Viruses. Worms. Trojans. Denial-of-service attacks. IT security professionals have long wrestled with these and many other external threats, and a bustling industry has sprung up to fend off the pests.
Such risks and others posed by those aiming to compromise corporate IT systems and steal data have garnered nearly all the public attention. And from a compliance perspective, protecting the ramparts against IT security threats is crucial. But it’s only part of a larger story that includes a much less sexy chapter on application controls.
A recent piece of guidance from the Institute of Internal Auditors, “Auditing Application Controls,” may not make headlines, but the eighth of the organization’s Global Technology Audit Guides explains what application controls are and shows auditors how to handle them. Success has more to do with hard work than a magic bullet from a software vendor.
First, some semantics. Say “application... To get the full story, subscribe now.
Join the Community
Full, instant access
Single-user subscription, one year | $1,199.00
For multi-user subscriptions, call (888) 519-9200