory must be enterprisewide in scope and kept current. Its content aligns closely with a metadata repository, which data governance typically manages. Privacy and data governance teams should collaborate in maintaining the inventory to ensure it captures not only data that data subjects deliberately provide, but also personal data that is unintentionally captured, used, or stored by enterprise applications and third-party integrations. Gaps in the inventory translate directly into gaps in the PIA and, by extension, into unidentified control deficiencies.

🧠 Mnemonic
C·S·A·U
Covers all data types, Scope is enterprisewide, Aligned with metadata repository, Unintentional capture included — the four attributes of an effective data inventory.
At a glance
📚

Inventory Purpose

Why is the data inventory critical for a PIA?

  • PIA findings are only as complete as the inventory
  • Identifies all personal data subject to controls
  • Reveals vulnerable data previously unknown
  • Enables accurate control adequacy assessment
📋

Inventory Content

What must the inventory include?

  • Types of personal information collected
  • Compliance requirements per data type
  • Data locations and storage systems
  • Data flows to vendors and partners
🌐

Scope Requirements

What scope is required?

  • Enterprisewide — no business unit excluded
  • Current — regularly updated
  • Includes deliberately and unintentionally captured data
  • Covers third-party and partner data flows
🤝

Governance Relationship

Who manages the inventory?

  • Privacy team owns compliance dimension
  • Data governance team owns metadata repository
  • Both collaborate on inventory maintenance
  • Ensures neither team's scope creates a blind spot
Try yourself

Meridian's IS auditor is preparing to conduct a Privacy Impact Assessment (PIA) for a new mortgage origination system. The privacy officer provides a partial inventory covering only customer-provided data. The inventory excludes behavioral data captured by the app, location metadata, and data from a marketing analytics partner. Why is a partial inventory insufficient for a PIA, and what must the inventory scope cover?

— Pause to recall —
A partial inventory is insufficient because the PIA must evaluate controls and vulnerabilities across ALL sensitive data — the inventory must be enterprisewide and up to date. The scope must cover personal information provided by data subjects and data unintentionally captured, including behavioral data, metadata, and third-party data inputs.

A fully specified and populated data inventory and classification is the most important resource for conducting a Privacy Impact Assessment, because the PIA's conclusions about control adequacy and vulnerabilities depend on the master inventory being complete. The inventory must include the types of personal information collected, the information necessary to ensure privacy compliance, and it must be enterprisewide in scope and kept current. The content of the data inventory for sensitive information aligns with a metadata repository — which is implemented and managed by data governance. Privacy and data governance teams should collaboratively manage the inventory to ensure it captures not only deliberately collected personal data but also personal data that is unintentionally captured, used, or stored by enterprise systems. Gaps in the inventory create corresponding gaps in PIA conclusions.

Why this matters: The CISA exam tests whether candidates know that a PIA depends on a complete, current, enterprisewide data inventory. Partial inventories produce incomplete PIAs. The governance relationship between privacy and data governance teams is also testable.
🎯
Exam tip

The CISA exam tests that a PIA requires a complete, enterprisewide, current data inventory. Partial inventories produce partial PIAs — a finding in itself. Also know: the inventory should cover unintentionally captured data (behavioral logs, metadata, device data) not just deliberately collected personal information.

See also: 2.7 2.6 2.7.2
Section 2.7.2 Must-know

Legal Purpose, Consent and Legitimate Interest

By the end of this card, you should be able to
Define legal purpose, consent, and legitimate interest as data processing bases, explain what each requires, and identify why these concepts are critical for privacy engineers.
Scenario

Maya Vargas receives an email from Meridian's marketing director requesting access to the mortgage application database to build a targeted deposit product campaign. Maya reads the original data collection notice: 'Data collected for loan origination and credit assessment purposes only.' She marks the request as requiring a legal review — the marketing use does not align with the documented legal purpose, no marketing consent was obtained at collection, and legitimate interest has not been assessed for this specific use. The marketing request is on the table: use mortgage application data for targeted financial product ads. The original collection purpose was 'loan origination processing.' Maya has identified the issue. Before she forwards the finding to Alex, he asks: 'Which of the three lawful processing gates could this use pass through — and does it pass through any of them?'

Legal Purpose, Consent and Legitimate Interest
3 gates = 3 lawful processing bases. Personal data may only pass through one — the gate must be documented before the data moves.
How it works

Legal purpose, consent, and legitimate interest are the three most commonly applied lawful bases for processing personal data under privacy law. Legal purpose requires that data collection and use have a specific, explicit, and legitimate aim communicated to data subjects. Purpose limitation — a foundational privacy principle — means data collected for one purpose cannot be repurposed without a new lawful basis. Consent is the data subject's explicit, informed, and voluntary agreement to a specific processing activity; it must be withdrawable at any time. Legitimate interest allows processing without explicit consent where the enterprise has a genuine and proportionate interest that does not override the rights of data subjects. This balance must be evaluated and documented. Privacy engineers must ensure systems and data flows are designed to operate within the applicable processing basis for each category of data and each distinct use.

🧠 Mnemonic
L·C·LI = The three lawful gates
Legal purpose, Consent, Legitimate Interest — every data processing activity must pass through one of these three lawful gates before it can proceed.
At a glance
⚖️

Legal Purpose

What does legal purpose require?

  • Specific, explicit, and legitimate processing aim
  • Purpose communicated to data subjects at collection
  • Purpose limitation — no unauthorized repurposing
  • New legal basis required for new data uses

Consent

What makes consent valid?

  • Explicit and informed agreement
  • Voluntary — not coerced
  • Specific to the stated purpose
  • Withdrawable at any time by data subject
🏛️

Legitimate Interest

When can legitimate interest be used?

  • Genuine organizational interest exists
  • Interest proportionate to data subject's rights
  • Rights of data subject do not override interest
  • Must be assessed and documented before use
⚙️

Privacy Engineering Implications

Why do privacy engineers need to know these?

  • Systems must enforce the applicable processing basis
  • Data flows must be designed for purpose limitation
  • Consent management systems must be built in
  • Legitimate interest assessments must be documented in architecture
Try yourself

Meridian's marketing team wants to use customer mortgage application data to send targeted financial product advertisements. The privacy team identifies that the data was collected under a legal purpose of 'loan origination processing.' As the IS auditor reviewing this planned use, what three processing basis questions must be answered before this new use can proceed?

— Pause to recall —
Three questions: (1) Does a legal purpose exist for the new use (advertising vs. loan processing)? (2) Was consent obtained for marketing use specifically? (3) Can Meridian demonstrate legitimate interest that outweighs the data subject's rights? Repurposing loan data for marketing likely requires fresh consent or a new legal basis.

Legal purpose, consent, and legitimate interest are the three most commonly used lawful bases for processing personal data under privacy law — especially GDPR. Legal purpose requires that when an enterprise collects and uses personal information, it must describe a specific, explicit, and legitimate purpose for processing; purpose limitation means data collected for one purpose (loan origination) may not be freely repurposed for another (marketing) without a new lawful basis. Consent requires that data subjects give explicit, informed, voluntary, and withdrawable agreement before their data is processed for the specified purpose. Legitimate interest is a broader processing basis — the enterprise may process data without consent if a genuine and proportionate organizational interest exists that does not override data subject rights; this basis must be carefully evaluated and documented. These concepts are especially critical for privacy engineers, because systems, applications, and procedures must be designed to conform to the applicable processing basis for each data use.

Why this matters: The CISA exam tests whether candidates recognize that each data processing activity must have a documented lawful basis, and that repurposing data for a new use without a new basis is a privacy violation.
🎯
Exam tip

The CISA exam tests recognition of the three processing bases and when each applies. The most common scenario trap involves data collected for one purpose being repurposed for another — this requires a new lawful basis. Remember: GDPR has more processing bases than these three, but these are the most commonly tested.

See also: 2.7 2.7.1 2.6
Section 2.7.3 Memorize

Data Subject Rights

By the end of this card, you should be able to
Identify the rights individuals hold over their personal data and explain the two NIST Privacy Framework functions that support those rights.
Scenario

Maya Vargas drops a 12-page regulatory notice on Alex Chen's desk: a customer has requested deletion of all personal data under the bank's privacy policy. Alex checks the customer data platform and finds no automated subject-access workflow — requests are handled manually via email. The NIST Privacy Framework's Control-P function requires data processing management granular enough to honor such requests. Communicate-P requires that customers understand their rights. Neither function is implemented. Before Alex marks the gaps, Maya asks him: 'If Meridian can process a deletion request but cannot prove to the customer that it has been done — which NIST function is missing?'

Data Subject Rights
Two windows = two NIST functions. Control-P manages the data flow. Communicate-P tells the individual about it.
How it works

Data subject rights are the legal and regulatory rights individuals hold over personal information that an organization collects, stores, transmits, or otherwise processes. Privacy engineers must identify, document, and honor these rights. The NIST Privacy Framework provides two functions that directly support data subject rights. Control-P focuses on developing and implementing activities that allow data to be processed with sufficient granularity to manage privacy risk — covering data processing policies and procedures, data processing management, and disassociated processing techniques such as data minimization. Communicate-P focuses on ensuring that both enterprises and individuals have a reliable, transparent understanding of how data is processed and the associated privacy risks, enabling a meaningful dialog about data processing methods and associated privacy risk. Together, Control-P and Communicate-P support data subject rights such as the right to access their own associated personal information. IS auditors assess whether both functions are implemented and whether the organization can actually fulfill subject-access and deletion requests within required timeframes.

🧠 Mnemonic
C·C Rights
Control-P = Control what happens to the data. Communicate-P = Communicate it to the individual. Both 'C's are needed for data subject rights.
At a glance
🎛️

Control-P Function

What does Control-P enable?

  • Granular data processing management
  • Data processing policies and procedures
  • Data processing management
  • Disassociated processing / data minimization
💬

Communicate-P Function

What does Communicate-P enable?

  • Transparent understanding of data processing
  • Reliable communication of privacy risk
  • Informed individual consent and dialog
  • Awareness of data processing methods
🧑‍⚖️

Data Subject Rights Covered

What individual rights do these functions support?

  • Right to access personal data
  • Right to correct / rectify data
  • Right to access their own associated personal information
  • Right to understand and engage in dialog about data processing methods and privacy risk
🔍

Auditor's Assessment

What does the IS auditor check for data subject rights?

  • Both Control-P and Communicate-P are implemented
  • Subject-access workflows exist and are tested
  • Requests can be fulfilled within regulatory timeframes
  • Privacy notices accurately describe processing
Try yourself

Meridian Corp's customer data platform handles access, correction, and deletion requests manually via email. Alex Chen identifies two NIST Privacy Framework functions as absent from Meridian's implementation. Which two functions are missing, and what does each require an organization to be able to do?

— Pause to recall —
Control-P enables granular data processing management so individuals can exercise rights over their data. Communicate-P ensures individuals understand how their data is processed and can engage in dialog about privacy risk.

Data subject rights are the rights individuals hold over personal information collected, stored, or processed about them. The NIST Privacy Framework identifies two functions specifically supporting these rights. Control-P covers the development and implementation of activities that let enterprises or individuals process data with sufficient granularity to manage privacy risk — this includes data processing policies and procedures, data processing management, and disassociated processing. Communicate-P covers activities that enable enterprises and individuals to have a reliable understanding and engage in a dialog about data processing methods and associated privacy risk — this includes transparency and awareness mechanisms so individuals know what is done with their data. Together, these functions support data subject rights such as the right to access their own associated personal information.

Why this matters: CISA exams test the NIST Privacy Framework functions in the context of privacy governance. Candidates must know that Control-P and Communicate-P are distinct functions and that data subject rights span both — not just disclosure.
🎯
Exam tip

Questions may describe a scenario where an organization has a privacy policy but no operational process for honoring data access or deletion requests. The correct answer identifies the absence of both Control-P controls (processing management) and Communicate-P controls (transparency and dialog) as the gaps — neither function is more primary than the other. A common wrong answer focuses exclusively on one function while ignoring the other. Both must be present for effective data subject rights support.

📰Real World

In 2017 Equifax suffered a breach of approximately 147 million records. The post-incident Senate Permanent Subcommittee on Investigations report (March 2019) found that Equifax lacked a comprehensive IT asset inventory — the asset catalog could not identify where Apache Struts (and by extension sensitive consumer data) resided on the network, directly enabling the breach. Classification is not paperwork — it is the foundation of every other control.

See also: 2.7 2.6.1 2.6.2
Section 2.8 Good-to-know

IT Resource Management

By the end of this card, you should be able to
Explain the IS auditor's role in evaluating IT resource management, distinguish financial from nonfinancial IT investment benefits, and describe the concept of opportunity cost in resource allocation.
Scenario

Marcus Webb's capital allocation spreadsheet for next year shows three IT investment options ranked purely by financial ROI. Sarah Lin notes that the lowest-ranked option — an API modernization project — will reduce the time to onboard a new banking partner from six weeks to two days. Marcus shrugs: 'I can not put a dollar value on that.' Alex Chen reviews the investment analysis workpaper. The $700K financial case is fully documented. The satisfaction and cycle-time claims have no numbers attached. Marcus Webb has already ranked this project third out of five. Before Alex writes the finding, he must decide: is the absence of quantified nonfinancial benefits a governance gap — or just an analytical best practice?

IT Resource Management
2 columns = financial and nonfinancial benefits. Full ROI analysis requires both — converting the right column to numbers where feasible.
How it works

IT resource management addresses the challenge of deploying limited resources — people, capital, and technology — to achieve enterprise goals while managing the opportunity costs that arise when one investment forecloses another. When evaluating IT investments, enterprises traditionally focused on financial returns: cost reductions and revenue increases. Contemporary practice recognizes that IT investments also deliver significant nonfinancial benefits, including operational improvements, achievement of strategic objectives, and enhanced customer satisfaction. Best practice recommends that where feasible, these nonfinancial benefits be made tangible by converting them to monetary units using modeling algorithms — so they can be compared on equal footing with financial benefits in investment decisions. The IS auditor evaluates whether the enterprise's investment analysis captures both financial and nonfinancial dimensions, and whether allocation decisions are positioned to maximize enterprise value from limited resources.

🧠 Mnemonic
Financial + Nonfinancial = Full ROI
A complete IT investment analysis captures both Financial benefits (cost, revenue) and Nonfinancial benefits (operational, strategic, satisfaction) — converting the latter to monetary terms where feasible.
At a glance
💰

Financial Benefits

What financial benefits does IT investment deliver?

  • Cost reductions (process automation, headcount)
  • Revenue increases (new products, faster delivery)
  • Asset efficiency improvements
  • Directly quantifiable in monetary terms

Nonfinancial Benefits

What nonfinancial benefits must be captured?

  • Operational improvements (cycle time, quality)
  • Strategic objective achievement
  • Customer satisfaction improvements
  • Competitive positioning — should be monetized where feasible
🔀

Opportunity Cost

What is opportunity cost in IT resource management?

  • Value of the best alternative foregone
  • Cannot pursue all projects simultaneously
  • Resource allocation = prioritization decisions
  • IS auditor evaluates whether allocation maximizes value
🔍

IS Auditor's Evaluation

What does the auditor assess?

  • Both financial and nonfinancial dimensions in analysis
  • Nonfinancial benefits converted to monetary units where feasible
  • Opportunity costs considered in allocation
  • Governance oversight of investment decisions
Try yourself

Meridian's CFO is reviewing an ROI analysis for a new customer portal. The analysis shows $500K in call center savings and $200K in new revenue. Sarah Lin also claims the portal will improve customer satisfaction and reduce loan cycle time, but those benefits are left in subjective language. What does current IT resource management practice require an organization to do with nonfinancial benefit claims in an investment analysis?

— Pause to recall —
Current practice recommends making nonfinancial benefits visible and tangible by using algorithms or models to convert them to monetary units where feasible. Dismissing them as unmeasurable is not best practice — improved customer satisfaction and shorter cycle times have quantifiable downstream financial implications that should be estimated and included in the investment analysis.

