教学文库网 - 权威文档分享云平台
您的当前位置:首页 > 精品文档 > 资格考试 >

IBM AS400 Security Procedures(2)

来源:网络收集 时间:2025-09-18
导读: Auditor(s) Assigned Audit Date Workpaper Audit Objectives and Procedures Ref. By ________________________________________________________________________________________________________ D. Standards

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

D.

Standards

1.

Document who is responsible for creating and updating policies and procedures for the EDP Standards Manual.

2.

Verify that the EDP Standards Manual contains an adequate explanation of the policies for EDP procedures.

3.

Verify that the EDP Standards Manual contains: a.

Detailed procedures regarding the preparation of documentation for application systems.

b.

Conventions to be used in the development of programs.

c.

Standard forms, illustrations and their use.

d.

Security requirements for both the applications and the computer itself.

e.

Operational standards for the EDP department and surrounding areas.

STANDARDS

D/PROG

5

Page 1 of 1

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

E.

Documentation

1.

Document who is responsible for creating, maintaining and distributing application documentation.

2.

Verify that there is a formal, signed approval of each element of documentation at an appropriate management level.

3.

Verify that the documentation is maintained in secure on-site and off-site storage facilities.

4.

Verify that all major applications processed on the computer system have appropriate levels of corresponding documentation.

5.

Review selected application documentation against corresponding software programs to ensure that documentation is accurate, complete and current.

6.

For each application, verify that corresponding System Documentation contains an overview that includes: a.

The general nature and purpose of the system.

b.

The functional requirements of the system.

c.

The logical flow of the system or flow charts.

7.

For each application, verify that corresponding Program Documentation contains:

a.

Descriptions of each program and system interfaces.

b.

Input and output description.

c. Description of program logic and flow. d.

Record layouts and file descriptions.

DOCUMENTATION

E/PROG

6

Page 1of 2

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

E.

Documentation (continued)

8.

For each application, verify that corresponding User Manuals are developed, which describe the operations performed and contain: a.

Application description.

b.

Procedural requirements.

c.

Sample reports and input screens.

d.

Source documents required.

e.

Description of screens, edits, etc.

9.

Verify that current computer Operating Instructions contain:

a.

Set-up instructions.

b.

Operating system requirements.

c.

Restart and recovery procedures.

d.

Emergency procedures.

e.

Listing of program messages, responses, etc.

DOCUMENTATION

E/PROG

7

Page 2 of 2

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

F.

Physical Security 1. 2.

Verify that the building is protected by an automatic fire extinguishing system, appropriate to the environment.

Verify that the computer room is equipped with appropriate classes and sufficient number of clearly visible fire extinguishers. Determine whether there are sufficient fire and smoke alarms appropriate to the environment.

Ensure that all exits and evacuation routes are clearly marked. Ensure that smoking is prohibited in the computer room. Document the provisions made to detect and report fires on a timely basis.

Review provisions for preventing water damage to the equipment. Verify that the computer room is accessible to only authorized personnel.

Document computer room layout and location of all major hard- ware components.

Document the procedures in place for notifying security when an employee is no longer allowed access to the building.

…… 此处隐藏:3737字,全部文档内容请下载后查看。喜欢就下载吧 ……
IBM AS400 Security Procedures(2).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.jiaowen.net/wendang/411897.html(转载请注明文章来源)
Copyright © 2020-2025 教文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:78024566 邮箱:78024566@qq.com
苏ICP备19068818号-2
Top
× 游客快捷下载通道(下载后可以自由复制和排版)
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能出现无法下载或内容有问题,请联系客服协助您处理。
× 常见问题(客服时间:周一到周五 9:30-18:00)