第一范文网 - 专业文章范例文档资料分享平台

IBM AS400 Security Procedures

来源:用户分享 时间:2025/5/20 21:51:57 本文由loading 分享 下载这篇文档手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:xxxxxxx或QQ:xxxxxx 处理(尽可能给您提供完整文档),感谢您的支持与谅解。

IBM AS400 Security Procedures

Table of Contents

A. Purpose and Scope B. Preparatory Steps C. General information D. Standards E. Documentation F. Physical Security G. Backup Procedures H. Disaster Recovery

I. Implementation & Change Control

J. Operations/Processing

(Job Scheduling, Tape Library Management, Output Handling) K. System Security - General

System Security Values User Group Profiles Libraries Objects

System Utilities System Commands System Logs L. Physical Inventory M. Systems Performance N.

Preventative Maintenance

Page 1 2 3 5 6 8 9 11 12 16 19 20 27 34 35 36 37 39 41 42 43

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

A.

Purpose And Scope

This program is designed to enable the auditor to examine and test the effectiveness of controls and procedures at data centers using IBM System/34, 36, 38 and AS/400 computers.

Included in the audit program are suggested audit steps that are designed to obtain evidence that key control procedures are operating effectively.

The audit approach includes: background information, standards, documentation, implementation/change controls, backup procedures (including those financial files required by law - such as general ledger, payroll, receivables, sales, cost of sales and any master file/tables required to complete the financial information - such as chart of accounts, cost, price masters), disaster recovery, computer operations and logical access security.

This guide should be read through in its entirety before an audit is commenced in order to gain a thorough understanding of the audit approach.

The Appendix contains added information on classifying data and background information on the various machines that are covered in this audit program.

1

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

B.

Preparatory Steps 1.

Review existing corporate computer policies and guidelines and evaluate their impact on the planned audit scope.

Review the workpapers and response to the prior audit report. Obtain and review the current organizational chart for the relevant data center location.

Review the letter of recommendations issued by the external audit firm when evaluating the audit scope.

Document interviews and meetings with key audited personnel.

2.

3.

4.

5.

2

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

C.

General Information

1.

Document the type of data processing equipment, ownership, capacity and future expansion plans.

2.

Document the type of major software applications currently in production, who owns them and future development plans.

3.

Review insurance coverage for hardware, software, facility, etc.

4.

Determine if outside service bureaus or contract programmers are employed and list all applications processed or programmed.

5.

Review procedures for obtaining these services.

6.

Determine if any additional controls are provided to ensure all work performed by contract programmers is reviewed and approved.

7.

Evaluate the contract with the service bureau(s) or outside programmer(s) for ownership of data, confidentiality statements, etc.

8.

Review relevant job descriptions to ensure adequately defined duties, lines of responsibilities, etc.

9.

Verify that procedures are in place for management review of the daily history log of computer processing activity and program changes.

10.

Review EDP staffing policies relating to absenteeism, training, transfers and employee terminations.

11.

Verify that an EDP steering committee has been established and review objectives, members and frequency of meetings.

GENERAL

C/PROG

3

Page 1 of 2

搜索更多关于: IBM AS400 Security Procedures 的文档
IBM AS400 Security Procedures.doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.diyifanwen.net/c25auh1iacp57eja0pt8d_1.html(转载请注明文章来源)
热门推荐
Copyright © 2012-2023 第一范文网 版权所有 免责声明 | 联系我们
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:xxxxxx 邮箱:xxxxxx@qq.com
渝ICP备2023013149号
Top