IT resource management addresses how enterprises deploy limited people and money to maximize value while accounting for opportunity costs — the foregone value of alternatives not pursued. Traditionally, IT project ROI was measured in financial terms: cost reductions and revenue increases. Modern practice recognizes that IT investments also deliver nonfinancial benefits: operational improvements (reduced cycle time, higher processing quality), achievement of strategic objectives, and improvements in customer satisfaction. Where feasible, these nonfinancial benefits should be converted to monetary units using algorithms or models so their impact is comparable with financial benefits in investment decisions. The IS auditor evaluates whether the enterprise's investment and allocation practices account for both financial and nonfinancial dimensions, and whether the analysis positions the enterprise to maximize value from its limited resources.

Why this matters: The CISA exam tests whether candidates know that best-practice IT investment analysis includes nonfinancial benefits — converted to monetary terms where feasible. An ROI analysis that excludes nonfinancial benefits is incomplete.
🎯
Exam tip

IT resource management questions test whether candidates include nonfinancial benefits in ROI analysis. The correct answer will include both financial (cost, revenue) and nonfinancial (operational, strategic) dimensions. The CISA exam may also test opportunity cost — what was given up when a resource was committed to one project.

See also: 2.8.1 2.8.2 2.8.6
Section 2.8.1 Good-to-know

Value of IT

By the end of this card, you should be able to
Explain how IT project value is determined, distinguish IT portfolio management from IT financial management, and describe the strategic goal of portfolio-level decision-making.
Scenario

Sarah Lin presents two dashboards to the board: one from the IT finance team showing budget vs. actual spend per project, and one from the IT portfolio office showing which projects deliver the highest strategic value relative to cost. Marcus Webb looks between the two: 'Both are about money.' Janet Holloway corrects him in one sentence. Before Alex writes the governance review finding, he needs to state that sentence — the one that makes portfolio management categorically different from financial management.

Value of IT
2 tables = financial management (spend tracking) and portfolio management (strategic direction). Same money, different questions.
How it works

The value of an IT investment is determined by comparing what the enterprise pays against what it receives. When benefits significantly exceed costs, the investment has high value; when they do not, value is low or negative. IT financial management and IT portfolio management address related but distinct questions. Financial management focuses on budget execution: tracking whether IT spending is proceeding as authorized and within approved amounts. Portfolio management has a strategic and directive purpose: determining which IT projects deserve continued investment, which should be scaled back, and which should be divested. Portfolio management applies investment criteria — financial, strategic, and tactical — to evaluate and continuously realign the enterprise's collection of IT initiatives with its current strategy and risk profile. The IS auditor evaluates both functions: financial management for cost control, and portfolio management for strategic value optimization.

🧠 Mnemonic
Financial = How we spend. Portfolio = What we should spend on.
IT Financial Management answers 'Are we spending as budgeted?' IT Portfolio Management answers 'Are we investing in the right things?' — two different questions requiring two different governance functions.
At a glance
⚖️

IT Value Concept

How is IT project value determined?

  • Relationship between cost and benefit
  • Larger benefit vs. cost = greater value
  • Includes financial and nonfinancial benefits
  • Basis for project selection decisions
💼

IT Financial Management

What does financial management track?

  • Budget vs. actual spend
  • Cost allocation across projects
  • Financial performance of IT services
  • Expenditure control against approved budgets
📊

IT Portfolio Management

What does portfolio management decide?

  • Which projects to invest in or divest
  • Strategic alignment of IT investment mix
  • Prioritization relative to enterprise strategy
  • Directive: optimize the portfolio for value
🔍

IS Auditor's Role

What does the auditor verify?

  • Financial management: budget controls working
  • Portfolio management: strategic criteria applied
  • Investment decisions documented and governed
  • Divest decisions reviewed and justified
Try yourself

Meridian's CFO says that IT financial management and IT portfolio management are 'basically the same thing — both are about controlling IT costs.' Janet Holloway corrects him in one sentence. What is the one-sentence distinction that separates the strategic purpose of IT portfolio management from IT financial management?

— Pause to recall —
IT financial management tracks IT costs, budgets, and financial performance. IT portfolio management has an explicitly directive, strategic goal: determining how much the enterprise will invest or continue to invest in IT versus what it will divest — it is about optimizing the composition of IT investments to maximize enterprise value, not just managing what was already approved.

The value of an IT project is determined by the relationship between cost (what the enterprise pays) and benefit (what the enterprise receives). The greater the benefit relative to cost, the greater the IT project's value. IT portfolio management and IT financial management are related but distinct disciplines. Financial management tracks costs against budgets — it answers 'are we spending as approved?' Portfolio management has a directive, strategic goal: determining which IT projects the enterprise should invest in, continue to invest in, or divest from — it answers 'are we investing in the right things?' Portfolio management uses value criteria to evaluate and optimize the composition of IT investments relative to enterprise strategy and risk. The IS auditor assesses both: financial management for budget and expenditure control, and portfolio management for strategic alignment and value optimization.

Why this matters: The CISA exam tests whether candidates can distinguish portfolio management (strategic direction of investment) from financial management (budget execution control). Conflating the two is a common error.
🎯
Exam tip

The key distinction tested on the CISA exam is: financial management = budget execution control; portfolio management = strategic invest/divest decision-making. Portfolio management is directive — it shapes what gets funded, not just tracks what was approved. Both functions must be audited independently.

See also: 2.8 2.8.2 2.8.6
Section 2.8.2 Good-to-know

Implementing IT Portfolio Management

By the end of this card, you should be able to
Identify the initial implementation steps for IT portfolio management, describe the portfolio evaluation criteria types, and explain how mandatory projects are distinguished from discretionary ones.
Scenario

Janet Holloway's portfolio office holds its first prioritization session. Twelve business units submit twenty-three project proposals using their own classification systems — some call a basic infrastructure upgrade 'strategic,' others call the same type of project 'run-the-business.' No one can compare the proposals on equal terms. Sarah Lin proposes ranking all twenty-three immediately. Sarah Lin wants to rank all twenty-three proposals immediately. Janet stops her with a question: 'Before you rank anything, what two things must every evaluator in this room agree on?' Janet needs an answer before she distributes the terminology glossary.

Implementing IT Portfolio Management
4 stages = portfolio implementation sequence. Mandatory projects bypass the tournament — they are in the portfolio regardless of ranking.
How it works

Implementing IT portfolio management requires foundational work before any project evaluation can be meaningful. The first practical step is standardizing terminology so all participants use consistent definitions for project categories and evaluation criteria. Once terminology is aligned, implementation includes securing management commitment, designing the portfolio model to match enterprise governance processes, specifying portfolio inclusion criteria, defining roles and decision rights, and organizing supporting tools. Portfolio criteria may be financial (ROI, payback), strategic (business objective alignment), or tactical (operational necessity). Implementation methods include analyzing the portfolio risk profile, diversifying across project types, and continuously realigning with enterprise strategy. A key distinction: some projects are discretionary — selected based on value — while others are mandatory due to regulatory requirements or technical obsolescence; mandatory projects must be included regardless of competitive value ranking.

🧠 Mnemonic
Standardize → Govern → Evaluate → Realign
Standardize terminology, Govern with criteria and roles, Evaluate using financial/strategic/tactical criteria, then Realign continuously as strategy changes.
At a glance
📚

Step 1: Standardize

Why is terminology standardization first?

  • Enables consistent comparison across proposals
  • Reduces misunderstandings in evaluation
  • Creates shared vocabulary for governance
  • Prerequisite before any criteria can be applied
🏛️

Governance Setup

What governance elements must be established?

  • Management commitment and targets
  • Portfolio management model design
  • Portfolio inclusion criteria
  • Roles, tasks, and decision rights
📊

Evaluation Criteria

What types of criteria are used?

  • Financial (ROI, NPV, payback)
  • Strategic (business objective alignment)
  • Tactical (operational necessity)
  • Risk profile and diversification considerations
⚖️

Mandatory vs. Discretionary

How do mandatory projects differ?

  • Mandatory: required for regulatory compliance or obsolescence
  • Cannot be excluded regardless of ROI ranking
  • Discretionary: selected based on value analysis
  • Portfolio must include both types
Try yourself

Meridian's IT portfolio management function is newly established. The portfolio committee is immediately evaluating twenty-three project proposals. The IS auditor notes that different business units use different definitions for 'strategic project' and 'infrastructure project,' and there are no documented criteria for portfolio inclusion. Which implementation prerequisite is missing, and why does it matter?

— Pause to recall —
The missing prerequisite is terminology standardization — the first practical step in portfolio management implementation. Without consistent definitions, portfolio criteria cannot be applied consistently across proposals, making comparison and prioritization unreliable. The portfolio cannot function as a governance tool if its vocabulary is ambiguous.

Implementing IT portfolio management requires a structured sequence of foundational steps before evaluation can begin. The first and most practical step is standardizing terminology so that all participants — business units, IT, finance — use the same definitions. Initial setup tasks include: ensuring management commitment and agreed targets; planning the portfolio management model in line with enterprise management processes; specifying portfolio inclusion criteria (what qualifies as a portfolio item); describing the roles, tasks, and decisions of all participants; and organizing the required tools and instructions. Portfolio criteria can be financial, strategic, or tactical. Implementation methods include risk profile analysis, diversification of projects and technologies, continuous alignment with business objectives, and continuous improvement. A key distinction: many projects are discretionary (selected for value), but some are mandatory — required for regulatory compliance or to mitigate technical obsolescence — and these must be included regardless of competitive value analysis.

Why this matters: The CISA exam tests the distinction between mandatory and discretionary portfolio projects, and the prerequisite of terminology standardization. Mandatory projects must be in the portfolio regardless of ROI ranking.
🎯
Exam tip

The CISA exam tests the mandatory vs. discretionary project distinction. Mandatory projects (regulatory compliance, technical obsolescence mitigation) must be included in the portfolio regardless of competitive value analysis. Also know: terminology standardization is the first implementation step — evaluation cannot be reliable without it.

See also: 2.8.1 2.8 2.8.3
Section 2.8.3 Must-know

IT Management Practices

By the end of this card, you should be able to
Describe the scope of IT management practices, explain why a well-managed IT department is central to achieving enterprise objectives, and identify the four management activity categories IS auditors review.
Scenario

Priya Rao hands Alex Chen the scope document for Meridian's IT management review. Sarah Lin has pre-populated the scope with 'information security policies only.' Priya circles it in red: 'The CISO manages security. But who governs the IT HR controls? The change management board? The IT budget sign-off process?' Priya crosses out 'Security policies only' from the scope document. She asks Sarah: 'If we exclude HR management from scope, what specific IT control fails that a security-only review would never catch?' Sarah needs to answer before Priya rewrites the scope.

IT Management Practices
4 guild banners = 4 IT management practice categories. A scope limited to one banner misses three areas of control risk.
How it works

IT management practices encompass the policies, procedures, and controls through which an enterprise directs and governs its IT function. In modern organizations, IT is not a peripheral support department — it is integrated into all business operations and directly affects the enterprise's ability to achieve its objectives. IS auditors reviewing IT management must address four areas. Human Resource Management governs how IT staff are recruited, trained, evaluated, and transitioned — including controls for new hires and terminations. Enterprise Change Management governs how changes to IT systems and infrastructure are authorized, tested, and implemented. Financial Management Practices govern IT budgeting, cost allocation, and expenditure control. Information Security Management governs how information resources are protected through policies, controls, and oversight structures. A complete IT management review addresses all four categories; an incomplete scope risks missing control gaps in the omitted areas.

🧠 Mnemonic
H·C·F·S
Human Resources, Change management, Financial management, Security management — the four IT management practice categories every IS auditor must cover.
At a glance
👥

Human Resource Management

What HR controls affect IT quality?

  • Background checks for IT hires
  • Training and certification requirements
  • Performance evaluation processes
  • Termination controls (access revocation)
🔄

Enterprise Change Management

What does change management govern?

  • Authorization of IT system changes
  • Testing requirements before deployment
  • Change board review and approval
  • Rollback procedures for failed changes
💼

Financial Management

What financial practices does IT audit review?

  • IT budget vs. actual expenditure
  • Cost allocation across departments
  • IT investment authorization controls
  • Procurement and vendor payment controls
🔒

Information Security Management

What does security management cover?

  • Security policy implementation
  • Access control governance
  • Security monitoring and incident response
  • Risk-based security investment decisions
Try yourself

Meridian's IS auditor is scoping an IT management practices review. Sarah Lin says the review should focus only on security policies. As the IS auditor, which three other IT management practice categories must be included in the scope — and what specific control risk is created if the HR management category is excluded?

— Pause to recall —
IT management practices encompass four areas: Human Resource Management, Enterprise Change Management, Financial Management Practices, and Information Security Management. Limiting review to security policies misses three of the four categories and would produce an incomplete picture of IT management effectiveness and enterprise objective achievement.

In modern enterprises, IT is not merely a support function — it is integrated throughout operations and critical to achieving enterprise objectives. IT management practices reflect the implementation of policies and procedures developed for various IT-related activities. IS auditors reviewing IT management must assess four activity categories: Human Resource Management (recruiting, training, performance management, succession planning, and termination controls as they affect IT quality); Enterprise Change Management (governance of IT changes to prevent unauthorized or uncontrolled modifications); Financial Management Practices (IT budget management, cost allocation, and investment controls); and Information Security Management (protecting information resources through governance-level controls). A review limited to any one of these categories misses the interdependencies among them and the cumulative effect on enterprise objective achievement.

Why this matters: The CISA exam tests whether candidates know the full scope of IT management practice review. The four categories are consistently testable. Also note: IT's role has shifted from support to strategic function — the IS auditor's review scope must reflect this.
🎯
Exam tip

The CISA exam tests the four IT management practice categories as a complete set. When a scenario limits the IT management review to one category (usually security), the correct answer is that the scope is too narrow. All four — HR, Change, Financial, Security — must be covered for a complete IT management practices review.

See also: 2.8 2.8.4 2.8.5
Section 2.8.4 Must-know

Human Resource Management

By the end of this card, you should be able to
Identify the key HR controls relevant to IT governance and explain what the IS auditor verifies when reviewing HR practices as they apply to the IT function.
Scenario

Alex Chen pulls the access control report for MERIDIA-1 as part of a routine quarterly review. He spots an active credential belonging to a DBA who left Meridian twenty-two days ago. The Okta account shows the last login as three days after the separation date. Alex escalates immediately and documents the finding: the HR termination checklist was completed — badge returned, email disabled — but the IT team was not notified promptly, and the system credential rotation was missed. Lila Okafor, the technical lead, confirms that the Okta account remains active and the MERIDIA-1 credentials have not been rotated. Three weeks have passed. Before Alex writes the finding, he must identify which termination phase failed and name both specific IT access controls that were missed.

Human Resource Management
3 gates = HR lifecycle phases. A termination gate left open after separation is a material access control finding.
How it works

Human Resource Management, as it relates to IT governance, addresses the policies and controls that govern how IT staff are recruited, employed, and separated from the enterprise. From an IS audit perspective, three lifecycle phases carry distinct control requirements. Hiring controls include background checks covering criminal, educational, financial, and professional history; confidentiality and non-disclosure agreements that protect sensitive system knowledge; and employee bonding for roles with access to high-value or sensitive assets. Employment controls cover training and certification appropriate to the role, performance evaluation, and succession planning to ensure continuity of critical IT functions. Termination controls are particularly critical: when a staff member leaves, all system access must be promptly revoked — including SSO accounts, system-specific credentials, and any shared passwords the individual possessed — and shared credentials must be rotated. Delays in termination access revocation create ongoing unauthorized access risk.

🧠 Mnemonic
Hire → Employ → Terminate = Access In, Access Managed, Access Out
IT HR controls gate access at every lifecycle phase: authorized at Hire, governed during Employment, and fully revoked at Termination.
At a glance
🔎

Hiring Controls

What controls apply at hire?

