教学文库网 - 权威文档分享云平台
您的当前位置:首页 > 精品文档 > 资格考试 >

IBM AS400 Security Procedures

来源:网络收集 时间:2025-09-17
导读: IBM AS400 Security Procedures Table of Contents A. Purpose and Scope B. Preparatory Steps C. General information D. Standards E. Documentation F. Physical Security G. Backup Procedures H. Disaster Recovery I. Implementation Y recommended v

IBM AS400 Security Procedures

Table of Contents

A. Purpose and Scope B. Preparatory Steps C. General information D. Standards E. Documentation F. Physical Security G. Backup Procedures H. Disaster Recovery

I. Implementation & Change Control

J. Operations/Processing

(Job Scheduling, Tape Library Management, Output Handling) K. System Security - General

System Security Values User Group Profiles Libraries Objects

System Utilities System Commands System Logs L. Physical Inventory M. Systems Performance N.

Preventative Maintenance

Page 1 2 3 5 6 8 9 11 12 16 19 20 27 34 35 36 37 39 41 42 43

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

A.

Purpose And Scope

This program is designed to enable the auditor to examine and test the effectiveness of controls and procedures at data centers using IBM System/34, 36, 38 and AS/400 computers.

Included in the audit program are suggested audit steps that are designed to obtain evidence that key control procedures are operating effectively.

The audit approach includes: background information, standards, documentation, implementation/change controls, backup procedures (including those financial files required by law - such as general ledger, payroll, receivables, sales, cost of sales and any master file/tables required to complete the financial information - such as chart of accounts, cost, price masters), disaster recovery, computer operations and logical access security.

This guide should be read through in its entirety before an audit is commenced in order to gain a thorough understanding of the audit approach.

The Appendix contains added information on classifying data and background information on the various machines that are covered in this audit program.

1

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

B.

Preparatory Steps 1.

Review existing corporate computer policies and guidelines and evaluate their impact on the planned audit scope.

Review the workpapers and response to the prior audit report. Obtain and review the current organizational chart for the relevant data center location.

Review the letter of recommendations issued by the external audit firm when evaluating the audit scope.

Document interviews and meetings with key audited personnel.

2.

3.

4.

5.

2

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

C.

General Information

1.

Document the type of data processing equipment, ownership, capacity and future expansion plans.

2.

Document the type of major software applications currently in production, who owns them and future development plans.

3.

Review insurance coverage for hardware, software, facility, etc.

4.

Determine if outside service bureaus or contract programmers are employed and list all applications processed or programmed.

5.

Review procedures for obtaining these services.

6.

Determine if any additional controls are provided to ensure all work performed by contract programmers is reviewed and approved.

7.

Evaluate the contract with the service bureau(s) or outside programmer(s) for ownership of data, confidentiality statements, etc.

8.

Review relevant job descriptions to ensure adequately defined duties, lines of responsibilities, etc.

9.

Verify that procedures are in place for management review of the daily history log of computer processing activity and program changes.

10.

Review EDP staffing policies relating to absenteeism, training, transfers and employee terminations.

11.

Verify that an EDP steering committee has been established and review objectives, members and frequency of meetings.

GENERAL

C/PROG

3

Page 1 of 2

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

C.

General Information (continued)

12.

Review minutes of steering committee and management policy meetings to identify …… 此处隐藏:2713字,全部文档内容请下载后查看。喜欢就下载吧 ……

IBM AS400 Security Procedures.doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.jiaowen.net/wendang/411897.html(转载请注明文章来源)
Copyright © 2020-2025 教文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:78024566 邮箱:78024566@qq.com
苏ICP备19068818号-2
Top
× 游客快捷下载通道(下载后可以自由复制和排版)
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能出现无法下载或内容有问题,请联系客服协助您处理。
× 常见问题(客服时间:周一到周五 9:30-18:00)