Chapter 1

SteadyCert

Beautiful graphics for every concept in the CISA Review Manual

Domain 1: IS Auditing Process 18%
👩‍💼

Meet Alex Chen — Your Guide Through Domain 1

Alex just joined Meridian Corp's internal audit team. It's Day 1. The CISO has handed her a single task: audit the IT department. She's never done this before. Everything in Domain 1 is something Alex discovers, gets wrong, corrects, and learns — in real time. Follow along.

G1 — Treasure Map

Chapter 1 Overview

👩‍💼

Alex stares at her blank audit plan. Forty-seven systems, three weeks, zero experience. Then a senior auditor drops a dog-eared copy of the ISACA standards framework on her desk. "This is your treasure map," he says. "Every answer you need for the next three weeks starts here."

A treasure map illustration showing the audit journey across Domain 1
A

Part A: Planning (1.1–1.4)

  • 1.1 Standards & Ethics
  • 1.2 Types of Audits
  • 1.3 Risk-Based Planning
  • 1.4 Types of Controls
B

Part B: Execution (1.5–1.10)

  • 1.5 Project Management
  • 1.6 Testing & Sampling
  • 1.7 Evidence Collection
  • 1.8 Data Analytics
  • 1.9 Reporting
  • 1.10 Quality Assurance
Audit Lifecycle
Planning Fieldwork Reporting Follow-up

Domain Weight: 18% (~27 questions)

This domain is the foundation of IS auditing — master the lifecycle and control concepts.

Key Exam Tip

ISACA loves sequencing questions: "What should the auditor do FIRST?" or "Which phase does this activity belong to?" If you see a question about what comes FIRST in an audit, the answer is almost always a planning activity — understanding the business, defining scope, or assessing risk. Never jump to fieldwork or testing.

📰 Real World

When Enron collapsed in 2001, investigators discovered that Arthur Andersen's auditors had skipped fundamental audit lifecycle steps — rushing through planning and ignoring red flags during fieldwork. The result: $74 billion in shareholder value was wiped out as the stock collapsed from $90 to near zero, and an entire audit firm ceased to exist.

Test Yourself — Chapter Overview
Q1. An IS auditor is beginning a new audit engagement. What should be the FIRST step?
A. Begin testing high-risk systems
B. Understand the organization's business environment
C. Develop the audit program
D. Identify specific controls to test
Reveal Answer
Correct: B
Understanding the business environment always comes first. You cannot assess risk (C), identify controls (D), or test systems (A) until you understand what the organization does, its regulatory environment, and its strategic objectives.
Q2. An IS auditor is planning a new audit engagement. The auditee's management requests that the audit scope exclude a recently acquired subsidiary. What should the auditor do FIRST?
A. Accept the scope limitation and document it
B. Evaluate the risk implications of the scope exclusion
C. Report the scope limitation to the audit committee immediately
D. Resign from the engagement
Reveal Answer
Correct: B
The auditor must first assess the risk impact of the exclusion before deciding how to respond. Immediate escalation (C) may be needed, but only after understanding the implications. Accepting blindly (A) fails due professional care. Resigning (D) is premature and extreme.
Q3. Which phase of the audit lifecycle consumes the MOST time?
A. Planning
B. Fieldwork
C. Reporting
D. Follow-up
Reveal Answer
Correct: B
Fieldwork is typically the most time-consuming phase. The trap is choosing A (planning) because ISACA emphasizes planning heavily. But emphasis on importance doesn't mean most time spent — fieldwork involves evidence gathering, testing, interviews, and documentation.
Part A Section 1.1

IS Audit Standards & Ethics

G2 — Ancient Temple

ISACA Standards Framework

👩‍💼

Alex is reviewing the vendor list when she freezes. The IT security vendor — the one getting $2M a year — is the lead auditor's brother-in-law. Nobody mentioned it. Alex flips open the ISACA Code of Ethics. Independence isn't optional. It's Standard 1. She has to report this, even if it makes her unpopular on Day 1.

An ancient temple illustration representing the ISACA standards framework hierarchy
!

Standards (MUST)

Mandatory requirements for IS audit and assurance professionals. Non-negotiable.

~

Guidelines (SHOULD)

Guidance on applying standards. Strongly recommended but not required.

?

Tools & Techniques (MAY)

Examples and procedures for applying standards. Optional reference material.

Three Categories of Standards

General

Independence, ethics, competence

Performance

Planning, supervision, evidence

Reporting

Reports, follow-up activities

Key Exam Tip

When the exam says "must," "required," or "mandatory" — the answer involves Standards (not guidelines, not tools). When it says "should" — that's Guidelines. When it says "may" — Tools & Techniques. ISACA tests this hierarchy constantly. If a question asks what happens when an auditor deviates from a Standard vs. a Guideline, remember: deviating from Standards requires justification and disclosure in the report. Deviating from Guidelines does not.

📰 Real World

KPMG's South African division collapsed in scandal when auditors failed to maintain independence while auditing the Gupta family's companies, approving transactions they should have flagged. KPMG was forced to resign from Gupta-linked audits, repay R23 million in fees, and saw its head of audit and other senior partners resign in disgrace. The firm's reputation in South Africa was severely damaged.

Alex now knows the rules she has to follow. But rules don't tell her where to look first.

Part A Section 1.1b

Audit Authority & Independence

G2B — The Shield

The Audit Charter & Independence

👩‍💼

Alex needs to review the access control logs on the ERP system, but the IT manager refuses. "You don't have the authority to demand that," he says, arms crossed. Alex pauses — then pulls out the audit charter, approved by the board last quarter. "Actually, I do. Section 3: the IS audit function has unrestricted access to all systems, records, and personnel." The IT manager reads it. Unfolds his arms. Hands over the logs.