  • Background checks (criminal, educational, financial, professional)
  • Confidentiality/NDA agreements
  • Employee bonding for sensitive roles
  • Identity verification and credential provisioning
📋

Employment Controls

What controls apply during employment?

  • Role-appropriate training and certification
  • Performance evaluation and discipline
  • Succession planning for critical IT roles
  • Periodic access review for continued appropriateness
🔴

Termination Controls

What controls apply at termination?

  • Prompt SSO and system access revocation
  • Rotation of shared credentials
  • Badge and physical access removal
  • Documentation of all revocation actions
🔍

IS Auditor's Focus

What does the auditor test?

  • Completeness and timeliness of termination access revocation
  • Background check policy compliance for new hires
  • NDA execution for IT roles with sensitive access
  • Integration of HR process with IT access management
Try yourself

Meridian recently terminated a senior database administrator who had full access to MERIDIA-1. Three weeks later, the IS auditor discovers that the DBA's Okta account was not deactivated and the MERIDIA-1 system credentials were not rotated. Which HR management lifecycle phase failed, and what two specific controls were missed?

— Pause to recall —
The termination phase failed. The two missed controls are: (1) timely revocation of the Okta SSO account (access deactivation); and (2) rotation of shared system credentials the terminated employee knew. These are standard termination controls under IT HR management.

HR management as it relates to IT governance covers three lifecycle phases. Hiring controls ensure that new staff are qualified and trustworthy: background checks (criminal, educational, financial, professional), confidentiality and non-disclosure agreements, and employee bonding for roles with access to sensitive assets. Employment controls cover training, performance measurement, succession planning, and promotion — all of which affect the quality of IT operations. Termination controls are among the most critical from an IS audit perspective: when a staff member leaves, all logical access must be promptly revoked, shared credentials they possessed must be rotated, and the access review must be documented. Delayed or missed termination controls create ongoing unauthorized access risk — a material finding even when the termination itself was properly documented.

Why this matters: Termination access controls are the most frequently tested HR topic in IS audit. The CISA exam presents scenarios where terminated staff still have active system access — the correct finding is a control failure in the termination phase of HR management.
🎯
Exam tip

Termination access controls are the highest-frequency HR topic on the CISA exam. When the exam describes a terminated employee still with active access, the finding is a termination control failure — not an IT failure or an HR failure in isolation. The two functions must be integrated. Background checks and NDAs are also testable hiring controls.

See also: 2.8.3 2.8.5 2.2.4
Section 2.8.5 Must-know

Enterprise Change Management

By the end of this card, you should be able to
Define enterprise change management, explain the sequence for obtaining support for IT changes, and identify the IS auditor's key concerns when reviewing the change management process.
Scenario

Sarah Lin receives the incident report: the cloud team deployed a configuration change on Tuesday afternoon without a change board ticket. The API integration with MERIDIA-1 broke within minutes, and it took two hours to identify the cause. Alex Chen pulls the ServiceNow change log — nothing. The change was not documented, not tested in the staging environment, and not communicated to the MERIDIA-1 operations team. The incident report is the only documentation. Before he files any findings, he needs to name the fundamental control that failed and identify what three things about the change can no longer be verified.

Enterprise Change Management
4 stages = change management sequence. Taking the shortcut path produces the broken endpoint — and a finding.
How it works

Enterprise change management is the practice of using a defined, documented process to identify, authorize, test, and implement changes to IT infrastructure and applications in a way that minimizes disruption and ensures that all stakeholders are informed. The process follows a sequence. First, the change need is identified and documented, including scope, anticipated impact, and rollback plan. Second, senior management support is obtained — without executive commitment, changes face resistance at the operational level. Third, the IT department works with each affected functional area and its management to identify requirements and obtain cooperation. Fourth, a communication process targets end users with advance notice, reducing resistance and confusion. All changes — including emergency changes — must be documented, authorized, and tested before deployment. The IS auditor verifies that unauthorized changes are prevented, detected, and remediated, and that the change log in ServiceNow or equivalent systems is complete.

🧠 Mnemonic
Identify → Authorize → Align → Communicate
Identify the change need, Authorize it with senior management, Align functional areas, then Communicate to end users — unauthorized deployment skips all four steps.
At a glance
📋

Step 1: Identify & Document

What must be documented before a change is authorized?

  • Change scope and technical description
  • Business impact and risk assessment
  • Rollback plan if change fails
  • Testing requirements
👑

Step 2: Senior Management Support

Why is executive support required first?

  • Ensures resources are allocated
  • Prevents functional-level blocking
  • Creates accountability for outcomes
  • Required before functional work begins
🤝

Step 3: Functional Alignment

What must be done with affected functions?

  • Obtain management buy-in per function
  • Identify function-specific requirements
  • Coordinate testing with affected teams
  • Resolve conflicts between functions before deployment
🔍

IS Auditor's Concerns

What does the auditor verify?

  • Complete change log with all changes documented
  • Authorization evidence for every change
  • Testing completion before production deployment
  • Emergency change controls equally rigorous
Try yourself

Meridian's cloud team deploys a new AWS configuration change that affects the core banking API integration without going through the change board. The change causes a two-hour service disruption. The ServiceNow change log shows no record of the change. What is the fundamental change management control that failed — and what three elements of the change record are now unverifiable?

— Pause to recall —
The fundamental failure is bypassing the enterprise change management process — deploying a change without authorization, testing, or communication. The correct sequence: identify and document the change need → obtain senior management commitment → work with affected functional areas → communicate to end users → implement in a controlled manner.

Enterprise change management requires using a defined and documented process to identify, approve, and implement technology improvements in ways that minimize disruption and ensure all affected parties are informed. The process begins with identifying the change need and documenting its scope and impact. Senior management commitment must be obtained before work begins — without executive support, changes risk being blocked or undermined at the functional level. Once senior support is secured, the IT department works with each functional area and its management to obtain buy-in and identify implementation requirements. A communication process targeting end users provides advance notice and reduces resistance or post-implementation confusion. The IS auditor verifies that all changes — including 'emergency' changes — pass through this process, that changes are tested before deployment, and that unauthorized changes are detected and remediated.

Why this matters: Unauthorized changes are one of the highest-risk IT control failures. The CISA exam tests the sequence (management → functional → users) and the requirement that all changes, including emergency changes, must be documented and authorized.
🎯
Exam tip

Unauthorized changes are a material finding. The CISA exam tests the sequence and whether emergency changes still require documentation and authorization. The change board (using ServiceNow or equivalent) is the formal authorization mechanism. The IS auditor should verify that the log is complete and that no changes exist outside the log.

See also: 2.8.3 2.8.4 2.9.4
Section 2.8.6 Good-to-know

Financial Management Practices

By the end of this card, you should be able to
Explain the IT financial management challenge, describe the chargeback model for IT cost allocation, and identify the IS auditor's key financial management review points.
Scenario

Marcus Webb puts two reports side by side in the budget meeting: the IT department's $18M budget summary, and a list of forty-seven IT services consumed by Meridian's business units with no cost attribution. 'We are running a buffet,' he says. 'Every unit takes what it wants, and nobody knows the price.' Janet Holloway proposes a chargeback framework: service costs calculated by IT staff time and processing units, allocated monthly to each business unit via a standard formula. The chargeback proposal is on the table. Marcus Webb asks: 'Who approves this policy — us or the board?' Janet Holloway has the answer, but before she speaks, she asks Alex Chen to state the governance principle that determines which level of authority owns cost allocation policy.

Financial Management Practices
2 stalls = cost pool (buffet) and chargeback (menu). Menus create accountability — the board sets the pricing policy.
How it works

IT financial management addresses the challenge of controlling and allocating technology costs, which are a significant and growing portion of enterprise budgets. Technology resources are expensive to acquire, develop, and maintain, and their useful life is relatively short — requiring ongoing replacement investment. One widely used governance mechanism is the chargeback model: rather than bearing all IT costs centrally, the enterprise allocates them back to the business units that consume IT services, using a standard formula. The formula typically charges staff time, computer processing time, and other relevant service costs at a rate approximating the market price for the service. This approach creates cost visibility and holds business units accountable for their IT consumption, improving the application of resources. The chargeback policy should be established by the board and jointly maintained by IT and the consuming departments. The IS auditor verifies that chargeback calculations are accurate, consistent, and governance-approved.

🧠 Mnemonic
Buffet vs. Menu
Central cost pool = Buffet (everyone consumes, nobody sees the price). Chargeback model = Menu with prices (each unit knows exactly what they ordered and what it costs).
At a glance
💰

IT Cost Challenge

Why is IT financial management difficult?

  • Technology is expensive to acquire and maintain
  • Short useful life requires regular replacement
  • Costs are often invisible to consuming business units
  • Without allocation, no consumption accountability
📊

Chargeback Model

How does chargeback work?

  • IT costs allocated to consuming business units
  • Standard formula: staff time + compute time + relevant costs
  • Rate approximates market price for the service
  • Monthly allocation based on actual consumption
🏛️

Chargeback Governance

Who governs the chargeback policy?

  • Board establishes the chargeback policy
  • IT and business units jointly maintain the formula
  • Formula reviewed periodically for accuracy
  • Disputes resolved through a defined process
🔍

IS Auditor's Review

What does the auditor verify?

  • Calculations are consistent with the standard formula
  • Consumption data is accurately captured
  • Policy is board-approved and current
  • All IT services are included (no hidden costs)
Try yourself

Meridian's CFO proposes implementing an IT chargeback system so business units see the cost of IT services they consume. Marcus Webb asks who has the authority to establish the chargeback policy — the CFO, the IT steering committee, or the board. What is the correct answer, and why does it matter for governance accountability?

— Pause to recall —
The chargeback policy should be established by the board and jointly managed by IT and the consuming business units. The formula typically charges back staff time, computer processing time, and other relevant IS service costs using a standard (uniform) calculation — similar to a market rate for the service provided.

Financial management of IT is critical because technology costs — acquisition, development, and maintenance — represent a major element of enterprise budgets, and the useful life of technology resources is relatively short, requiring regular replacement investment. One governance mechanism for managing IT costs is the chargeback model: IT costs are allocated back to the business units that consume IT services, based on a standard formula. The formula typically includes IS staff time, computer processing time, and other relevant costs charged at a rate approximating a market price for the service. The chargeback policy should be established by the board and jointly maintained by IT and business units. Chargebacks improve cost visibility, create accountability for IT consumption, and help management make more informed IT investment decisions. The IS auditor verifies that chargeback calculations are consistent, accurately reflect consumption, and are approved at the appropriate governance level.

Why this matters: IT financial management and chargeback models are testable CISA topics. The exam tests who approves the chargeback policy (the board), what is charged back (staff time, computer time, relevant costs), and the governance purpose (cost visibility and accountability).
🎯
Exam tip

Chargeback model questions test who approves the policy (board), what is charged (staff time, compute time, relevant costs), and what the purpose is (cost visibility and accountability). The IS auditor's concern is accuracy and consistency of the formula, not the dollar amounts themselves.

See also: 2.8.1 2.8 2.10.1
Section 2.8.7 Must-know

Information Security Management

By the end of this card, you should be able to
Identify the six core responsibilities of the information security management function and explain how CIA triad forms the foundation for all of them.
Scenario

Devon Park hands Priya Rao a laminated card: Meridian's information security management charter. Six responsibilities are listed in two columns. Priya runs her finger down the list during a fieldwork walkthrough of Splunk. Risk assessments: documented quarterly. Policy library: updated. Incident response playbooks: current. Awareness training: completed. Architecture reviews: last done 18 months ago. Vulnerability scans: no patch process recorded. Two gaps out of six. Devon has the laminated card in his briefcase but hasn't shown it yet. The board member asks: 'Which of the six responsibilities do those two gaps fall under?' Devon must answer before opening his briefcase.

Information Security Management
Six lanterns = six ISM responsibilities. All serve the CIA shield. Dim lantern = audit finding.
How it works

Information security management is the enterprise function responsible for protecting information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. Its primary goal is maintaining the CIA triad: confidentiality, integrity, and availability. Six core responsibilities define the function. Risk assessment and management involves identifying, evaluating, and treating threats and vulnerabilities on an ongoing basis. Security policy development establishes the policies, standards, guidelines, and procedures that all employees and contractors must follow. Incident response and management provides the procedures for detecting, containing, investigating, and recovering from security incidents. Security awareness and training creates a security-conscious culture through education programs. Security architecture and design embeds controls — firewalls, intrusion detection systems, encryption, access controls — into systems and infrastructure from the design stage. Vulnerability management scans systems for weaknesses, applies patches, and uses penetration testing to find exploitable gaps before attackers do. IS auditors assess each of these six areas independently.

🧠 Mnemonic
RAPIDS
Risk assessment & management, Awareness & training, Policy development, Incident response & management, Design (security architecture & design), Scanning (vulnerability management) — the six core responsibilities of information security management.
At a glance
📋

Risk & Policy

What are the risk and policy responsibilities of ISM?

  • Regular risk assessments and vulnerability evaluations
  • Implement risk management strategies
  • Develop and enforce security policies and standards
  • Guidelines for employees, contractors, and third parties
🚨

Incident & Awareness

How does ISM handle incidents and human factors?

  • Establish incident response procedures
  • Investigate breaches and mitigate impact
  • Security awareness and training programs
  • Build a security-conscious culture
🏰

Architecture & Vulnerability

How does ISM protect technical infrastructure?

  • Design secure systems with embedded controls
  • Firewalls, IDS, encryption, access controls
  • Regular vulnerability scanning and patching
  • Penetration testing to find exploitable gaps
🔒

The CIA Foundation

What is the overarching goal of all ISM activity?

  • Confidentiality — prevent unauthorized disclosure
  • Integrity — prevent unauthorized modification
  • Availability — ensure systems are accessible when needed
  • All six responsibilities serve CIA
Try yourself

Sarah Lin, Meridian Corp's compliance officer, briefs the board on the information security management team's mandate. A board member asks: 'Your review found two gaps in the six-area assessment — architecture reviews were last done 18 months ago and there is no patch process on record. Which of the six ISM responsibilities do those gaps fall under?'

— Pause to recall —
The six responsibilities are: risk assessment and management; security policy development; incident response and management; security awareness and training; security architecture and design; and vulnerability management. All serve the goal of maintaining CIA — confidentiality, integrity, and availability.

Information security management protects the enterprise's information assets from unauthorized access, use, disclosure, disruption, modification, or destruction. The function's overarching goal is maintaining CIA: confidentiality, integrity, and availability. The six core responsibilities are:

  1. Risk assessment and management — identifying and evaluating threats and vulnerabilities
  2. Security policy development — creating policies, standards, and procedures for all stakeholders
  3. Incident response and management — establishing procedures to detect, contain, investigate, and prevent breaches
  4. Security awareness and training — educating employees on threats and their responsibilities
  5. Security architecture and design — embedding controls such as firewalls, IDS, encryption, and access controls into systems and infrastructure
  6. Vulnerability management — scanning for weaknesses, applying patches, and conducting penetration testing
Why this matters: CISA exams test the full scope of information security management responsibilities. Candidates often miss security architecture and vulnerability management as formal responsibilities of the ISM function, not just the CISO's personal domain.
🎯
Exam tip

Questions often ask which activity belongs to information security management versus the CISO versus IT operations. All six responsibilities listed here — risk assessment and management, security policy development, incident response and management, security awareness and training, security architecture and design, and vulnerability management — belong to the information security management function collectively. A common wrong answer assigns vulnerability management to IT operations rather than to the security management team; another common error places security architecture solely with the CISO rather than the broader ISM function. Remember: the overarching goal tying all six responsibilities together is maintaining the CIA triad (confidentiality, integrity, availability). Any exam scenario that asks what ISM 'primarily protects' is testing whether you can name CIA — not just name individual activities.

