- 1、本文档共44页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Table of Contents
Page
A. Purpose and Scope 1
B. Preparatory Steps 2
C. General information 3
D. Standards 5
E. Documentation 6
F. Physical Security 8
G. Backup Procedures 9
H. Disaster Recovery 11
I. Implementation Change Control 12
J. Operations/Processing 16
(Job Scheduling, Tape Library Management, Output Handling)
K. System Security - General 19
System Security Values 20
User Group Profiles 27
Libraries 34
Objects 35
System Utilities 36
System Commands 37
System Logs 39
L. Physical Inventory 41
M. Systems Performance 42
N. Preventative Maintenance 43
A. Purpose And Scope
This program is designed to enable the auditor to examine and test the effectiveness of controls and procedures at data centers using IBM System/34, 36, 38 and AS/400 computers.
Included in the audit program are suggested audit steps that are designed to obtain evidence that key control procedures are operating effectively.
The audit approach includes: background information, standards, documentation, implementation/change controls, backup procedures (including those financial files required by law - such as general ledger, payroll, receivables, sales, cost of sales and any master file/tables required to complete the financial information - such as chart of accounts, cost, price masters), disaster recovery, computer operations and logical access security.
This guide should be read through in its entirety before an audit is commenced in order to gain a thorough understanding of the audit approach.
The Appendix contains added information on classifying data and background information on the various machines that are covered in this audit program.
B. Preparatory Steps
1. Review existing corporate computer policies and guidelines and evaluate their impact on the planned audit scope.
2. Review the workpapers and response to the prior audit report.
3. Obtain and review the current organizational chart for the releva
您可能关注的文档
最近下载
- DELIXI德力西仪表JKL5CV JKL2CV智能无功功率自动补偿控制器使用说明书 物料号:A0463099500.pdf
- 道路亮化工程项目可行性研究报告.docx
- 幼儿园必备《师德师风培训》-2024鲜版.ppt
- 新北师大版四年级数学上册《认识更大的数》练习题.pdf
- 【西南大学】[机考][0087]《计算机网络》 (3)辅导资料.doc VIP
- 四川327省考行测真题及解析.doc
- (冀教版)八年级生物下册全教案.pdf VIP
- 广东省汕头市2022-2023学年高一下学期期末考试历史试题(解析版).docx
- 专题 事件类记叙文(记叙文阅读)(原卷版).doc VIP
- 颜料红177的制备工艺分析-analysis of preparation technology of pigment red 177.docx
文档评论(0)