An auditor holding the audit charter like a shield while a board of directors approves in the background

The Audit Charter

The formal document that authorizes the IS audit function. It is the auditor's source of power.

Must Include:

  • Purpose of the audit function
  • Authority and scope
  • Responsibility
  • Reporting lines

Critical Exam Point:

  • Approved by the board or audit committee
  • NOT approved by management
  • Management approval = compromised independence
Independence Threats — ISACA's 6 Categories

Self-Review

Auditing your own work. Example: auditor designed the control, then audits it.

Self-Interest

Financial stake in the outcome. Example: auditor holds shares in auditee company.

Advocacy

Promoting the client's position. Example: auditor publicly endorses the auditee's product.

Familiarity

Too close to the auditee. Example: auditing a close friend's department.

Intimidation

Being pressured. Example: executive threatens the auditor's job if findings are reported.

Management

Performing management functions. Example: auditor makes decisions on behalf of the auditee.

🧠 Mnemonic

"Super Scary Auditors Face Intimidating Management"

  • Self-review
  • Self-interest
  • Advocacy
  • Familiarity
  • Intimidation
  • Management

Materiality

The threshold above which a finding must be reported.

  • Who sets it? The auditor, based on professional judgment
  • What affects it? Risk level, dollar amount, regulatory impact
  • Can minor findings be omitted? Not always — aggregated minor findings can become material

Due Professional Care

The auditor must apply the skill and diligence of a reasonably prudent IS auditor.

  • Does NOT mean perfection
  • Means reasonable care and competence
  • ISACA tests: "Was the auditor negligent?" — only if they failed to exercise reasonable care
Key Exam Tip

Three charter questions ISACA always asks: (1) "Who approves the audit charter?" → Board/audit committee, never management. (2) "What establishes the audit function's authority?" → The audit charter. (3) "An auditor previously designed the system being audited — what threat?" → Self-review. If a question describes ANY situation where the auditor's objectivity could be compromised, identify the specific threat type — ISACA wants the precise category, not just "independence issue."

📰 Real World

In the Parmalat fraud (Italy, 2003), the internal audit function reported to the CFO — the same person orchestrating the €14 billion fraud. Without a charter establishing independence and direct board reporting, the auditors had no authority and no protection. The fraud went undetected for years.

Test Yourself — Audit Authority & Independence
Q1. An IS auditor discovers that the audit charter was approved by the CIO rather than the audit committee. What is the MOST significant concern?
A. The charter may not include the correct scope
B. The audit function's independence is compromised
C. The auditor cannot perform the audit
D. The charter needs to be updated annually
Reveal Answer
Correct: B
The audit charter must be approved by the board or audit committee to establish independence. When management (CIO) approves it, the audit function reports to the people it's supposed to audit — destroying independence. C is wrong because the auditor can still perform the audit, but the independence concern must be reported. A and D are secondary issues.
Q2. An IS auditor is assigned to audit a system that the auditor helped design two years ago. Which independence threat does this BEST represent?
A. Familiarity threat
B. Self-interest threat
C. Self-review threat
D. Management threat
Reveal Answer
Correct: C
Self-review threat occurs when auditing your own previous work. The auditor who designed the system will naturally be reluctant to find flaws in their own design. A (familiarity) is about personal relationships, not prior work. B (self-interest) involves financial stakes. D (management) involves performing management functions.
Q3 (TRAP). An IS auditor identifies several minor control weaknesses, each individually below the materiality threshold. What should the auditor do?
A. Omit them from the report since they are immaterial
B. Report only the most significant one
C. Evaluate whether the findings are material in aggregate
D. Defer them to the next audit cycle
Reveal Answer
Correct: C
Aggregated minor findings can become material. The trap is A — thinking each finding can be individually dismissed. ISACA expects the auditor to consider the cumulative effect. Multiple small control weaknesses together might create a significant risk. B and D both involve ignoring relevant findings, which violates due professional care.
Part A Section 1.2

Types of Audits

G3 — Detective Agency

Types of Audits

👩‍💼

The CISO asks Alex: "Are we doing a financial audit, an operational audit, or an IS audit?" Alex hesitates. Financial checks the numbers. Operational checks efficiency. IS checks the technology controls underneath both. "All three overlap," she realizes. "But my job is the IS layer — making sure the technology itself is trustworthy."

A detective agency scene with different investigators representing various audit types
🖥️
IS Audit
IT controls & processes
IS Auditor (CISA)
📊
Financial
Verify financial statements
CPA
⚙️
Operational
Assess efficiency
Internal Auditor
📋
Compliance
Verify adherence to regulations
Compliance Auditor
🔍
Forensic
Investigate fraud
Forensic Specialist
🔗
Integrated
Financial + IT combined
Joint Team
Key Exam Tip

When ISACA asks "what type of audit should be performed," pay attention to the goal described in the question. If the goal is "verify adherence to policy" → compliance audit. If the goal is "verify accuracy of financial data" → substantive testing within a financial audit. The trap: "IS audit" is not a type of testing — it's a category that can include both compliance and substantive work.

📰 Real World

After the 2013 Target breach that exposed 40 million credit card numbers, investigators found that a compliance audit had given Target a passing grade just months earlier. The compliance audit checked the boxes, but an IS audit focused on network segmentation and vendor access controls would have caught the actual vulnerability.

G4 — Town Hall Meeting

Control Self-Assessment (CSA)

👩‍💼

Alex walks into a conference room expecting to lead a control review. Instead, she finds the IT operations team already mapping their own risks on a whiteboard. "We know where the gaps are," the team lead says. Alex's job isn't to evaluate — it's to facilitate. She sits in the back and takes notes while they assess themselves.