See also: 2.2.4 2.8.3 2.3.1
Section 2.9 Must-know

IT Vendor Management

By the end of this card, you should be able to
Identify the key practices for managing IT vendor risk across the vendor lifecycle, from pre-contract assessment through ongoing monitoring and contract termination.
Scenario

Alex Chen reviews Meridian Corp's payroll outsourcing contract and finds no right-to-audit clause. Priya Rao points to the morning's headlines: a breach at that very vendor. 'We have no contractual right to see their controls. We relied entirely on their attestation.' Maya Vargas from Legal opens the vendor contract. The right-to-audit clause section is blank. The breach is already public. Before Maya calls the vendor, she asks Alex: 'If we had included one clause at contract signing, what would it have given us the right to do right now?'

IT Vendor Management
4-stage flow = vendor lifecycle. SCME: Select → Contract (audit rights) → Monitor → Exit. Right-to-audit is the exam trap clause.
How it works

IT vendor management governs how an organization selects, engages, monitors, and exits IT service providers. Because enterprises rely heavily on third-party vendors, vendor risk has become a primary source of security and operational exposure. Best practices include conducting risk assessments before awarding contracts, embedding right-to-audit clauses and security requirements in contract language, and establishing SLAs with measurable performance metrics. During the engagement, ongoing monitoring reviews SLA attainment, security incidents, and financial health. When a vendor relationship ends, off-boarding procedures ensure data is recovered or securely disposed of, access credentials are revoked, and knowledge is transferred. Vendor risk is ultimately the organization's responsibility—outsourcing the function does not outsource the accountability.

🧠 Mnemonic
SCME
Select & assess → Contract (right-to-audit) → Monitor SLAs → Exit cleanly — SCME is the vendor lifecycle in order.
At a glance
🔍

Pre-Contract Assessment

What must happen before awarding a vendor contract?

  • Risk assessment of vendor's security posture
  • Financial stability review
  • Reference checks and regulatory compliance review
  • Define security and data handling requirements
📝

Contract Clauses

Which contract clauses protect the organization?

  • Right-to-audit clause
  • Data handling and breach notification requirements
  • SLA with measurable metrics and penalties
  • Indemnification and liability clauses
📊

Ongoing Monitoring

How is a vendor relationship monitored?

  • Regular SLA performance reviews
  • Periodic third-party risk assessments
  • Security incident tracking
  • Financial health monitoring
🚪

Termination / Off-boarding

What must happen when a vendor relationship ends?

  • Data returned or securely destroyed
  • All access credentials revoked
  • Transition and knowledge transfer plan executed
  • Final security and compliance review
Try yourself

Meridian Corp discovers that a critical payroll vendor recently suffered a data breach. The legal team asks what rights Meridian has to audit the vendor's controls. Meridian relied entirely on the vendor's attestation with no direct audit rights. What specific contract clause should have been included at the time of engagement?

— Pause to recall —
A right-to-audit clause in the contract, combined with ongoing vendor risk monitoring (periodic assessments and SLA reviews), would have provided both the right and the early warning.

Effective IT vendor management requires proactive risk management across the entire vendor lifecycle. Before awarding a contract, risk assessments evaluate the vendor's security posture, financial stability, and regulatory compliance. Contracts should include right-to-audit clauses, data handling requirements, incident notification timelines, and SLA penalties. During the engagement, ongoing monitoring tracks SLA performance and emerging third-party risks. If a vendor relationship ends, a structured off-boarding process ensures data is returned or destroyed and access is revoked. The absence of a right-to-audit clause removes the organization's ability to independently verify vendor controls.

Why this matters: CISA exams test the full vendor lifecycle. Right-to-audit clauses and pre-contract risk assessment are classic exam scenarios. Vendor risk is a first-party responsibility even when the service is outsourced.
🎯
Exam tip

Right-to-audit clauses are a favorite exam topic: if they are absent, the organization cannot independently verify vendor controls regardless of contractual security requirements. The IS auditor's responsibility does not stop at the organization's perimeter.

See also: 2.9.1 2.9.4 2.9.6
Section 2.9.1 Good-to-know

Sourcing Practices

By the end of this card, you should be able to
Define the three sourcing models and three geographic delivery options, and explain how the IS auditor evaluates whether a sourcing strategy aligns with enterprise IT objectives.
Scenario

Sarah Lin maps Meridian's current IT function roster on the whiteboard, grouping each service by who delivers it. MERIDIA-1 development: in-house team, onsite. Mobile app QA: vendor offshore team in Eastern Europe. Customer analytics: joint venture with a fintech firm, nearshore. 'What is each of these called?' she asks Alex Chen. Alex labels the whiteboard: Insourcing, Outsourcing, Hybrid. Then adds the geography column: Onsite, Offshore, Nearshore. The joint venture for customer data analytics is blank. Priya asks: 'What do we call this model, and what risk does it introduce that a standard outsource contract does not create?'

Sourcing Practices
3 ships = 3 sourcing models. Distance markers show delivery geography — accountability stays at the harbor regardless of which ship carries the cargo.
How it works

Sourcing practices determine how an enterprise obtains the IT functions and capabilities it needs to support business operations. Three sourcing models exist along a spectrum. Insourcing means all IT functions are fully performed by enterprise employees — centralized or distributed across locations. Outsourcing means all IT functions are fully performed by a third-party vendor. Hybrid models use a mix of enterprise and vendor staff — including joint ventures, managed services, and supplemental staffing arrangements. Independent of the sourcing model, IT functions can be delivered from three geographic locations: onsite (staff at the enterprise's location), offsite or nearshore (remote staff in the same geographic region), or offshore (remote staff in a different country or region). The sourcing strategy should be evaluated against enterprise IT objectives to determine which model enables each IT function most effectively. The IS auditor evaluates sourcing risk, contract adequacy, and oversight mechanisms, particularly for non-insourced models where accountability must be maintained despite service delivery transfer.

🧠 Mnemonic
I·O·H × 3 locations
Insource, Outsource, Hybrid — three sourcing models. Each can be delivered Onsite, Offsite/Nearshore, or Offshore — producing nine potential combinations to evaluate.
At a glance
🏢

Insourcing

What characterizes insourcing?

  • All IT performed by enterprise staff
  • Maximum direct control and oversight
  • Higher fixed cost; full accountability
  • No vendor dependency risk
🌐

Outsourcing

What characterizes outsourcing?

  • All IT performed by vendor staff
  • Service delivery transferred; accountability retained
  • Contractual oversight required
  • Vendor risk management essential
🤝

Hybrid

What characterizes hybrid models?

  • Mix of enterprise and vendor staff
  • Includes joint ventures and supplemental staffing
  • Blended accountability model
  • Coordination overhead between parties
🗺️

Geographic Options

What geographic delivery options exist?

  • Onsite (enterprise location)
  • Offsite/Nearshore (remote, same region)
  • Offshore (remote, different geographic region)
  • Time zone and labor cost arbitrage factors
Try yourself

Meridian's IT steering committee wants to retain core banking development in-house, outsource mobile app testing, and use a joint venture for customer data analytics. As the IS auditor reviewing the sourcing strategy, what sourcing model applies to the joint-venture arrangement — and what specific governance risk does it introduce that pure outsourcing does not?

— Pause to recall —
Core banking = Insourcing (fully in-house). Mobile app testing = Outsourcing (fully vendor). Customer data analytics = Hybrid (joint venture is a hybrid model). Geographic options: Onsite (same location), Offsite/Nearshore (remote, same region), Offshore (remote, different geographic region).

Sourcing practices define how an enterprise obtains the IT functions required to support the business. Three sourcing models exist: insourcing (all IT functions fully performed by enterprise staff, centralized or distributed); outsourcing (all functions fully performed by vendor staff); and hybrid (a mix of enterprise and vendor staff, including joint ventures and supplemental staffing). Geographic delivery options operate independently of the sourcing model: onsite staff work at the enterprise's location; offsite or nearshore staff work remotely within the same region; offshore staff work in a different geographic region. The IS auditor evaluates whether the sourcing strategy aligns with IT and enterprise objectives, whether risks specific to each sourcing model are identified and managed, and whether contracts and oversight mechanisms are adequate for non-insourced functions.

Why this matters: Sourcing strategy questions test recognition of the three models and three geographic options. The CISA exam also tests that accountability for service quality remains with the enterprise regardless of which sourcing model is used.
🎯
Exam tip

Know the three sourcing models (Insource, Outsource, Hybrid) and three geographic options (Onsite, Offsite/Nearshore, Offshore) independently — they combine to create nine delivery configurations. The key IS auditor principle: service delivery may be transferred, but accountability for quality and risk management stays with the enterprise.

📰Real World

The 2020 SolarWinds supply-chain breach planted the SUNBURST backdoor in an Orion software update distributed to approximately 18,000 customers — but the number 'genuinely impacted' (where attackers pursued active exploitation) was approximately 100 organizations, per the White House, with FireEye estimating ~50 of the 18,000 as meaningfully compromised. The attack vector was a third-party software update channel (SolarWinds was a direct vendor to affected organizations). Modern vendor-management programs now require third- and fourth-party visibility and software-bill-of-materials (SBOM) transparency to detect exactly this type of supply-chain insertion.

See also: 2.9 2.9.2 2.9.4
Section 2.9.2 Must-know

Outsourcing Practices and Strategies

By the end of this card, you should be able to
Explain the governance principle that accountability cannot be outsourced, describe the strategic nature of outsourcing decisions, and identify the key IS auditor considerations when reviewing outsourcing arrangements.
Scenario

Janet Holloway reads the incident report with Sarah Lin. Six weeks of undetected monitoring gaps due to MSSP configuration errors. The SLA required 99.9% monitoring coverage; actual coverage was 63%. Sarah's first draft of the board response blames the MSSP. The CIO's draft board response is on the screen: 'This is the MSSP's fault — we outsourced that function.' Janet crosses out two words. Before she rewrites the response, she asks Alex: 'Which two words are wrong, and what principle of outsourcing governance do they violate?'

Outsourcing Practices and Strategies
The accountability chain ends at the shore. Service delivery travels to the vendor ship — accountability never does.
How it works

Outsourcing is the mechanism by which enterprises transfer the delivery of specific IT functions to third-party vendors. A fundamental principle governs all outsourcing arrangements: while service delivery is transferred, accountability for managing risk and ensuring value delivery remains firmly with the management of the client enterprise. The client cannot shed accountability by contracting with a vendor. Transparency and decision-making authority over the outsourced functions must remain with the client. Outsourcing is a strategic, not merely a procurement, decision — the enterprise is effectively reconfiguring its value chain, distinguishing core activities that define competitive advantage and should be retained from noncore activities that can be safely delegated to external providers. This strategic lens requires governance oversight beyond contract management: the enterprise must monitor vendor performance, manage the relationship, and maintain the capability to evaluate and change vendors when service delivery deteriorates.

🧠 Mnemonic
Delivery transferred, Accountability retained
Outsourcing transfers service Delivery to the vendor. Accountability for risk and value always remains with the client enterprise — it cannot be contracted away.
At a glance
⚖️

Accountability Principle

What is the fundamental outsourcing governance rule?

  • Service delivery transfers to vendor
  • Accountability stays with client enterprise
  • Client must manage risk — even vendor risk
  • Decision-making authority remains with client
♟️

Strategic vs. Procurement

Why is outsourcing a strategic decision?

  • Reconfigures the enterprise's value chain
  • Requires core vs. noncore activity analysis
  • Affects long-term competitive positioning
  • Not just a cost-reduction procurement exercise
🎯

Core vs. Noncore

What guides the outsource/retain decision?

  • Core activities = competitive differentiators (retain)
  • Noncore activities = eligible for outsourcing
  • Core competencies risk loss if outsourced
  • Outsourcing noncore frees capacity for core
🔍

IS Auditor's Review

What does the auditor verify?

  • SLA terms are adequate and measurable
  • Independent monitoring of vendor performance
  • Accountability structures documented in contracts
  • Client retains right-to-audit and right-to-exit
Try yourself

Meridian outsources its cloud infrastructure monitoring to a managed security service provider (MSSP). A significant misconfiguration in the MSSP's monitoring setup goes undetected for six weeks. Meridian's CIO tells the board: 'This is the MSSP's fault — we outsourced that function.' As the IS auditor, what is the governance error in this statement?

— Pause to recall —
The governance error is the claim that accountability was outsourced with the service. Accountability always remains with the client enterprise — Meridian must ensure that risk is managed correctly and that the vendor delivers value. The MSSP's failure is a Meridian governance failure for insufficient vendor oversight.

Outsourcing allows enterprises to transfer the delivery of services to third parties. However, the fundamental governance principle is that while service delivery is transferred, accountability remains with the management of the client enterprise. The client must ensure that risk is managed correctly and that the service provider continues to deliver value. Transparency and decision-making authority must stay within the client's purview. Outsourcing is also a strategic, not merely a procurement, decision — the enterprise is effectively restructuring its value chain by deciding which activities are core to its business and should be retained, and which activities are noncore and can be outsourced. Well-governed enterprises that make deliberate, strategically informed outsourcing decisions have been shown to outperform those that outsource opportunistically.

Why this matters: The single most important principle in outsourcing governance: accountability cannot be outsourced. This is the most commonly tested outsourcing concept on the CISA exam.
🎯
Exam tip

The CISA exam will present a scenario where a vendor fails and management tries to deflect blame. The correct answer is always that accountability remains with the client enterprise. Also know: the IS auditor should verify right-to-audit clauses in vendor contracts — without them, the enterprise cannot independently verify vendor performance.

See also: 2.9 2.9.4 2.9.6
Section 2.9.3 Must-know

Cloud Governance

By the end of this card, you should be able to
Identify the unique governance challenges that cloud computing introduces and the key controls an enterprise must establish when using cloud services.
Scenario

Sarah Lin approves a new AWS data-lake expansion in a five-minute Slack message. Alex Chen, reviewing cloud spend in ServiceNow, finds three business-unit S3 buckets that IT never provisioned — shadow services purchased directly from a marketplace. Priya Rao pulls the cloud governance policy: it was written for on-premises procurement and has no cloud sourcing clause. Devon Park notes that two of the buckets contain customer PII with no encryption attestation. Before Alex opens the findings sheet, Devon says: 'Pick the single governance failure that made all four of these possible.' Alex needs to identify the root cause before listing the symptoms.

Cloud Governance
Cloud services pass through the governance gate — even vendor-hosted ones. Shadow barrels = ungoverned risk. The castle retains accountability.
How it works

Cloud computing introduces governance complexities that differ from traditional internally managed IT. When services are delivered by a third party, the enterprise cannot simply replicate its existing governance processes — it must adapt them. Four governance areas demand special attention in the cloud. Strategic alignment requires that cloud adoption decisions remain tied to business direction rather than being driven purely by convenience. Shadow IT governance requires explicit policies for sourcing, managing, and discontinuing cloud services, since business units can now procure services without going through IT. Third-party relationship management requires a designated owner for cloud vendor relationships, with SLAs enforced and compliance monitored. Security visibility requires that the enterprise retain oversight of security activities — change management, vulnerability identification, and incident response — even when they occur on vendor infrastructure. The enterprise must always maintain visibility into how sensitive data is stored, archived, and processed by cloud providers.

At a glance
🎯

Strategic Alignment

What must cloud adoption remain aligned with?

  • Business direction and strategic objectives
  • Performance objectives must continue to be met
  • Technology provisioning and business must be aligned
  • Risk must be managed, not transferred to the provider
🚫

Shadow IT Controls

How must enterprises control shadow cloud usage?

  • Policies for sourcing cloud services directly
  • Policies for managing ongoing cloud services
  • Policies for discontinuing cloud services
  • Business units cannot bypass IT without governance approval
🤝

Third-Party Management

How should cloud vendor relationships be managed?

  • Assign a designated owner or service management team
  • Enforce SLAs and compliance requirements
  • Take action when service deficiencies appear
  • Ensure the vendor checks compliance on its side too
🔍

Security Visibility

What security visibility must the enterprise retain?

