The techniques for gathering evidence at this phase include questionnaires, interviewing manage- ment, reviewing systems documentation, and observing activities. During this process, the IT auditor must identify the principal exposures and the controls that attempt to reduce these exposures. Having done so, the auditor proceeds to the next phase, where he or she tests the controls for compliance with preestablished standards.
đang được dịch, vui lòng đợi..