A town hall meeting scene illustrating collaborative control self-assessment
T

Traditional Audit

  • Expert-driven
  • Independent assessment
  • Periodic schedule
  • Formal report output
C

CSA Approach

  • Management/employee-driven
  • Collaborative process
  • Ongoing assessment
  • Self-identified risks

CSA Benefits

  • Risk awareness increases
  • Early detection of issues
  • Management ownership
  • Supplements formal audits

IS Auditor Role in CSA: FACILITATOR, not evaluator

The auditor guides the process but does not own the assessment results.

Key Exam Tip

ISACA trap: CSA looks like it replaces the audit. It doesn't. The auditor facilitates but management owns the self-assessment. CSA supplements formal audit — it never replaces it. If a question presents CSA as the ONLY assurance mechanism, that's always wrong. And if the question asks about the auditor's role in CSA, "evaluator" and "assessor" are traps — the answer is "facilitator."

📰 Real World

Wells Fargo's fake-accounts scandal (2016) revealed that internal teams had been "self-assessing" their controls as adequate for years — while employees were opening millions of unauthorized accounts. CSA without independent audit oversight became a rubber stamp that hid systemic fraud.

Test Yourself — Types of Audits
Q1. Management wants to know whether the IT department is meeting its SLAs efficiently. Which type of audit is MOST appropriate?
A. Compliance audit
B. Financial audit
C. Operational audit
D. IS audit
Reveal Answer
Correct: C
SLA efficiency is an operational concern. Compliance (A) checks adherence to regulations/policies. Financial (B) verifies financial statements. IS audit (D) focuses on IT controls. Operational audits specifically assess efficiency and effectiveness of operations.
Q2. A CSA workshop reveals that the IT team has identified three significant control gaps. What should the IS auditor do NEXT?
A. Include the gaps in the formal audit report
B. Direct the IT team to remediate the gaps immediately
C. Validate the self-assessed findings through independent testing
D. Accept the findings as reported by the team
Reveal Answer
Correct: C
CSA findings need independent validation — the auditor facilitates CSA but cannot blindly accept self-assessed results (D is the trap). B is wrong because the auditor doesn't direct management actions. A is premature without validation.
Q3. An IS auditor reviews a financial application and finds that the same employee can create, approve, and post journal entries. This BEST represents a failure of:
A. Detective controls
B. Corrective controls
C. Segregation of duties
D. Physical access controls
Reveal Answer
Correct: C
Segregation of duties (SoD) requires that no single person can complete a transaction from initiation to completion. One employee creating, approving, and posting entries violates this preventive control principle. Detective controls (A) identify issues after the fact. Corrective controls (B) fix problems. Physical access controls (D) restrict physical entry, which is unrelated to this logical access issue.

Now she knows what kind of audit she's running. The harder question: where in Meridian Corp does she even start?

Part A Section 1.3

Risk-Based Audit Planning

G5 — Ship Navigation

Risk-Based Audit Planning Process

👩‍💼

The IT department has 47 systems. Alex has 3 weeks. She can't audit everything. The senior auditor asks: "Which system, if it failed tomorrow, would hurt the company most?" Alex thinks. The payment processing system — it touches revenue, customer data, and regulatory compliance. That's where she starts. Risk-based planning means the scariest fires get the first hose.

A ship navigating through waters representing the risk-based audit planning journey
6-Step Planning Process
1
Understand Business

Learn the organization's environment and objectives

2
Identify Audit Universe

Map all auditable areas and processes

3
Risk Assessment

Evaluate risks for each auditable area

4
Rank & Prioritize

Order by risk level — high risk first

5
Develop Plan

Create the formal audit plan document

6
Allocate Resources

Assign staff, time, and budget

Key Exam Tip

When you see "FIRST" in a Domain 1 question, the answer is almost always about understanding the business or environment — not about starting fieldwork or testing. "What should the auditor do FIRST when planning an IS audit?" → Understand the business environment. Not "identify risks," not "allocate resources," not "start testing." ISACA rewards the auditor who gathers context before acting.

📰 Real World

The 2017 Equifax breach exposed 147 million Americans' personal data because the company failed to prioritize patching a known vulnerability in Apache Struts — a system that sat at the top of any reasonable risk ranking. A risk-based audit plan would have flagged this internet-facing system holding SSNs as the highest-priority target.

Test Yourself — Risk-Based Audit Planning
Q1. An IS auditor has identified 50 auditable areas. Resources allow auditing only 20 this year. What is the BEST approach to select which areas to audit?
A. Audit the areas that were not covered last year
B. Rank areas by risk level and audit the highest-risk items first
C. Randomly select 20 areas for unbiased coverage
D. Ask management which areas they prefer to have audited
Reveal Answer
Correct: B
Risk-based planning prioritizes by risk level. A (rotation) ignores current risk. C (random) wastes resources on low-risk areas. D (management preference) compromises independence — management might steer auditors away from problem areas.
Q2. During audit planning, the IS auditor discovers that a critical system was implemented six months ago without any post-implementation review. What should the auditor do FIRST?
A. Add the system to the current audit scope
B. Immediately begin testing the system's controls
C. Assess the risk associated with the system to determine audit priority
D. Report the lack of review to senior management
Reveal Answer
Correct: C
FIRST = assess risk. The trap is A (adding it to scope) or B (starting testing) without first understanding the risk. The system may or may not warrant immediate attention — risk assessment determines priority. D skips the assessment step.
Q3. What is the PRIMARY purpose of understanding the business environment during audit planning?
A. To determine the audit budget
B. To identify areas of highest risk and focus audit resources appropriately
C. To establish a good relationship with management
D. To comply with ISACA documentation standards
Reveal Answer
Correct: B
Understanding the business drives risk identification, which drives resource allocation. A is a secondary outcome. C is nice but not the purpose. D confuses documentation requirements with planning objectives.