  • Change management on vendor infrastructure
  • Vulnerability identification and patching status
  • Incident reporting and response transparency
  • Visibility into sensitive/critical data handling
Try yourself

Meridian Corp's business units have begun purchasing cloud services directly without involving IT. Alex Chen, reviewing cloud spend, discovers two cloud storage buckets containing customer PII with no encryption attestation. As the IS auditor, which single cloud governance challenge does the absence of an encryption attestation most directly represent — and which control would have detected it before the audit?

— Pause to recall —
The four challenges are: maintaining strategic alignment between cloud use and business direction; controlling shadow IT through updated sourcing policies; managing the third-party relationship through designated owners and SLAs; and retaining security visibility into sensitive data and incident reporting.

Cloud computing introduces governance challenges that are more complex than traditional IT because a third-party provider controls the infrastructure. The enterprise must

  1. ensure strategic alignment — cloud service decisions must support business direction, not just deliver speed
  2. address shadow IT — business units that bypass IT for cloud services must be governed by explicit sourcing, management, and discontinuation policies
  3. manage the third-party relationship — a designated individual or team must own cloud vendor relationships, enforce SLAs, and monitor compliance
  4. maintain security visibility — the enterprise must retain oversight of security activities including change management, vulnerability identification, and incident reporting, even when these happen on the vendor's infrastructure

Sufficient technical resources must exist to verify compliance with information security requirements.

Why this matters: CISA exams test that governance obligations do not transfer to the cloud provider. The enterprise retains accountability for governance and security even when services are externally hosted.
🎯
Exam tip

The most important principle for cloud governance questions: governance responsibility does NOT transfer to the cloud provider. The enterprise always retains accountability. Wrong answers often suggest that because the provider manages infrastructure, the enterprise can reduce its governance overhead. The correct answer always includes retaining security oversight, maintaining SLAs, and having a designated relationship owner. A second pattern is the shadow IT issue: business units procuring cloud services directly is explicitly identified as a governance risk.

📰Real World

Capital One's 2019 breach affecting over 100 million individuals (US and Canada) was caused by a customer-side misconfiguration: a Web Application Firewall running on an EC2 instance had an overly permissive IAM role. The attacker used a Server-Side Request Forgery (SSRF) technique to reach the AWS Instance Metadata Service and harvest temporary IAM credentials, then used those credentials to extract data from S3 buckets. AWS's infrastructure was not at fault; Capital One's configuration, identity permissions, and access policies were. Cloud audit questions love this pattern: the blame is almost never the provider; it is the customer's configuration, identity, or access.

See also: 2.9 2.9.2 2.9.4
Section 2.9.4 Must-know

Governance in Outsourcing

By the end of this card, you should be able to
Define outsourcing governance and identify the eight responsibilities it extends to both client and service provider.
Scenario

Janet Holloway reviews Meridian's managed-network-services contract. The SLA covers uptime targets but there is no governance schedule, no named dispute manager on the vendor side, and no OLA between the vendor's teams and Meridian's IT desk. When the vendor missed three consecutive monthly SLA targets, no escalation occurred — nobody knew whose job it was. Alex Chen lists the eight governance elements on the workpaper and maps them against the contract. He has three checks and five blanks. Before Janet makes her 'just a promise' comment, she asks Alex: 'Which missing element let three consecutive SLA misses go unescalated — and what would it have required to happen?'

Governance in Outsourcing
Eight wax seals = eight governance obligations. Broken seal = governance gap. Both parties must maintain all eight.
How it works

Outsourcing governance is the structured set of responsibilities, roles, objectives, interfaces, and controls that manage a third-party service relationship from initiation through discontinuation. It exists because contracts cannot define every detail, and because the governance process provides the mechanism to balance risk, service demand, service delivery, and cost dynamically. Eight responsibilities define outsourcing governance for both client and service provider. Contractual viability is maintained through continuous review, improvement, and mutual benefit for both parties. An explicit governance schedule is embedded in the contract itself, not added later. SLAs and operating level agreements (OLAs) define and enforce service delivery expectations. All stakeholders, their relationships, and expectations are identified and actively managed. Clear roles establish who makes decisions, escalates issues, manages disputes, handles demand, and owns service delivery. Resources and expenditures are allocated in response to prioritized needs. Performance, cost, user satisfaction, and effectiveness are continuously evaluated. All stakeholders receive ongoing communication. Missing any of these elements is a reportable governance gap.

🧠 Mnemonic
NEST + ROPE
NEST — the four foundations baked into the contract at signing: contractual viability (continuous review ensures mutual benefit for both parties), Explicit governance schedule, SLA/OLA service levels, sTakeholder identification and expectations. ROPE — the four ongoing governance activities that hold the relationship together: Roles and responsibilities for decisions and escalation, Ongoing communication with all stakeholders, Performance and cost evaluation, Expenditure and resource allocation. Together, NEST + ROPE = all eight outsourcing governance obligations.
At a glance
📜

Contract Foundations

What contract elements anchor outsourcing governance?

  • Contractual viability through continuous review
  • Explicit governance schedule in the contract
  • SLAs for client-facing service delivery
  • OLAs for internal cross-team delivery
👥

People & Roles

What people structures must outsourcing governance define?

  • Identify all stakeholders and manage expectations
  • Clear decision-making roles
  • Issue escalation and dispute management roles
  • Demand management and service delivery ownership
📊

Resources & Performance

How are resources and performance managed?

  • Allocate resources and expenditures by priority
  • Continuously evaluate performance and cost
  • Measure user satisfaction and effectiveness
  • Adjust allocation in response to changing needs
📢

Communication

What communication obligations exist?

  • Ongoing communication with all stakeholders
  • Both client and provider communicate proactively
  • Performance reporting at agreed intervals
  • Escalation communications through defined channels
Try yourself

Meridian Corp has outsourced its core network operations to a managed services vendor. The contract specifies service levels but has no governance schedule and no dispute-escalation process. As the IS auditor, what does an outsourcing governance framework require beyond basic SLAs?

— Pause to recall —
Outsourcing governance requires: contractual viability reviews; an explicit governance schedule in the contract; SLA and OLA management; stakeholder identification; clear decision-making and escalation roles; resource allocation mechanisms; continuous performance and cost evaluation; and ongoing communication with all stakeholders.

Governance of outsourcing is the set of responsibilities, roles, objectives, interfaces, and controls required to anticipate change and manage third-party services across their entire lifecycle. Beyond basic SLAs, effective outsourcing governance requires eight elements:

  1. ensuring contractual viability through continuous review, improvement, and benefits gained for both parties
  2. embedding an explicit governance schedule directly in the contract
  3. managing the relationship through SLAs and operating level agreements (OLAs)
  4. identifying and managing all stakeholders, their relationships, and expectations
  5. establishing clear roles for decision-making, issue escalation, dispute management, demand management, and service delivery
  6. allocating resources, expenditures, and service consumption against prioritized needs
  7. continuously evaluating performance, cost, user satisfaction, and effectiveness; and
  8. communicating with all stakeholders on an ongoing basis
Why this matters: CISA exams test that governance of outsourcing is a formal, structured function — not just a contract that exists. Candidates must recognize that an SLA alone is insufficient without an embedded governance schedule and explicit escalation roles.
🎯
Exam tip

Exam questions often present an outsourcing scenario with an SLA but no governance schedule, or with SLA breaches that went unaddressed. The correct answer identifies the absence of a formal governance structure — not just the SLA gap — as the root cause. A common wrong answer is to say the enterprise should renegotiate the SLA. The auditor's correct recommendation is to establish the missing governance framework first. OLAs and SLAs are used alongside each other to meet contractual obligations — both are tools of outsourcing governance, and the source presents them as complementary instruments without defining OLAs as exclusively internal.

See also: 2.9 2.9.2 2.9.6
Section 2.9.5 Good-to-know

Capacity and Growth Planning

By the end of this card, you should be able to
Explain the purpose of IT capacity and growth planning, identify what it must account for, and describe how staffing gaps can affect capacity decisions including outsourcing.
Scenario

Marcus Webb presents the growth plan: Meridian's loan processing volume doubles next year. The IT capacity deck shows a detailed AWS auto-scaling plan, new database cluster sizing, and network bandwidth increases. Alex Chen flips to the staffing section — blank. The MERIDIA-1 operations team of eight is already running late-night shifts at full capacity. The capacity plan has three pages on server scaling and one paragraph on cloud elasticity, but no staffing projections at all. Alex asks the IT capacity manager: 'What happens to service levels when volume doubles and staff count stays flat?' The manager reaches for the plan — then stops. The answer isn't in it.

Capacity and Growth Planning
2 halves = infrastructure and staffing. A plan with only one half completed is an audit finding before growth even begins.
How it works

Capacity and growth planning ensures that IT resources — infrastructure and personnel — are adequate to support both current operations and anticipated business growth. Given IT's strategic role in modern enterprises and the constant pace of technological change, capacity planning is not optional; it is a necessary input to the enterprise's budgeting cycle. The planning activity must reflect long-range business plans (multi-year growth trajectories) and short-range plans (near-term project demands). IT capacity has two dimensions: infrastructure capacity — scaling hardware, network, cloud, and application resources to meet projected demand; and staffing capacity — ensuring that a sufficient number of appropriately qualified IT personnel are available to support the enterprise at the required scale. A shortfall in staffing capacity can delay critical projects and cause failures in agreed service level delivery. In some cases, staffing constraints lead enterprises to pursue outsourcing — a decision that is more effective when planned strategically than when forced by reactive staffing gaps.

🧠 Mnemonic
Infrastructure + Staff = Full Capacity Picture
A capacity plan that covers Infrastructure but ignores Staff is half a plan. Both dimensions must align with long- and short-range business plans.
At a glance
🖥️

Infrastructure Capacity

What infrastructure dimensions are planned?

  • Server and compute scaling
  • Network bandwidth and latency requirements
  • Cloud resource auto-scaling
  • Storage and database growth trajectory
👥

Staffing Capacity

What staffing dimensions are planned?

  • Current team utilization rates
  • Skills gap relative to growth requirements
  • Succession and knowledge transfer
  • Recruitment lead time vs. project timelines
🗓️

Business Plan Alignment

How must capacity planning align to business plans?

  • Reflects long-range growth projections
  • Incorporated into annual budgeting cycle
  • Triggered by strategic plan updates
  • Synchronized with IT portfolio decisions
🔍

IS Auditor's Check

What does the auditor verify?

  • Both infrastructure and staffing dimensions present
  • Plan aligned with business growth projections
  • Budget includes capacity investment funding
  • Capacity gaps identified and remediation planned
Try yourself

Meridian's mortgage processing volume is projected to double next year due to a rate environment shift. The capacity plan addresses server and cloud resource scaling but says nothing about staffing for the MERIDIA-1 operations team, which currently runs at 95% utilization. As the IS auditor, what critical element of capacity planning is missing, and what is the governance risk?

— Pause to recall —
The missing element is staffing capacity planning. Capacity planning must reflect both infrastructure changes and the number of qualified staff available to support the enterprise. At 95% utilization, the MERIDIA-1 team has no buffer for volume doubling — the governance risk is delayed critical projects, missed service levels, and possible forced outsourcing without strategic evaluation.

Capacity and growth planning is essential given IT's strategic importance and the pace of technological change. The planning activity must reflect both long-range and short-range business plans and must be incorporated into the budgeting process. IT capacity planning has two dimensions: infrastructure capacity (hardware, network, cloud resources scaled to meet projected demand) and staffing capacity (the number and qualification of personnel available to support the enterprise at the projected scale). A lack of appropriately qualified staff can delay critical projects, cause failure to meet agreed service levels, and force the enterprise into reactive outsourcing decisions. Capacity changes must be reflected in budget planning — unplanned capacity investments are a governance signal that planning was inadequate. The IS auditor verifies that capacity plans address both infrastructure and staffing dimensions and that they are integrated with the business planning cycle.

Why this matters: The CISA exam tests both dimensions of capacity planning — infrastructure and staffing. Missing staffing from a capacity plan is a finding. Also know: capacity constraints can drive outsourcing decisions — but outsourcing adopted reactively due to staffing gaps is strategically weaker than planned outsourcing.
🎯
Exam tip

The CISA exam will present a capacity plan that addresses only one dimension (usually infrastructure) and ask what is missing. The answer is always staffing. Also know: capacity planning must be integrated with the budgeting process — unplanned capacity purchases signal planning failure.

See also: 2.9 2.10.1 2.10.4
Section 2.9.6 Must-know

Third-Party Service Delivery Management

By the end of this card, you should be able to
Explain what a service delivery management system must do and identify the three categories of activities required to manage third-party service delivery.
Scenario

Alex Chen pulls the vendor portal for Meridian's cloud-backup provider. Twelve monthly uptime reports sit unread in a shared inbox. The vendor silently migrated its backup infrastructure to a new data center six weeks ago — no change notification sent, no Meridian sign-off obtained. Priya Rao checks the SLA: it covers availability targets but says nothing about change management on the vendor's side. Alex has the vendor's six-month uptime reports stacked on the desk — unread. The infrastructure changelog shows a configuration update from nine weeks ago with no notification. The SLA has availability targets and nothing else. Before Alex names the three gaps, Priya asks: 'Which of the three is the highest-risk gap — and why?'

Third-Party Service Delivery Management
Three ledgers = three service delivery obligations. Unopened scrolls = passive receipt ≠ active monitoring.
How it works

Every enterprise that relies on third-party services must operate a service delivery management system. The system covers three main categories of activity. Monitoring and reviewing third-party services requires the enterprise to actively check service performance levels against the agreed terms, review reports and audit trails from the provider, arrange regular progress meetings, exchange information about security incidents, and review records of operational failures and faults. Passive receipt of reports is not sufficient — the enterprise must act on what it receives. Managing changes to third-party services requires formal governance whenever either party changes how services are delivered. This includes changes the enterprise initiates (new applications, updated policies, new security controls) and changes the provider initiates (new technologies, new product versions, change of subcontractors, or relocation of service facilities). All such changes must be evaluated for impact on security and risk. Service improvement and user satisfaction moves beyond the SLA baseline by setting improvement expectations, conducting satisfaction surveys, and benchmarking service quality over time.

🧠 Mnemonic
M·C·I
Monitor services, Control changes, Improve satisfaction — three pillars of third-party service delivery management.
At a glance
👁️

Monitor & Review

What must monitoring of third-party services include?

  • Monitor service performance against the SLA
  • Review reports and arrange progress meetings
  • Review security incident information jointly
  • Review audit trails, failure logs, and fault records
🔄

Manage Changes

What changes to third-party services must be governed?

  • Enterprise-initiated: new apps, policy updates, new controls
  • Provider-initiated: new tech, products, subcontractors
  • Changes to physical location of service facilities
  • All changes reassessed for security risk impact
📈

Service Improvement

How does the enterprise drive improvement beyond the SLA?

  • Set improvement expectations above SLA baseline
  • Regular user satisfaction surveys
  • Reduce help desk calls, system errors, and improve system availability (source examples)
  • Set improvement expectations in contracts with associated penalties and rewards
🔍

Auditor's Focus

What does the IS auditor look for in vendor management?

  • Evidence that reports were actually reviewed and acted on
  • Formal change management process covering vendor changes
  • Satisfaction surveys or improvement tracking
  • SLA review cycle and escalation records
Try yourself

Priya Rao asks Alex Chen to audit Meridian's cloud storage vendor relationship. The vendor delivers monthly uptime reports and the contract specifies an SLA, but nobody has reviewed the reports in six months and no change management process applies to the vendor's infrastructure changes. What three service delivery management activities are absent?

— Pause to recall —
Monitoring and reviewing services (reports are unread and no regular meetings occur), managing changes to third-party services (no change management process), and driving service improvement and user satisfaction (no improvement expectations set beyond the SLA baseline).

