Global Technology Audit Guide (GTAG) 14: Auditing User-development Applications - Download PDF

  • Item No. : 1072.dl
  • Publisher : The Institute of Internal Auditors
  • Publish Date : May 2010
  • Media : Download
  • Member Price : $0.00
  • Non-Member Price : $25.00

Add to Wish List

Learn more about the value of an IIA Membership.

Almost every organization uses some form of UDAs because they can be more easily developed, are less costly to produce, and can typically be changed with relative ease versus programs and reports developed by IT personnel.  However, once end users are given freedom to extract, manipulate, summarize, and analyze their UDA data without assistance from IT personnel, end users inherit risks once controlled by IT. These risks include data integrity, availability, and confidentiality. Because management relies on UDAs, which can be a significant part of financial reporting and operational processes, as well as related decision making; the internal auditor must determine and review UDA risks and build an audit of UDAs into the annual internal audit plan as appropriate.

 

 

 

GTAG-14, Auditing User-developed Applications, provides:

  • Direction on how to scope an internal audit of UDAs.
  • Guidance for how the internal auditor’s role as a consultant can be leveraged to assist management with developing an effective UDA control framework.
  • Considerations that internal auditors should address when performing UDA audits.
  • A sample UDA process flow as well as a UDA internal audit program and supporting worksheets to help internal auditors organize and execute an audit.