She knows where to focus. She just doesn't know how much she might miss.

G6 — Castle Defense

The Audit Risk Model

👩‍💼

Alex tests the payroll system and gives it a clean bill of health. Two weeks later, someone finds an unauthorized $50,000 payment that slipped through. Her senior explains: "You can't control the system's complexity or whether management's controls work. But you can control how hard you look. That's detection risk — the only lever you own."

A castle defense scene illustrating the layers of the audit risk model
The Audit Risk Formula
AR = IR × CR × DR

Inherent Risk (IR)

Risk before controls are applied. Driven by the nature of the business and its complexity.

Auditor cannot control

Control Risk (CR)

Can existing controls catch threats? Risk that controls fail to prevent or detect material errors.

Auditor cannot control

Detection Risk (DR)

The only part the auditor directly controls. Quality of audit procedures determines this risk.

Auditor CAN control

Key Relationship

Inverse relationship: Strong controls (low CR) → less detection testing needed (higher acceptable DR). Weak controls → more testing required.

Key Exam Tip

ISACA will present a scenario where something went wrong after the audit and ask which risk component failed. The answer is almost always Detection Risk — because the auditor's procedures didn't catch it. Inherent risk (A) and control risk (B) are properties of the system, not the audit. If the question asks "what can the auditor do to reduce overall audit risk?" — the answer is always about improving detection procedures (more testing, better sampling, CAATs).

📰 Real World

The Colonial Pipeline ransomware attack (2021) succeeded partly because an inactive VPN account had no MFA — a control weakness that existed in plain sight. The auditors who reviewed IT controls the previous year gave it a passing grade, their detection procedures insufficient to catch a dormant but dangerous access vector.

Test Yourself — Audit Risk Model
Q1. An IS auditor has completed testing of a financial system and issued a clean opinion. Two weeks later, a $50,000 unauthorized payment is discovered that the audit did not detect. Which component of audit risk did the auditor FAIL to adequately manage?
A. Inherent risk
B. Control risk
C. Detection risk
D. Residual risk
Reveal Answer
Correct: C
Detection risk is the only component the auditor directly controls — it reflects the risk that the auditor's procedures fail to find existing problems. Inherent risk (A) and control risk (B) are properties of the system and its controls, which the auditor assesses but cannot change. Residual risk (D) is not a component of the audit risk model.
Q2. If inherent risk and control risk are both assessed as HIGH, what should the auditor do with detection risk?
A. Accept a higher detection risk to save time
B. Set detection risk as low as possible by performing more testing
C. Withdraw from the engagement
D. Rely on management's representations
Reveal Answer
Correct: B
AR = IR × CR × DR. When IR and CR are high, DR must be low to keep overall audit risk acceptable. This means more extensive testing, larger samples, and more rigorous procedures. A is backwards. C is extreme. D provides weak evidence.
Q3. Which component of the audit risk model can the IS auditor directly REDUCE?
A. Inherent risk
B. Control risk
C. Both inherent and control risk
D. Detection risk
Reveal Answer
Correct: D
Only detection risk is controlled by the auditor through the nature, timing, and extent of audit procedures. The trap is B — auditors assess control risk but cannot change whether the organization's controls actually work. That's management's responsibility.

She can't eliminate risk — but she can control how hard she looks. Now she needs to know what she's looking for.

Part A Section 1.4

Types of Controls

G7 — Workshop

Control Classifications

👩‍💼

Alex walks into the server room and the door is wide open. No badge reader, no lock, no sign-in sheet — a missing preventive control. She checks the security camera log: nothing recorded in six months. Detective control, broken too. She writes: "If something went wrong in here, nobody would know until the damage was done."

A workshop scene with different tools representing control classifications
By Function
🛡️

Preventive

Stop threats before they happen. Shields and locks.

  • Access controls
  • Encryption
  • Segregation of duties
🔍

Detective

Identify threats after they occur. Magnifying glass.

  • Log monitoring
  • IDS/IPS*
  • Audit trails

*Note: IPS (Intrusion Prevention System) has both preventive AND detective functions — it can block attacks in real-time (preventive) while also logging them (detective). ISACA may test this nuance.

🔧

Corrective

Fix damage after detection. Repair tools.

  • Backup restore
  • Patch management
  • Incident response
By Category

Administrative / Management

Policies, procedures, guidelines, risk assessments, security awareness training

Technical / Logical

Software controls: firewalls, encryption, access control lists, authentication

Physical

Tangible controls: locks, guards, CCTV, environmental controls, fencing

Key Exam Tip

ISACA prefers preventive controls, but questions often test whether you know that detective controls are appropriate when prevention isn't feasible. If the question asks what's MISSING and the system already has cameras and alarms — the answer is preventive. But if the question asks "which control is MOST appropriate for detecting unauthorized changes after they occur?" — choosing preventive is the trap. Read what the question is actually asking.

📰 Real World

The 2013 Target breach succeeded because a third-party HVAC vendor's credentials gave access to the payment network — a preventive control (network segmentation) was missing entirely. Target had detective controls (FireEye alerts fired), but staff ignored them. When preventive and detective both fail, you're left with corrective — and by then, 40 million card numbers are gone.