Every enterprise using third-party services must operate a service delivery management system. This system has three categories of activity. First, monitoring and reviewing services: the enterprise must monitor performance levels against the agreement, review third-party service reports, hold regular progress meetings, exchange information about security incidents, and review audit trails and records of security events, operational failures, and faults. Second, managing changes to third-party services: changes from either the enterprise or the provider — including enhancements, new applications, policy changes, new technologies, new vendor products, and changes to physical service locations — must be formally governed with reassessment of associated risk. Third, service improvement and user satisfaction: SLAs set the baseline, but enterprises should also set improvement expectations; regular satisfaction surveys and benchmarking drive ongoing enhancement beyond the SLA minimum.

Why this matters: CISA exams test that monitoring is active, not passive. Simply receiving a report does not constitute monitoring — the enterprise must review, act on, and document its response to third-party service data.
🎯
Exam tip

The critical exam trap for this section: receiving a vendor report is NOT the same as monitoring. Questions that describe an enterprise receiving monthly SLA reports but never acting on them are describing a monitoring failure. The correct answer identifies both the lack of active review AND the absence of change management over third-party changes. Wrong answers often focus only on renegotiating the SLA, which addresses the baseline but not the process gaps.

See also: 2.9 2.9.4 2.9.2
Section 2.10 Must-know

IT Performance Monitoring and Reporting

By the end of this card, you should be able to
Explain how IT performance measurement frameworks translate IT activity into business-value metrics that management and the board can act on.
Scenario

Sarah Lin's slide deck shows 99.9% uptime and 2,000 closed tickets. Marcus Webb leans across the governance table: 'That tells me your team is busy. It doesn't tell me IT is delivering what I approved the budget for.' The balanced scorecard is on the whiteboard. The two left quadrants — financial and customer — are empty. The two right quadrants — internal process and learning — have IT metrics filled in. Marcus Webb looks at the board and asks Alex: 'What are those two empty quadrants supposed to show, and why does their absence explain why the CFO called the CIO's metrics navel-gazing?'

IT Performance Monitoring and Reporting
4-dimension flow = IT performance translation. Operational metrics → Outcome metrics → Balanced scorecard → Board governance. Outcome metrics are the exam target.
How it works

IT performance monitoring ensures that IT investments deliver measurable value and that management has timely, relevant information to make governance decisions. Performance measurement frameworks translate IT activities into metrics meaningful to business stakeholders. Outcome measures focus on business value—such as productivity gains, revenue supported, or cost per transaction—rather than purely operational statistics. A balanced scorecard approach captures IT performance across financial, customer, internal process, and learning and growth dimensions. KPIs should be linked to strategic objectives, SLA commitments, and approved budgets. Performance data must be collected systematically, analyzed for trends, and reported to the appropriate governance level. Incentive systems should reinforce accountability by linking compensation and recognition to performance targets.

At a glance
📏

Metric Types

What two types of IT metrics exist?

  • Operational metrics: uptime, tickets, SLA compliance
  • Outcome metrics: business value, competitive advantage
  • Board sees outcomes; IT operations sees operational
  • Both types needed for complete picture
⚖️

Balanced Scorecard

How does a balanced scorecard connect IT to business?

  • Financial: cost and value delivered
  • Customer: satisfaction and service quality
  • Internal process: efficiency and quality
  • Learning and growth: capability improvement
📅

Reporting Cadence

How should IT performance be reported?

  • Regular reporting cycles (monthly, quarterly)
  • Operational metrics to IT management
  • Outcome metrics to board and senior management
  • Exception reporting for threshold breaches
🏆

Incentives

How are incentives linked to IT performance?

  • Compensation tied to performance targets
  • Recognition programs for goal achievement
  • Accountability reinforced through KPIs
  • Prevents gaming of metrics
Try yourself

Meridian Corp's board asks whether IT investments are delivering business value. The CIO presents uptime statistics and ticket counts. The CFO calls them 'IT navel-gazing.' What specific characteristic do the CIO's metrics lack that would make them meaningful to the board — and what framework connects IT performance directly to business goals?

— Pause to recall —
Outcome metrics tied to business value—such as time-to-market improvements, revenue enablement, or cost reduction per transaction—aligned through a balanced scorecard or similar framework.

IT performance measurement must go beyond operational metrics (uptime, tickets closed) to outcome metrics that demonstrate business value, competitive advantage, and strategic alignment. A balanced scorecard approach translates IT objectives into financial, customer, internal process, and learning dimensions that are meaningful to non-technical stakeholders. Key performance indicators (KPIs) should be tied to SLA commitments and strategic goals. Performance information should be reported regularly to the appropriate audience—operational metrics to IT management, outcome metrics to the board. Incentives such as compensation and recognition should be linked to performance achievement to drive accountability.

Why this matters: CISA exams test the distinction between operational IT metrics (internal-facing) and business-outcome metrics (external-facing for board and management). The IS auditor assesses whether IT performance reports actually inform governance decisions.
🎯
Exam tip

CISA exams test whether IT performance reports inform governance decisions. Operational metrics (uptime, tickets) are insufficient for board reporting—outcome metrics tied to business value and strategic objectives are required.

See also: 2.10.1 2.10.2 2.10.3
Section 2.10.1 Must-know

Key Performance Indicators

By the end of this card, you should be able to
Define KPIs, explain what they measure and predict, and describe the four-step process for developing effective metrics.
Scenario

Sarah Lin's IT operations team presents twelve metrics in the monthly dashboard. Marcus Webb stops at 'employee satisfaction with IT services: 67%.' 'Is this actually telling me anything?' he asks. Sarah explains: 'If satisfaction drops below 60%, prior experience shows ticket volume increases 40% and productivity losses follow. It is not just a survey — it is a leading signal of IT performance impact on the business.' Marcus looks more closely. Alex Chen checks the metric: target set (yes), measured consistently (yes), reported to the CIO (yes). But Marcus still isn't convinced it is a KPI. Alex needs to explain what the employee satisfaction metric is actually predicting — and whether that prediction connects to a goal — before Marcus accepts it as a genuine KPI.

Key Performance Indicators
4 KPI development steps displayed on the tower. The sundial below it is the lead indicator — it reads the future, not the past.
How it works

A Key Performance Indicator (KPI) is a quantitative measure that assesses how well a process is performing in enabling a defined goal to be reached. KPIs function as lead indicators — they provide early signals about whether a goal will be achieved before the final outcome is known. They also reflect the quality of capabilities, practices, and skills within the measured process. Developing effective KPIs follows four steps: identifying the critical data points that, if measured, would indicate goal achievement; identifying the specific quantifiable outputs from the relevant processes; establishing scoring targets against which actual performance will be compared; and monitoring performance against targets, with results reported to those with authority to make adjustments. For a KPI to be effective, it must be consistently measured over time, grounded in recognized best practices, useful for both internal trending and external benchmarking, meaningful to the people who consume IT services, and expressed in a concrete quantifiable format — a number, percentage, or defined unit of measure.

🧠 Mnemonic
KPI = Lead, not Lag
A KPI is a Lead indicator — it predicts whether a goal will be reached before the outcome arrives. A lagging metric only tells you what already happened.
At a glance
🎯

What KPIs Measure

What is a KPI measuring?

  • How well a process enables goal achievement
  • Lead indicator of whether goal will be reached
  • Quality of capabilities, practices, and skills
  • Predictive signal, not just historical record
📋

4-Step Development

How are effective KPIs developed?

  • Step 1: Identify critical data points for objectives
  • Step 2: Identify quantifiable process outputs
  • Step 3: Establish scoring targets
  • Step 4: Monitor and report to decision-makers

Effectiveness Criteria

What makes a KPI effective?

  • Consistently measured over time
  • Based on recognized best practices
  • Useful for internal and external comparison
  • Expressed as a number, percentage, or measurable unit
🔍

IS Auditor's Check

What does the auditor verify about KPIs?

  • KPIs aligned to business objectives
  • Targets formally established and documented
  • Reporting reaches those with authority to adjust
  • Metrics are consistently measured, not ad hoc
Try yourself

Meridian's IT steering committee is tracking 'employee satisfaction with IT services' as a KPI. Marcus Webb is skeptical — it sounds like a satisfaction survey. The metric has a target, is measured consistently, and the CIO receives the report. What single additional characteristic must a metric demonstrate to qualify as a KPI rather than a passive measurement?

— Pause to recall —
Employee satisfaction with IT services is a valid KPI — it measures how well IT is meeting business needs, and a high rating is a lead indicator that IT goals will likely be reached. An effective KPI must be consistently measured, based on acceptable best practices, useful for internal and external comparison, meaningful to customers and sponsors, and expressed as a number or percentage.

A KPI is a measure that determines how well a process is performing in enabling a goal to be reached. It serves as a lead indicator — providing advance signal about whether a goal will likely be achieved — and as a measure of capabilities, practices, and skills. KPIs are distinguished from simple metrics by their predictive and governance-oriented purpose. Developing effective KPIs follows four steps:

  1. Identify critical data points needed to achieve business objectives
  2. Identify specific, quantifiable outputs of work from the identified processes
  3. Establish targets against which results can be scored
  4. Monitor performance against the metrics and report results to those with authority to adjust

For a KPI to be considered effective, it must be consistently measured, based on recognized best practices, useful for both internal trending and external benchmarking, meaningful to IT customers and sponsors, and expressed in a quantifiable format (number, percentage, or unit of measure).

Why this matters: KPIs appear frequently in CISA performance monitoring questions. The exam tests their predictive function (lead indicator), their four-step development process, and their six effectiveness criteria.
🎯
Exam tip

The CISA exam tests KPIs as lead indicators and the four-step development process. Know the distinction: KPIs predict future goal achievement (lead); lagging metrics measure past outcomes. Also know: effective KPIs must be expressed as a number, percentage, or measurable unit — a subjective description is not a KPI.

See also: 2.10 2.10.2 2.10.3
Section 2.10.2 Must-know

Key Risk Indicators

By the end of this card, you should be able to
Define KRIs, explain how they function as early warning signals, and describe what threshold-based alerting requires.
Scenario

Devon Park reviews Meridian's weekly risk dashboard. The phishing attempt KRI reads 45% increase week-over-week — fifteen percentage points above the 30% alert threshold. Devon's screen should have shown an amber alert three days ago when the count crossed the line. It did not. Alex Chen reviews the alerting configuration: the threshold was set correctly at 30%. Last week phishing attempts hit 45%. No alert was triggered. The alert recipient list is on the screen — it points to a distribution group. Alex looks up the group membership. The group is empty. Before writing the finding, Alex needs to classify this: is the issue a KRI design failure, a KRI monitoring failure, or a KRI alerting failure?

Key Risk Indicators
3-step KRI mechanism: monitor, breach, alert. An alert scroll with no recipient is an early warning that nobody receives.
How it works

Key Risk Indicators (KRIs) are metrics that provide early warning signals, helping the enterprise identify rising exposure to risk events before those events cause harm to business performance. Unlike KPIs — which measure how well goals are being achieved — KRIs measure how risk exposure is changing over time. A KRI is connected to a defined threshold: when the indicator exceeds the threshold, an alert is automatically generated and sent to the individuals assigned to monitor that risk. The alert triggers a defined response process — investigation, escalation, or immediate mitigation — before the risk materializes into a loss or disruption. For example, a threshold-breaching increase in phishing attempts signals elevated threat activity that warrants immediate investigation, even if no compromise has been detected. The IS auditor verifies that KRIs cover key IT risks, that thresholds are calibrated at appropriate sensitivity levels, that alert routing reaches accountable individuals, and that a defined response process exists for each threshold breach.

🧠 Mnemonic
KRI = Risk weather forecast
A KRI is a risk weather forecast — it does not report that the storm has hit, it signals rising conditions before damage occurs. Thresholds are the storm-warning level.
At a glance
⚠️

KRI Purpose

What does a KRI do?

  • Provides early warning of rising risk exposure
  • Signals threat level changes before harm occurs
  • Triggers investigation before events materialize
  • Distinct from KPIs — measures risk, not performance
📊

Threshold Mechanism

How does KRI alerting work?

  • Threshold set at a defined risk exposure level
  • Breach of threshold triggers automatic alert
  • Alert sent to assigned risk monitor
  • Alert triggers defined response process
⚖️

KRI vs. KPI

How do KRIs differ from KPIs?

  • KPI = measures process performance (lead indicator of goals)
  • KRI = measures risk exposure (early warning of harm)
  • KPIs enable goal achievement; KRIs prevent risk events
  • Both are forward-looking; different domains of measurement
🔍

IS Auditor's Verification

What does the auditor check for KRIs?

  • KRIs defined for each key IT risk
  • Thresholds calibrated at appropriate sensitivity
  • Alert routing reaches accountable individuals
  • Response process documented for each threshold breach
Try yourself

Meridian's risk team tracks 'percentage increase in phishing attempts per week' as a KRI. Last week phishing attempts increased 45%. The threshold is set at 30%. As the IS auditor, what should have happened when the threshold was breached, and what does the KRI signal about the risk environment?

— Pause to recall —
When phishing attempts exceeded the 30% threshold, an alert should have been sent to the individual assigned to monitor that risk. The KRI signals an elevated threat level — an increased exposure to risk events (phishing-based compromise) that may harm business performance. It is an early warning, not a confirmation that harm has occurred.

Key Risk Indicators (KRIs) provide early warning signals that help an enterprise identify exposure to risk events before those events cause harm to business performance. KRIs differ from KPIs in that they are forward-looking risk signals rather than performance measures. A KRI example is the percentage increase in phishing attempts — an elevated rate signals an increased threat level and potential for harm, even if no breach has occurred yet. KRIs include a defined threshold above which alerts are automatically sent to the individuals assigned to monitor the risk. The threshold breach triggers a required response — investigation, escalation, or remediation — before the risk materializes into a loss. The IS auditor verifies that KRIs are defined for the enterprise's key IT risks, that thresholds are set at appropriate levels, and that alerts reach the right people with authority to act.

Why this matters: KRIs are early warning mechanisms — they signal rising risk before damage occurs. The CISA exam tests their function (early warning, not performance measurement), the threshold-alert mechanism, and the difference between KRIs and KPIs.
🎯
Exam tip

The CISA exam tests the distinction between KRIs (risk early warning signals with thresholds and alerts) and KPIs (performance lead indicators tied to goal achievement). When a scenario describes a metric that signals rising threat or risk exposure before harm occurs, it is a KRI. When it predicts goal attainment, it is a KPI.

See also: 2.10 2.10.1 2.5.1
Section 2.10.3 Must-know

Key Control Indicators

By the end of this card, you should be able to
Define KCIs, explain what they measure about control performance, and identify the four-step process for developing effective metrics.
Scenario

Alex Chen pulls the monthly control effectiveness report for Meridian's IT security program. KCI: 71% of IT assets compliant with security policies. Last month: 84%. Two months ago: 91%. Alex traces the declining trend line. Over three months, the control has lost 20 percentage points of effectiveness. Three months of KCI data are on Alex's screen. Month 1: 91%. Month 2: 83%. Month 3: 71%. A single snapshot test today would show 71% and flag it as a finding. But Priya asks: 'Which type of audit procedure — point-in-time test or trend-based KCI — would have let you intervene at a more appropriate moment?' Alex must answer before scheduling the control design review.

Key Control Indicators
3 gauges = KPI, KRI, KCI. The declining shield gauge reveals a control losing effectiveness — month by month.
How it works

Key Control Indicators (KCIs) measure how effectively a control is performing in reducing the causes, consequences, or likelihood of risk. While KPIs measure process performance and KRIs signal rising risk exposure, KCIs specifically assess control quality. A KCI such as 'percentage of IT assets compliant with security policies' directly measures whether the security enforcement control is working at the intended level. When KCI performance declines, control effectiveness is deteriorating — which increases the residual risk the control was designed to manage. Developing and maintaining effective KCIs follows the same four-step process used for all governance metrics: identify critical data points tied to business objectives; identify specific quantifiable process outputs; establish formal scoring targets; monitor performance over time and report results to those with authority to take corrective action. Effective metrics must be consistently measured across reporting periods, grounded in best practices, useful for internal trending and external benchmarking, and expressed in concrete quantitative terms.

🧠 Mnemonic
KCI = Control health check
A KCI is a control health check — it measures whether the control is performing its intended risk-reduction function at the required level. Declining KCI = deteriorating control health.
At a glance
🔒

What KCIs Measure

What does a KCI assess?

  • How well a control reduces risk causes/consequences
  • Control effectiveness over time
  • Whether control is performing at required level
  • Signals control health — not goal achievement
⚖️

KPI vs. KRI vs. KCI

How do the three indicators differ?

  • KPI = process performance (goal achievement)
  • KRI = risk exposure level (early warning)
  • KCI = control effectiveness (risk reduction quality)
  • All three use the same 4-step development process
📋

4-Step Metric Development

How are effective metrics developed?

  • Identify critical data points for objectives
  • Identify quantifiable process outputs
  • Establish formal scoring targets
  • Monitor and report to those who can adjust

Effectiveness Criteria

What makes a metric effective?

  • Consistently measured across periods
  • Based on recognized best practices
  • Useful for internal and external comparison
  • Expressed as a number, percentage, or unit
Try yourself

Meridian's security team reports that 'percentage of IT assets compliant with security policies' is currently at 71%. As the IS auditor, what type of indicator is this, what does it measure about the control environment, and how should the metric be evaluated for effectiveness?

— Pause to recall —
This is a KCI — a Key Control Indicator. It measures how well the security policy enforcement control is reducing the risk that IT assets are inadequately protected. To evaluate effectiveness: it must be consistently measured, based on best practices, useful for comparison, meaningful to sponsors, and expressed as a quantifiable unit (percentage — this one is). 71% compliance is below the target if a target was formally established.

Key Control Indicators (KCIs) measure how well a control performs in reducing the causes, consequences, or likelihood of risk. They are distinct from KPIs (goal performance) and KRIs (risk exposure signals). A KCI like 'percentage of IT assets compliant with security policies' directly measures the effectiveness of the security policy enforcement control. When this percentage falls, the control is less effective at protecting IT assets, which increases the residual risk of harm. Developing effective metrics — whether KPIs, KRIs, or KCIs — follows the same four-step process: identify critical data points needed to achieve business objectives; identify specific quantifiable outputs of the relevant processes; establish targets against which results will be scored; monitor performance and report results to those who can adjust. For a metric to be effective, it must be consistently measured, based on recognized best practices, useful for comparison (internal and external), meaningful to IT customers and sponsors, expressed quantitatively, and contextually specific.

Why this matters: The CISA exam tests all three indicator types: KPIs (performance), KRIs (risk), and KCIs (control effectiveness). KCIs directly measure whether controls are working. A declining KCI is a signal of deteriorating control effectiveness — an audit concern.
🎯
Exam tip

Know all three: KPI (measures goal performance), KRI (signals risk exposure), KCI (measures control effectiveness). The CISA exam will present a scenario and ask which type of indicator applies. KCIs are the ones that directly tell you whether your controls are working as designed. A declining KCI is an IS auditor concern.

See also: 2.10 2.10.1 2.10.2
Section 2.10.4 Must-know

Performance Optimization

By the end of this card, you should be able to
Define performance optimization, explain how effective governance enables it, and describe the three-layer goal-metrics-monitoring structure required for consistent performance measurement.
Scenario

Alex Chen reviews Meridian's performance measurement documentation for the IT operations function. The 99.2% MERIDIA-1 uptime figure looks strong on paper. But when Alex asks who set the 99.2% target, the operations manager says: 'We did — based on what we thought was achievable.' The board approved a business continuity requirement of 99.9% for core banking. Senior leadership never translated that requirement into an IT performance goal. The business continuity requirement is 99.9% uptime. The IT operations target is 99.2%. Both numbers are on the table. Marcus Webb looks at the IT operations dashboard — green across the board. Janet Holloway looks at the BCM requirement document — a different target. Before Alex writes the finding, he needs to identify what single governance structure failure let these two targets diverge unnoticed.

Performance Optimization
3 tower floors = 3 governance layers. A broken chain between floors means metrics set without leadership goals — a governance gap.
How it works

Performance optimization is the continuous improvement of IT system efficiency and service quality with minimal additional investment in infrastructure. Effective governance directly enables performance optimization by establishing a structured three-layer measurement model. Senior leadership sets performance goals aligned with high-level, approved business objectives — they define what success looks like at the enterprise level. Process owners then establish specific metrics aligned with those leadership-defined goals, translating strategic intent into measurable operational targets. Each layer of management monitors performance against these metrics in its own domain, ensuring that accountability for performance flows throughout the organization. This hierarchy ensures that what gets measured reflects what the enterprise needs to achieve, not just what is convenient to track. Performance measures are not tools for assigning accountability or satisfying reporting requirements — their purpose is to drive actions that improve performance and governance effectiveness.

🧠 Mnemonic
Goals → Metrics → Monitoring (top to bottom)
Goals are set at the top (senior leadership), Metrics are defined in the middle (process owners), Monitoring happens at every layer — all three must flow from top to bottom.
At a glance
👑

Layer 1: Senior Leadership Goals

What does leadership set?

  • Goals aligned to approved business objectives
  • Enterprise-level performance expectations
  • The benchmark against which all metrics are measured
  • Translates board strategy into IT performance intent
📐

Layer 2: Process Owner Metrics

What do process owners define?

  • Specific measurable targets aligned to leadership goals
  • Operational metrics for each IT process
  • Quantifiable performance thresholds
  • Data collection and reporting mechanisms
👁️

Layer 3: Management Monitoring

Who monitors performance?

  • Each layer of management in its domain
  • Operations team monitors daily/weekly
  • IT leadership monitors monthly
  • Executive management monitors quarterly — all layers active
🎯

Purpose of Performance Measures

What are performance measures NOT used for?

  • NOT for assigning blame or accountability
  • NOT merely for regulatory reporting compliance
  • Used to identify improvement opportunities
  • Used to facilitate corrective action decisions
Try yourself

Meridian's IT operations team is reporting 99.2% uptime for MERIDIA-1. Marcus Webb says this is excellent. However, the audit reveals that the uptime target was set by the IT operations team itself — not by senior leadership — and no management layer above the operations level monitors it. As the IS auditor, what governance structure for performance measurement is missing?

— Pause to recall —
The correct structure requires: goals set by senior leadership aligned to approved business objectives, metrics established by process owners aligned to those goals, and performance monitored by each layer of management. If operations set the target without senior leadership input, and only operations monitors it, two of the three layers are absent — a governance gap in performance management.

Performance optimization is the process of improving the efficiency of an information system while maintaining or increasing service quality with minimal additional infrastructure investment. Effective performance management requires a structured three-layer governance model: senior leadership sets goals aligned with high-level, approved business objectives; process owners establish metrics aligned with those goals to operationalize measurement; each layer of management monitors performance against the metrics. This hierarchy ensures that what is measured reflects what the enterprise needs to achieve, not just what the operations team finds easy to measure. A key note: performance measures are not used for assigning blame or complying with reporting requirements — their purpose is to create and facilitate actions that improve performance and governance. The IS auditor verifies that all three layers are in place and that reported metrics genuinely reflect enterprise priorities.

Why this matters: Performance measurement governance is tested on the CISA exam with scenarios where the wrong level sets the goals or the wrong level monitors results. The correct structure flows top-down: leadership sets goals, process owners set metrics, all layers monitor.
🎯
Exam tip

The CISA exam tests the three-layer governance model for performance measurement. If the question presents a scenario where operations set its own targets without senior leadership input, or where only one management layer monitors results, the answer involves a governance gap. Also know: performance measures drive improvement actions — they are not blame tools.

See also: 2.10 2.10.1 2.5
Section 2.10.5 Good-to-know

Approaches and Techniques

By the end of this card, you should be able to
Identify the key process improvement and performance measurement approaches used in IT management — Six Sigma, Agile, IT Balanced Scorecard, and Benchmarking — and distinguish what each measures or improves.
Scenario

Marcus Webb sends a one-line email: 'Our transaction processing error rate is 2.4 percent. Fix it with data.' Priya Rao recommends a Six Sigma engagement — measure, analyze, improve, control. Sarah Lin simultaneously emails the cloud team: 'Deliver the new customer portal in two-week sprints, not a big-bang release.' At the quarterly board review, Janet Holloway presents the IT Balanced Scorecard — four quadrants lit up across the stone-chamber screen. Meridian's patch-cycle time has been slow for six months. Devon Park reviews his process improvement options — Six Sigma, Agile, Balanced Scorecard, Benchmarking — and Janet asks: 'Which of your four tools is the only one that requires data from outside Meridian to produce its insight?'

Approaches and Techniques
Four stands = four IT improvement tools. Match the problem to the stand: defects → Sigma, sprints → Agile, perspectives → BSC, peers → Benchmark.
How it works

IT management uses several proven approaches to measure performance and drive improvement. Six Sigma is a quantitative, data-driven methodology targeting process improvement and defect reduction. A Six Sigma defect is any output outside customer specifications. Lean Six Sigma extends this by also eliminating non-value-adding steps. Agile is a methodology and mindset emphasizing iterative, incremental delivery in short cycles called sprints. Its core principles are customer collaboration, iterative development, self-organizing teams, continuous feedback, adaptability, and simplicity. Common Agile frameworks include Scrum, Kanban, and Extreme Programming (XP). The IT Balanced Scorecard (BSC) is a management evaluation technique that assesses IT beyond financial metrics by examining four perspectives: user/customer orientation, operational excellence, future orientation, and business contribution. Benchmarking compares an organization's IT performance and processes to industry peers or best-practice standards to identify improvement opportunities. IS auditors should be familiar with all four approaches and understand when each is the appropriate tool for a given improvement or measurement challenge.

🧠 Mnemonic
SABB
Six Sigma (defects) → Agile (sprints) → Balanced Scorecard (four perspectives) → Benchmarking (peers). SABB: the four IT improvement and measurement tools.
At a glance
📉

Six Sigma

What is Six Sigma designed to do?

  • Quantitative, data-driven process improvement
  • Reduce defects (anything outside customer specs)
  • Lean Six Sigma also eliminates non-value steps
  • Measurement-oriented strategy for process improvement and defect reduction
🔄

Agile

What defines the Agile approach?

  • Iterative delivery in sprints (small increments)
  • Customer collaboration and continuous feedback
  • Self-organizing, cross-functional teams
  • Adaptability over rigid plans; frameworks: Scrum, Kanban, XP
🎯

IT Balanced Scorecard

What four perspectives does the IT BSC measure?

  • User/customer orientation
  • Operational excellence (internal processes)
  • Future orientation (learning and growth)
  • Business contribution (financial and value delivery)
📊

Benchmarking

What does benchmarking provide?

  • External comparison against industry peers
  • Identifies performance gaps versus best practices
  • Provides objective improvement targets
  • Supports BSC calibration and goal-setting
Try yourself

Meridian Corp's IT leadership is reviewing its process improvement toolkit. Marcus Webb wants a data-driven defect-reduction approach. Sarah Lin wants iterative delivery. The board wants a multi-dimensional IT performance view. Priya Rao wants external comparison. Which approach serves each person, and what does each one measure or achieve?

— Pause to recall —
Marcus → Six Sigma (quantitative defect reduction). Sarah → Agile (iterative, flexible delivery). Board → IT Balanced Scorecard (four-perspective performance). Priya → Benchmarking (external comparison).

Four major improvement and measurement approaches apply to IT. Six Sigma is a quantitative, data-driven approach focused on process improvement and defect reduction — a defect is anything outside customer specifications. Lean Six Sigma also eliminates non-value-adding steps. Agile is a mindset and methodology emphasizing iterative delivery in small increments (sprints), customer collaboration, self-organizing teams, continuous feedback, adaptability, and simplicity. The IT Balanced Scorecard extends beyond financial metrics to assess IT performance across four perspectives: user/customer, operational excellence, future orientation, and business contribution. Benchmarking compares an organization's IT processes and performance against industry peers or best practices to identify gaps.

Why this matters: CISA exams test the purpose and distinguishing feature of each approach. The most common confusion is between Six Sigma (defect reduction, quantitative) and the BSC (performance measurement, four perspectives). Knowing which tool fits which problem is the key exam skill.
🎯
Exam tip

Questions often describe a scenario and ask which technique applies. Match the scenario to the tool: quantitative defect data → Six Sigma; iterative delivery, fast feedback → Agile; multi-perspective performance dashboard → IT BSC; comparing to peers → Benchmarking. The most common wrong answer pairs a performance measurement scenario with Six Sigma — Six Sigma reduces defects, it does not measure IT performance across multiple perspectives. That is the BSC's job. Remember also that Agile is a mindset, not just a software development practice.

📰Real World

Motorola formally launched its Six Sigma program in 1987 — not the early 1990s — under CEO Bob Galvin, driven by engineer Bill Smith's statistical quality framework. The program was so successful that Motorola won the first Malcolm Baldrige National Quality Award in 1988. By the mid-1990s the company had documented more than $16 billion in cumulative savings; Quality Magazine's 1999 data cites over $18 billion in manufacturing savings from 1987 to 1999. The discipline behind the savings was not exotic statistics — it was a ruthless focus on measuring variation and reducing it, one process at a time.

See also: 2.10 2.11.1 2.11.2
Section 2.11 Must-know

Quality Assurance and Quality Management of IT

By the end of this card, you should be able to
Explain the purpose and scope of a quality assurance program, distinguish QA from quality control, and describe the IS auditor's role in evaluating quality management structures.
Scenario

Alex Chen interviews the lead developer on Meridian's mobile banking team. A new balance display feature was pushed directly to production on Friday afternoon to fix a customer complaint. The developer had write access to the production AWS environment and used it without a change ticket. There was no staging test, no QA authorization sign-off, and no source code version tag. Alex pulls the ServiceNow log: no change record exists. The feature works. Users are happy. But Alex has three findings in front of him and cannot attest to the production environment's integrity. Before he writes the report, Priya asks: 'If you could only remediate one of these three gaps right now — change authorization, staging test, or developer access segregation — which one would protect Meridian most from the next unauthorized release?'

Quality Assurance and Quality Management of IT
2 gates = QA (upstream process) and QC (downstream product). A developer who bypasses the QA gate reaches production unreviewed.
How it works

Quality assurance (QA) is the systematic set of processes and controls that provides confidence that IT products, systems, and changes conform to established technical requirements. QA personnel verify that every system change is authorized, tested in a controlled manner, and implemented through a governed release process. QA also uses source code management tools to enforce segregation of developer access to production environments, maintain version integrity, and ensure source code auditability. All change types — including emergency changes — must pass through QA controls. While QA and quality control are often used as synonyms, they differ: QA is process-focused, working upstream to prevent defects; quality control is product-focused, inspecting outputs after the fact to identify defects. The IS auditor evaluates QA program design adequacy, coverage completeness, and operating effectiveness against documented controls.

🧠 Mnemonic
QA = Before (process), QC = After (product)
Quality Assurance works Before the output is produced — it ensures the process is correct. Quality Control inspects the output After it is produced — it finds defects after the fact.
At a glance
📋

QA Scope

What does QA verify for every change?

  • Change is authorized (change ticket required)
  • Change tested in controlled environment
  • Production deployment follows governed release process
  • Emergency changes also subject to QA review
💾

Source Code Controls

What source code controls does QA enforce?

  • Segregation of developer access to production
  • Version control and tagging
  • Source code integrity verification
  • Audit trail for all production code changes
⚖️

QA vs. QC

How do QA and QC differ?

  • QA = process-focused, upstream prevention
  • QC = product-focused, downstream inspection
  • QA prevents defects; QC finds them after the fact
  • Both are required in a complete quality program
🔍

IS Auditor's Role

What does the auditor evaluate in QA?