Test Yourself — Types of Controls
Q1. An IS auditor finds that a critical server room has no badge reader on the door. What type of control is MISSING?
A. Detective
B. Corrective
C. Compensating
D. Preventive
Reveal Answer
Correct: D
A badge reader prevents unauthorized entry — it's a preventive control. The trap is thinking 'physical security = detective' because cameras detect. A lock/badge reader on a door stops people from entering at all (preventive). Cameras would be detective.
Q2. An organization has implemented CCTV cameras, intrusion detection systems, and audit logs. All of these are examples of which type of control?
A. Preventive
B. Detective
C. Corrective
D. Compensating
Reveal Answer
Correct: B
All three identify events after they occur or while they're happening — they detect, not prevent. CCTV records activity, IDS identifies intrusions, audit logs track changes. None of these stop an unauthorized action from occurring in the first place.
Q3. When ISACA asks which control is 'MOST effective,' the answer is usually:
A. Corrective, because it fixes problems
B. Detective, because you can't prevent everything
C. Preventive, because it stops problems before they occur
D. Compensating, because it covers gaps
Reveal Answer
Correct: C
ISACA's general preference is prevention over detection over correction. Stopping a problem is better than finding it after the fact. However, always read the question context — if prevention isn't feasible, detective controls are the correct answer.

She knows what controls should exist. Now she needs to plan how to test them.

Part B Section 1.5

Audit Project Management

G8 — Train Journey

The Four Audit Stations

👩‍💼

It's Week 2 and Alex is behind schedule. Fieldwork is eating all her time — every interview spawns three more questions. Her senior pulls her aside: "You can't cut planning or reporting. If you're behind on fieldwork, narrow the scope and document why. The four phases aren't optional — but the depth within each one is negotiable."

A train journey through four stations representing the audit phases
Four Audit Phases
1

Planning

  • Define scope & objectives
  • Conduct risk assessment
  • Allocate resources
  • Develop audit program
2

Fieldwork

  • Gather evidence
  • Test controls
  • Perform substantive testing
  • Document findings
3

Reporting

  • Draft report
  • Discuss with management
  • Issue final report
  • Present findings
4

Follow-up

  • Track remediation
  • Verify corrections
  • Update risk register
  • Conduct follow-up audit
Key Exam Tip

The audit program is developed during planning, not fieldwork. An IS auditor should always discuss findings with management before issuing the final report — giving management a chance to respond is a standard requirement.

📰 Real World

The Satyam Computer Services fraud (India's "Enron," 2009) went undetected partly because auditors at PricewaterhouseCoopers rushed through fieldwork and skipped direct bank confirmations during their audit. Cutting corners on one phase cascaded into a $1.47 billion fraud going unreported for years.

Part B Section 1.6

Testing & Sampling

G9 — Two Labs

Compliance vs. Substantive Testing

👩‍💼

Alex faces a fork in the road. The backup policy says backups run nightly. She can check if the policy is being followed (compliance test) or check if the actual backup data is complete and restorable (substantive test). "Both," her senior says. "First check if the control works. If it doesn't, dig deeper into the data itself."

Two contrasting laboratory scenes representing compliance and substantive testing
C

Compliance Testing

"Does the control work?"

  • Tests controls
  • Binary result: yes/no
  • Policy-focused
  • Also called "tests of controls"
S

Substantive Testing

"Is the data accurate?"

  • Tests data/transactions
  • Quantitative analysis
  • Accuracy-focused
  • Verifies completeness & integrity
Key Exam Tip

ISACA tests the inverse relationship: strong compliance results → less substantive testing needed. But the real trap is confusing what each test does. "Does the backup run every night?" = compliance test (is the control working?). "Is the backed-up data complete and restorable?" = substantive test (is the data accurate?). If the question says "verify the control operates effectively" → compliance. If it says "verify data integrity" → substantive.

📰 Real World

During the HealthCare.gov launch disaster in 2013, compliance tests showed the system met security policy requirements on paper. But substantive testing of actual load capacity and data integrity was inadequate — and the site crashed on launch day under real-world load, failing 600,000 users in the first week and requiring hundreds of millions in emergency remediation.

G10 — Fishing Scene

Sampling Methods

👩‍💼

Alex stares at the database: 50,000 access log entries from last quarter. She can't review them all. She could pick randomly (statistical), target the suspicious-looking ones (judgmental), or take every 100th record (systematic). Each method has tradeoffs. "Choose based on your objective," her senior says. "If you need to project results to the whole population, go statistical."

A fishing scene illustrating different sampling methods for audit testing
📐

Statistical Sampling

  • Mathematical basis
  • Projectable to population
  • Quantifies sampling risk

Methods: Random, Systematic, Stratified

🎯

Non-Statistical Sampling

  • Judgment-based
  • Not projectable to population
  • Cannot quantify sampling risk

Methods: Haphazard, Block, Judgmental

Sampling Type by Testing Purpose

Attribute Sampling

Used for compliance testing (yes/no)

Variable Sampling

Used for substantive testing (amounts)

Key Exam Tip

ISACA trap: "Statistical sampling is always superior." Wrong. Judgmental (non-statistical) sampling is appropriate when the auditor's expertise can identify high-risk items more effectively than random selection. But if the question asks about projecting results to the entire population or quantifying sampling risk — only statistical sampling can do that. Also remember: attribute sampling → compliance (yes/no, pass/fail), variable sampling → substantive (dollar amounts).

📰 Real World

The Olympus Corporation accounting fraud ($1.7 billion hidden losses) persisted for 13 years partly because auditors used judgmental sampling that conveniently avoided the suspicious transactions. When your sampling method has blind spots, fraud hides in exactly those gaps.