  • QA program design adequacy
  • Coverage of all change types
  • Evidence of QA review for sampled changes
  • Operating effectiveness vs. documented design
Try yourself

Meridian's development team releases a new mobile banking feature directly to production after only peer code review. The IS auditor finds no change authorization, no staging environment test, and no segregation between developers and the production environment. Which of these three gaps represents a QA responsibility failure — and which one creates the highest ongoing governance risk if left unaddressed?

— Pause to recall —
Three QA responsibilities failed: (1) authorization verification for the change, (2) controlled pre-production testing, and (3) segregation of developer access to production. The governance risk: without these controls, the integrity of source code and production systems cannot be assured — unauthorized or defective code can reach production undetected.

Quality assurance (QA) and quality management are the structured processes that provide confidence that IT products, systems, and changes conform to established technical requirements. QA personnel verify that system changes are authorized, tested, and implemented in a controlled manner before production introduction, consistent with change release management policies. Using source code management tools, QA also oversees the segregation of developer access to production environments, maintains program version integrity, and ensures source code integrity. While QA and quality control are often used interchangeably, the distinction is that QA is process-focused — it works upstream to prevent defects by ensuring the process is correct — while quality control is product-focused, inspecting outputs after the fact. The IS auditor must understand quality assurance concepts, the enterprise's quality structure, and roles and responsibilities within the QA program.

Why this matters: QA controls are critical for protecting production environment integrity. The CISA exam tests whether candidates can identify QA responsibilities (authorization, testing, segregation) and distinguish QA from QC.
🎯
Exam tip

The CISA exam tests QA controls (authorization, testing, segregation) and the QA vs. QC distinction. QA is process-focused and upstream; QC is product-focused and downstream. A developer with direct production write access and no QA gate is a segregation of duties finding — one of the most commonly tested QA control gaps.

See also: 2.11.1 2.11.2 2.8.5
Section 2.11.1 Must-know

Quality Assurance

By the end of this card, you should be able to
Distinguish quality assurance (QA) from quality control (QC), identify the responsibilities of the QA function, and explain the independence requirement.
Scenario

Alex Chen finds a production change deployed last Tuesday with no change ticket in ServiceNow. The developer says 'QC passed it.' Alex asks to see the QC test results — there are none. He then checks the QA procedures: they require a signed change authorization before any production deployment. Lila Okafor, the technical lead, mentions that the developer reviewed his own code. The QA manager and test manager are both in the room, each pointing at the other. Before Alex writes the findings, he needs to answer their dispute: which function is responsible for the self-review, and what does the responsible function require that was absent here?

Quality Assurance
Left arch = QA (govern the process). Right arch = QC (inspect the output). Never let a scribe review their own scroll.
How it works

Quality assurance (QA) and quality control (QC) are related but distinct functions. QA is process-focused: it establishes, maintains, and enforces the systematic standards and procedures that the entire IT function must follow to produce quality outputs. This includes verifying that system changes are authorized, tested, and deployed in a controlled manner before reaching production, and overseeing segregation of developer access from production environments. QC is output-focused: it uses testing and observation to verify that specific products — programs, documentation, data outputs — are defect-free and meet user requirements. QC activities can occur at multiple stages of development but must be completed before the software reaches production. Both functions serve the same goal but attack it from different angles: QA prevents defects by controlling the process; QC detects defects by inspecting the output. A critical requirement for the QA function is independence: no individual may review their own work, and reviewers must not have a segregation-of-duties conflict with what they are reviewing (for example, a DBA must not perform quality reviews of database changes).

🧠 Mnemonic
QA·QC = Process·Product
QA governs the Process (are we following the right standards?). QC inspects the Product (is this output defect-free?). Process before Product.
At a glance
📋

Quality Assurance (QA)

What does the QA function do?

  • Develop and maintain IT quality standards and procedures
  • Verify changes are authorized and tested before production
  • Oversee segregation of developer access from production
  • Train personnel on quality processes (e.g., ISO 9001)
🔬

Quality Control (QC)

What does the QC function do?

  • Test and verify outputs for defects
  • Ensure programs and documentation meet standards
  • Can occur at multiple development stages
  • Must be completed before moving programs to production
⚖️

QA Independence

What independence rules govern QA?

  • No individual reviews their own work
  • Reviewer must not have an SoD conflict with the item reviewed
  • DBA cannot QA-review database application changes
  • QA group should be independent within the enterprise
↔️

How They Differ

What is the key QA vs. QC distinction?

  • QA = process-focused (prevent defects by controlling process)
  • QC = output-focused (detect defects by inspecting outputs)
  • QA sets the standards; QC applies them to specific deliverables
  • Both required; neither replaces the other
Try yourself

Meridian Corp's developer reviewed his own code and pushed directly to production. The QA manager says this is QC's problem. The test manager says it is QA's problem. Which function — QA or QC — is responsible for preventing a developer from reviewing their own work, and what specific principle does this requirement derive from?

— Pause to recall —
QA is process-focused — it establishes and maintains the standards, procedures, and controls that ensure personnel follow quality practices. QC is output-focused — it tests and verifies that specific products or programs are defect-free before production. Unauthorized changes reaching production are a QA failure (process breakdown), not just a QC failure.

Quality assurance (QA) is a planned, systematic pattern of all actions necessary to provide confidence that a product or service conforms to established technical requirements. QA's role is to develop, maintain, and train personnel on quality standards and procedures — it ensures processes are followed, including verifying that system changes are authorized, tested, and implemented in a controlled manner before reaching production. QA personnel also oversee segregation of developer access from production and maintain source code integrity. Quality control (QC) uses observation techniques and testing to verify that specific outputs — programs, documentation — meet requirements and are free from defects. QC checks can occur at multiple development stages but must be completed before production. The QA function must be independent — individuals must not review their own work, and reviewers must not have segregation-of-duties conflicts with the item being reviewed.

Why this matters: CISA exams directly test the QA vs. QC distinction and the independence requirement. Candidates who confuse the two will answer process questions with output-testing answers and vice versa.
🎯
Exam tip

The most common exam trap: a scenario where a test team found no defects is presented as evidence that quality is assured. This confuses QC (output testing) with QA (process assurance). The correct answer recognizes that passing QC does not confirm that QA processes were followed. Also watch for independence violations — a developer reviewing their own code or a DBA reviewing database changes are classic SoD examples the exam tests explicitly.

See also: 2.11 2.11.2 2.8.5
Section 2.11.2 Good-to-know

Quality Management

By the end of this card, you should be able to
Define quality management in the IT context, identify the areas of control it covers, and explain how quality standards support IT organizations in achieving predictable, measurable, and repeatable operations.
Scenario

Janet Holloway reviews Meridian's quality management documentation index with Alex Chen. Software development: fully documented, ISO 27001-aligned. Service management: ITIL-based playbook, current. Security: policy suite in place. But hardware acquisition: no standard process — purchasing decisions made ad hoc by individual IT managers. HR management in IT: no documented onboarding or offboarding procedure for IT staff. General administration: no formal document control process. Janet has eight domains on the quality management scope checklist. Five have documentation. Three are blank: hardware acquisition, HR management in IT, and general administration. Before she circles the gaps, she asks Alex: 'If hardware acquisition has no documented process, which quality attribute — predictable, measurable, repeatable, or certifiable — is the first to fail?'

Quality Management
8 workstations = 8 quality management domains. Three dark banners signal scope gaps — quality cannot be partial.
How it works

Quality management in IT is the practice of controlling, measuring, and continuously improving the processes that the IT department uses to deliver its services. A process, in this context, is a defined set of tasks that, when properly performed, produces consistent and desired results. Quality management applies broadly — not just to software development, but to all IT operational domains: software development, maintenance, and implementation; hardware and software acquisition; day-to-day operations; IT control performance; service management; security; HR management; and general administration. The IT department's investment in defining, documenting, and consistently following processes across all these domains is the primary evidence of effective IT governance. Quality standards — including ISO 9001, CMMI, and similar frameworks — help IT organizations achieve operational environments that are predictable (consistent outcomes), measurable (quantifiable results), repeatable (reliably replicated across instances), and certifiable (independently verifiable). The IS auditor evaluates process documentation completeness, adherence to documented processes, and quality standard adoption.

🧠 Mnemonic
P·M·R·C = Quality Operating Environment
Predictable, Measurable, Repeatable, Certifiable — the four attributes of a quality IT operating environment that quality standards help achieve.
At a glance
📋

QM Coverage Areas

What IT areas does quality management cover?

  • Software development, maintenance, implementation
  • Hardware and software acquisition
  • Day-to-day operations and control performance
  • Service management, security, HR, and administration
📝

Process Documentation

Why are documented processes essential?

  • Enables consistent execution across staff
  • Provides basis for control identification and testing
  • Supports training and onboarding
  • Evidence of effective IT governance
🏛️

Quality Standards

What do quality standards provide?

  • ISO 9001, CMMI, and similar frameworks
  • Structure for achieving predictable operations
  • External certification and benchmarking
  • Best practice adoption across IT functions
🔍

IS Auditor's Evaluation

What does the auditor assess?

  • Process documentation completeness across all 8 areas
  • Adherence to documented processes in practice
  • Quality standard adoption and certification status
  • Evidence of process improvement over time
Try yourself

Meridian's IT department has strong application development quality controls but no documented processes for hardware acquisition or service management. As the IS auditor, what does this demonstrate about the quality management program scope — and which of the four attributes of a quality IT operating environment is most directly undermined by process gaps in hardware acquisition?

— Pause to recall —
Quality management must cover all IT operational domains — software development, acquisition, operations, control performance, service management, security, HR, and administration. Gaps in hardware acquisition and service management processes create unpredictability in those functions and make it impossible for management or auditors to assess or improve controls in those areas.

Quality management is how IT department processes are controlled, measured, and improved. Processes in this context are defined as sets of tasks that, when properly performed, produce desired results. Quality management applies to eight areas: software development, maintenance, and implementation; acquisition of hardware and software; day-to-day IT operations; IT control performance; service management; security; HR management; and general administration. The IT department's development and maintenance of defined and documented processes is evidence of effective governance of information resources. Insistence on process observance and related quality management techniques is key to IT effectiveness and efficiency. Quality standards — such as ISO 9000, CMMI, and others — help IT organizations achieve an operational environment that is predictable, measurable, repeatable, and certifiable. The IS auditor evaluates whether quality management processes exist, are documented, and are consistently followed across all applicable areas.

Why this matters: Quality management scope questions test whether candidates know all eight areas. The exam may present a partial scope and ask what is missing. Documented and followed processes are the evidence of effective IT governance.
🎯
Exam tip

The CISA exam may test which areas fall within quality management scope. Know all eight: software development, acquisition, operations, control performance, service management, security, HR, and administration. The exam may also test the four quality environment attributes: Predictable, Measurable, Repeatable, Certifiable.

See also: 2.11 2.11.1 2.8.3
Section 2.11.3 Memorize

Operational Excellence

By the end of this card, you should be able to
Define operational excellence teams, identify their core responsibilities, and explain how their work connects to IT governance and enterprise performance improvement.
Scenario

Sarah Lin's operational excellence team maps the loan origination IT workflow on a conference room whiteboard. Three bottlenecks are circled in red: manual data re-entry between the CRM and MERIDIA-1, an email-based document approval loop, and a nightly batch process that delays status updates until morning. The team estimates each adds two to four days to every application cycle. They propose three automation fixes, back each with data from the analytics pipeline, and draft a training program for the lending operations staff. Alex Chen reviews their roadmap: three workflow bottlenecks, three automation proposals, one training program. The governance committee is asking whether IT is producing value. Before Alex notes the roadmap in the workpaper, he needs to state how this specific document serves as audit evidence of IT governance effectiveness — not just improvement activity.

Operational Excellence
5 banners = 5 operational excellence responsibilities. Three red circles on the process map show where governance goals become operational improvements.
How it works

Operational excellence teams are dedicated functions within an enterprise responsible for continuously improving the efficiency and effectiveness of operations. Their work spans multiple activities: developing and implementing best practices that set higher performance standards; providing training and support to employees adopting new methods; conducting research and development to identify new improvement opportunities; managing knowledge and information so that lessons and insights are captured and shared across the organization; and serving as a resource for employees and stakeholders seeking operational guidance. Operational excellence teams use data and analytics to identify inefficiencies, eliminate waste, streamline workflows, and improve communication and coordination. Their activities directly support IT governance objectives: governance establishes the framework and direction; operational excellence teams translate that framework into measurable improvements in day-to-day operations. The IS auditor views operational excellence activity as evidence that the enterprise is pursuing continuous improvement — a hallmark of effective IT governance.

🧠 Mnemonic
B·T·R·K·S
Best practices, Training and support, Research and development, Knowledge management, Stakeholder resource — the five responsibilities of an operational excellence team.
At a glance

Core Responsibilities

What do operational excellence teams do?

  • Develop and implement best practices
  • Provide training and support to employees
  • Conduct R&D for improvement opportunities
  • Manage knowledge and serve as stakeholder resource
📊

Methods Used

How do operational excellence teams identify improvements?

  • Data and analytics to identify inefficiency
  • Process mapping to reveal bottlenecks
  • Collaboration and communication improvement
  • Waste elimination (lean principles)
🏛️

Governance Connection

How does operational excellence support IT governance?

  • Translates governance goals into operational improvements
  • Produces measurable performance outcomes
  • Creates documented evidence of continuous improvement
  • Supports quality management objectives
🔍

IS Auditor's View

What does the auditor look for?

  • Operational excellence team exists and is active
  • Improvement initiatives are data-driven
  • Best practices are documented and adopted
  • Performance outcomes measurable and improving over time
Try yourself

Meridian's board asks whether IT governance is producing measurable value. The IS auditor reviews the operational excellence team's work: three workflow bottlenecks eliminated, a training program deployed to lending operations, and a knowledge-base article capturing the root-cause analysis for each fix. Which governance assertion does this documented OE activity most directly support — and what is the IS auditor's one-sentence characterization of it as audit evidence?

— Pause to recall —
The documented OE activity directly supports the assertion that IT governance is producing measurable operational results. The IS auditor's characterization: 'The operational excellence team's data-driven improvements in the loan origination workflow demonstrate that governance goals are translating into reduced process waste, improved throughput, and captured institutional knowledge — evidence of a functioning continuous-improvement cycle.'

Operational excellence teams are responsible for improving the efficiency and effectiveness of enterprise operations. Their specific responsibilities include: developing and implementing best practices across the enterprise; providing training and support to other employees; conducting research and development to identify improvement opportunities; managing knowledge and information to ensure insights are captured and shared; and serving as a resource for employees and stakeholders seeking process improvement guidance. Operational excellence teams use data and analytics to identify improvement areas and eliminate waste, streamline processes, and improve communication and collaboration. Their work connects to IT governance because well-functioning IT governance creates the environment in which operational excellence teams can identify and act on improvement opportunities — and operational excellence outputs (improved processes, reduced waste, better performance) are the evidence that governance is producing measurable results.

Why this matters: Operational excellence ties governance to operational outcomes. The CISA exam may test the responsibilities of operational excellence teams and how they relate to quality management and IT performance monitoring.
🎯
Exam tip

Domain 2 opened with a governance imperative: boards must own IS strategy because enterprises are operationally dependent on IS. Everything in between — governance structures, risk management, security management, outsourcing governance, quality management — built out the mechanisms through which that board intent becomes enterprise reality. Operational excellence is where that arc closes: it is the function that takes governance goals and translates them into measurable, day-to-day operational improvements. When a CISA exam question asks how an IS auditor would evidence that IT governance is producing results, the answer points to documented operational excellence activity — best practices adopted, waste eliminated, performance metrics improving. The five OE responsibilities (best practices, training, R&D, knowledge management, stakeholder resource) are also tested directly. Distinguish OE from QA (pre-production control) and QC (post-production inspection): OE is the continuous improvement loop that spans the entire operation.

See also: 2.11 2.11.1 2.10.4
Use ← / → to navigate