Test Yourself — Testing & Sampling
Q1. An IS auditor wants to determine whether the password policy requiring 12-character passwords is being enforced. Which type of testing is MOST appropriate?
A. Substantive testing
B. Compliance testing
C. Variable sampling
D. Parallel simulation
Reveal Answer
Correct: B
This is a compliance test — checking whether a control (password policy) is operating effectively. The question is 'Is the rule being followed?' (yes/no), not 'Is the data accurate?' A (substantive) tests data accuracy. C (variable) is a sampling method, not a test type. D is a CAAT.
Q2. An IS auditor needs to project audit results to the entire population of transactions. Which sampling method MUST be used?
A. Judgmental sampling
B. Haphazard sampling
C. Statistical sampling
D. Block sampling
Reveal Answer
Correct: C
Only statistical sampling allows mathematical projection to the full population and quantification of sampling risk. The trap is thinking judgmental (A) is better because the auditor targets high-risk items — but judgmental results cannot be mathematically extrapolated to the population.
Q3. Compliance testing revealed that the backup control operates effectively. What is the impact on substantive testing?
A. Substantive testing can be eliminated entirely
B. Substantive testing should be increased for confirmation
C. The extent of substantive testing can be reduced
D. There is no relationship between the two
Reveal Answer
Correct: C
Working controls mean less substantive testing is needed — but NOT zero. A is the trap — substantive testing can never be completely eliminated, only reduced. There is always some substantive testing required regardless of compliance results.

She knows how to test. Now she needs to know what counts as proof.

Part B Section 1.7

Evidence Collection

G11 — Field Station

Evidence Collection Techniques

👩‍💼

The IT manager smiles reassuringly. "Trust me, the backups run every night. We've never had an issue." Alex writes it down but knows this is the weakest form of evidence — verbal assurance from the person being audited. She needs the backup logs, a test restore, and confirmation from the monitoring system. Proof, not promises.

An archaeologist at a field station illustrating evidence collection techniques
5 Evidence Collection Techniques
1
Review

Examine documents, policies, logs, and records

2
Observation

Watch processes in action and note behaviors

3
Inquiry

Interview people — ask questions and get responses

4
Re-performance

Repeat procedures independently to verify results

5
CAATs

Computer-assisted audit techniques for automated testing

Most Reliable Evidence

  • External sources
  • Original documents
  • Auditor-obtained (direct)
  • Objective/quantitative

Least Reliable Evidence

  • Internal sources
  • Verbal/oral statements
  • Auditee-provided
  • Subjective/qualitative
🧠 Mnemonic — Evidence Reliability Hierarchy

From strongest to weakest, think: "I trust the outsider. I trust what I got myself. I somewhat trust what you gave me. I barely trust what you told me."

  • 1. External independent sources — bank confirmations, third-party reports (strongest)
  • 2. Auditor-obtained documentary — logs you pulled yourself, screenshots you took
  • 3. Entity-provided documentary — documents management handed you
  • 4. Oral evidence — "trust me, the backups run every night" (weakest)
Key Exam Tip

When ISACA asks "which evidence is MOST reliable?" — rank it: external independent sources beat auditor-obtained documents, which beat entity-provided documents, which beat oral statements. The trap: a question might offer "verbal confirmation from the CFO" alongside "system-generated log." The log wins every time — even though the CFO outranks the system. Reliability comes from independence and objectivity, not authority.

📰 Real World

Wirecard's €1.9 billion fraud persisted for years because EY accepted Wirecard-provided documents instead of independently confirming balances with the banks directly. When an independent audit was finally done, the banks denied any relationship with Wirecard existed.

Test Yourself — Evidence Collection
Q1. An IT manager provides the IS auditor with a printed report showing 100% backup success rate. The auditor should PRIMARILY:
A. Accept the report as sufficient audit evidence
B. Independently verify by checking the backup system logs directly
C. Ask the IT manager to sign the report
D. Include the report in the workpapers without further testing
Reveal Answer
Correct: B
Entity-provided documentary evidence is less reliable than auditor-obtained evidence. The auditor should independently verify by accessing the system directly. A and D accept potentially unreliable evidence. C adds accountability but doesn't verify accuracy.
Q2. Which of the following represents the MOST reliable form of audit evidence?
A. Written confirmation from the CFO
B. An independent third-party penetration test report
C. System logs provided by the IT department
D. Verbal assurance from the database administrator
Reveal Answer
Correct: B
External independent evidence is the most reliable. A (CFO confirmation) is internal management representation. C (IT-provided logs) is entity-provided documentary. D (verbal) is the weakest. The third-party penetration test is both external and independent.
Q3. An auditor performs re-performance of a control by independently recalculating batch totals. This evidence is considered:
A. Oral evidence from the auditee
B. Evidence provided by the entity
C. Auditor-obtained direct evidence
D. External independent evidence
Reveal Answer
Correct: C
Re-performance generates auditor-obtained evidence — the auditor did the work independently. The trap is D — it's not external evidence because the auditor is part of the engagement, not an outside third party. But it IS direct evidence because the auditor obtained it through their own procedures.

Enjoying this? All 5 domains are completely free. If this helps your study, share it with someone else preparing for CISA.

Share on r/CISA →

She has the evidence. But reviewing it manually will take weeks.

Part B Section 1.8

Audit Data Analytics

G12 — Robot Auditor

CAATs & Continuous Auditing

👩‍💼

Alex has been manually checking access logs for two days and she's only through 200 of 50,000 records. Then a colleague shows her Generalized Audit Software. She loads all 50,000 records, writes a query for anomalies, and in twelve seconds gets a complete list of every after-hours login by terminated employees. Two days of work, done in seconds.

A robot auditor scene representing computer-assisted audit techniques and continuous auditing
CAAT Types
Test Data

Dummy transactions through live or copy system

ITF

Integrated Test Facility — test in live production

Parallel Simulation

Reprocess data through auditor's model

Embedded Modules

Audit code built into production systems

GAS

Generalized Audit Software (ACL/IDEA)

Relationship Chain
CAATs → enable → Continuous Auditing → supports → Continuous Monitoring
🧠 Mnemonic — The 5 CAAT Types

Remember: "GEP IT"

  • Generalized Audit Software (GAS) — analyse large data sets (ACL, IDEA)
  • Embedded Audit Modules — built into production systems, always-on monitoring
  • Parallel Simulation — re-process data independently through auditor's model
  • Integrated Test Facility (ITF) — test data through the LIVE system (risky!)
  • Test Data — dummy transactions to test controls (can use live or copy of system)

Continuous Auditing

Performed by auditors. Uses automated tools for ongoing assurance.

Continuous Monitoring

Performed by management. Real-time oversight of controls and operations.

Emerging Technologies

  • AI / Machine Learning
  • Data Analytics
  • Robotic Process Automation (RPA)
  • Blockchain Auditing
Key Exam Tip

ISACA loves testing who owns what: Continuous auditing = auditors. Continuous monitoring = management. If the question asks "who is responsible for continuous monitoring?" and "IS auditor" is an option, it's a trap. Also: test data uses DUMMY transactions (not real ones). ITF runs test data through the LIVE system (risky — must remove test results after). Parallel simulation is the safest CAAT because it uses a copy of the data, not the live system.

📰 Real World

JPMorgan's $6.2 billion London Whale trading loss (2012) stemmed partly from traders manually overriding the VaR model in Excel spreadsheets — a risk that automated, continuous monitoring tools would have detected far earlier. The VaR limits were breached over 300 times before anyone escalated.

Test Yourself — CAATs & Data Analytics
Q1. An IS auditor uses test data to verify that an application correctly rejects invalid transactions. Which CAAT technique is being used?
A. Parallel simulation
B. Integrated Test Facility
C. Test data method
D. Generalized Audit Software
Reveal Answer
Correct: C
Test data uses dummy transactions to test controls. The trap is B (ITF) — ITF also uses test data, but specifically through the LIVE production system with a dummy entity. The test data method can use either a live system or a copy. The question doesn't specify a live production environment with dummy entities, so test data is more precise.
Q2. Which CAAT technique carries the HIGHEST risk to the production environment?
A. Generalized Audit Software
B. Parallel simulation
C. Integrated Test Facility (ITF)
D. Embedded audit modules
Reveal Answer
Correct: C
ITF processes test data through the LIVE production system, creating risk of contaminating real data. The auditor must ensure test transactions are properly removed. GAS (A) works on data extracts. Parallel simulation (B) uses a separate model. Embedded modules (D) are pre-built and controlled.
Q3. An IS auditor discovers that an organization uses automated scripts to verify transaction integrity daily, but the results are only reviewed by the audit team during quarterly audits. What should the auditor recommend?
A. Discontinue the scripts since they add no value between audits
B. Transfer real-time exception alerts to management for immediate action
C. Increase the audit frequency to monthly
D. Replace the automated scripts with manual review
Reveal Answer
Correct: B
The scripts provide continuous auditing capability, but exceptions need continuous monitoring by management to be actionable in real time. Waiting for quarterly audit review negates the value of daily checks. Discontinuing (A) wastes the investment. Monthly audits (C) improve frequency but don't solve the real-time gap. Manual review (D) is less effective than automation.

Twelve seconds instead of two weeks. Now she needs to write up what she found — and make it stick.

Part B Section 1.9

Reporting & Communication

G13 — Building Construction

Anatomy of an Audit Report

👩‍💼

Alex writes her first audit finding: "The server room is insecure." The IT manager pushes back: "That's just your opinion." Her senior teaches her the bulletproof formula — Condition, Criteria, Cause, Effect. She rewrites: unlocked door, policy requires badge access, reader never installed, anyone can reach production servers. Now it's not an opinion. It's a fact.

A building under construction with floors representing audit report sections
Report Structure (Top to Bottom)
6 Management Response — Acknowledgment & action plans
5 Recommendations — Suggested improvements
4 Findings & Observations — What was discovered
3 Scope & Objectives — What was audited and why
2 Executive Summary — High-level overview
1 Evidence Base — Foundation of documented proof

The Audit Finding Formula: Condition, Criteria, Cause & Effect

  • Condition — What is (current state)
  • Criteria — What should be (standard)
  • Cause — Why it happened (root cause)
  • Effect — The impact (consequence)
Key Exam Tip

ISACA loves asking which component is missing from a finding. If it says "passwords are weak" without referencing a policy standard — the missing element is Criteria. Condition = what you found. Criteria = what it should be. Cause = why. Effect = so what. If ANY of the four is missing, the finding is incomplete. Also: always present findings to management before the final report — but independence violations go straight to the audit committee, not management.

📰 Real World

The OPM (Office of Personnel Management) breach in 2015 exposed 21.5 million government employees' security clearance records. Audit reports had flagged OPM's weak security for years, but the findings were vague and lacked the Condition-Criteria-Cause-Effect structure needed to compel action. Management ignored them until it was too late.

Test Yourself — Reporting & Communication
Q1. An IS auditor writes a finding that states: 'User passwords are only 6 characters long.' The audit manager says the finding is incomplete. What is MOST likely missing?
A. The condition
B. The criteria
C. The cause
D. The recommendation
Reveal Answer
Correct: B
'Passwords are 6 characters' is the condition (what is). But without stating what the standard requires (e.g., 'Policy requires 12 characters'), there's no criteria (what should be). Without criteria, the reader can't assess whether the condition is actually a problem.
Q2. An IS auditor discovers a critical vulnerability during fieldwork. The auditor should FIRST:
A. Include it in the final audit report
B. Report it immediately to management
C. Wait until all testing is complete to assess the full picture
D. Report it to external regulators
Reveal Answer
Correct: B
Critical findings should be communicated immediately — not held until the report is finished. C is the trap — while thoroughness matters, a critical vulnerability creates immediate risk. A is too slow. D may be required eventually but management gets informed first (unless it's an independence issue, which goes to the audit committee).
Q3. Before issuing the final audit report, the IS auditor should ALWAYS:
A. Get management to approve all findings
B. Discuss findings with management and allow them to respond
C. Remove any findings that management disagrees with
D. Send the report directly to the board without management review
Reveal Answer
Correct: B
ISACA standards require discussing findings with management before the final report. This gives management a chance to respond, correct factual errors, and provide action plans. A is wrong (management doesn't approve findings). C compromises integrity. D skips the required management discussion.

The report is written. But is the audit itself any good?

Part B Section 1.10

Quality Assurance

G14 — Lighthouse

Audit Quality Framework

👩‍💼

Alex submits her draft report, proud of her work. The peer reviewer sends it back with three errors: a misattributed control owner, an incorrect risk rating, and a finding that lacked sufficient evidence. Alex's first instinct is embarrassment — but her senior smiles. "This is the system working. QA catches what you miss. That's the whole point."

A lighthouse scene representing the quality assurance framework guiding audit excellence
Three Pillars of Quality
1

Internal QA

  • Ongoing reviews
  • Workpaper QA
  • Peer review
  • Standards compliance
2

External QA

  • Periodic assessment
  • Independent review
  • Benchmarking
  • ISACA conformance
3

Improvement

  • KPI tracking
  • Lessons learned
  • Training programs
  • Process optimization

Quality Assurance Flow

Internal QA + External QA Continuous Improvement
Key Exam Tip

When ISACA asks "what is the PRIMARY purpose of a QA review?" — the answer is conformance with standards, not "finding errors in the report." QA is about the audit process itself, not the auditee. Also watch for: "Who should perform the external QA review?" — it must be someone independent of the audit function. If the CAE (Chief Audit Executive) selects the reviewer, that compromises independence.

📰 Real World

After Arthur Andersen's role in the Enron scandal, the Sarbanes-Oxley Act (2002) created the PCAOB specifically to perform external quality assurance reviews of audit firms. The lesson: auditors who audit themselves without external oversight eventually stop catching their own mistakes.

Test Yourself — Quality Assurance
Q1. What is the PRIMARY purpose of an external quality assurance review of the IS audit function?
A. To identify errors in individual audit reports
B. To assess conformance with professional standards and the audit charter
C. To evaluate the technical skills of individual auditors
D. To benchmark audit fees against competitors
Reveal Answer
Correct: B
External QA reviews assess whether the audit function as a whole conforms to standards. A focuses on individual reports (that's peer review). C is about individual competence (that's training/evaluation). D is irrelevant to QA.
Q2. Who should select the firm to perform the external quality assurance review?
A. The Chief Audit Executive (CAE)
B. The IT department
C. The audit committee or board
D. The external auditors
Reveal Answer
Correct: C
The audit committee/board should select the external QA reviewer to maintain independence. The trap is A — if the CAE selects their own reviewer, independence is compromised because they're choosing who evaluates them.
Q3. Internal quality assurance activities include all of the following EXCEPT:
A. Peer review of workpapers
B. Ongoing supervision during engagements
C. Independent assessment by an external party
D. Compliance checks against ISACA standards
Reveal Answer
Correct: C
External assessment by an independent party is an EXTERNAL QA activity, not internal. All others (peer review, supervision, standards compliance checks) are performed internally by the audit team as part of ongoing QA.
🎉

Alex submits her first audit report.

Three weeks. Forty-seven systems. One clean, well-structured audit report with four findings, each with Condition, Criteria, Cause and Effect. Her senior reads it and nods. "Not bad for your first week." Alex knows she got lucky on a few things. But she also knows the framework now. And the framework is what makes an auditor.

✓ Audit Lifecycle ✓ Standards & Ethics ✓ Audit Authority ✓ Risk-Based Planning ✓ Audit Risk Model ✓ Controls ✓ Testing & Sampling ✓ Evidence ✓ CAATs ✓ Reporting ✓ Quality Assurance
Continue to Domain 2 →

Top 10 Exam Traps — Domain 1

1
❌ "The auditor should start testing ASAP"
✓ FIRST always means: understand the business/risk environment
2
❌ "CSA replaces formal audit"
✓ CSA supplements audit; auditor facilitates, never evaluates
3
❌ "Preventive controls are always best"
✓ Detective controls are correct when prevention isn't feasible
4
❌ "The auditor controls inherent and control risk"
✓ Auditor only controls DETECTION risk
5
❌ "Verbal assurance from management is reliable evidence"
✓ Weakest form; always seek documentary or external confirmation
6
❌ "Report findings to management first"
✓ Independence violations go to the AUDIT COMMITTEE
7
❌ "CAATs test data method uses real transactions"
✓ Test data uses DUMMY transactions through the live system
8
❌ "Compliance testing checks data accuracy"
✓ Compliance testing checks if controls WORK; substantive testing checks data
9
❌ "Statistical sampling is always better than judgmental"
✓ Judgmental is appropriate when expertise can identify high-risk items
10
❌ "The audit charter is approved by management"
✓ Board or AUDIT COMMITTEE approves it — management approval compromises independence

Alex's story continues. Domain 2: Meridian Corp has no IT governance framework. Domain 3: a developer says "we're doing Agile" but can't show a sprint record. All 5 domains are free.

Continue to Domain 2 →