教学文库网 - 权威文档分享云平台
您的当前位置:首页 > 精品文档 > 资格考试 >

IBM AS400 Security Procedures(3)

来源:网络收集 时间:2025-09-18
导读: Auditor(s) Assigned Audit Date Workpaper Audit Objectives and Procedures Ref. By ________________________________________________________________________________________________________ Testing (Back

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

Testing (Backup Procedures)

1. Select a critical application to be tested based on the scope of

the review.

2. Obtain a current backup schedule for the programs and data files

selected.

3. Identify critical files used with this application on the Volume

Table Of Contents (VTOC) listing.

4. Trace files on the VTOC to the backup schedule.

5. Locate backup files in on-site storage.

6. Verify that dates on backup media agree with backup schedule.

7. Locate backup files on off-site storage. 8. Verify that dates on backup media agree with backup schedule. 9. Describe the contents of off-site storage facility.

BACKUP PROCEDURES G/TEST

10

Page 1 of 1

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

H. Disaster Recovery 1. Obtain a formal copy of the company's current disaster recovery plan.

2.

Obtain the company's list of employees and vendors to be contacted in the event of an emergency.

3.

Describe the method and extent of user involvement in the creation and maintenance of the plan.

4.

Ensure that all critical systems have been identified.

5.

Review interim manual procedures, prepared for users to continue processing critical transactions, for completeness.

6.

Review the documented results from the test of the disaster recovery plan.

7.

Review the disaster recovery plan for completeness. Some items to be considered in the review are: a.

Possible alternate processing sites.

b.

Alternate sites tested at least annually.

c.

Agreement exist for the use of the alternate sites.

d.

Availability of peripheral equipment.

e.

Defining critical systems to be processed.

f. Ability to process without key personnel.

g.

Ability to adapt plan to lesser disasters.

DISASTER RECOVERY

H/PROG

11

Page 1 of 1

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

I.

Implementation/Change Controls 1.

Verify that a formal method of project control has been established which covers all phases for the development of new/modified systems.

Document the method and reports used to control and prioritize projects.

Review the justification proposal created for all new systems, or major enhancements to existing systems, which may include: a.

Scope and purpose of the system User requirements. Cost analysis. Time estimates.

2.

3.

b.

c.

d.

4.

5.

a.

b.

c.

d.

e.

6.

CHANGE CONTROL

I/PROG Page 1 of 3

Ensure the programming phase is properly supervised by EDP management.

Completion of a programming checklist. Required approval points.

Adherence to programming standards. Target dates for completion. The assignment of programmers.

Ensure that a detailed plan has been prepared and documented which should include:

Document the approval process to ensure that a steering committee or top management is involved.

12

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

I.

Implementation/Change Controls (continued) 7. 8.

Verify that programmers perform all development work only in test libraries and using test data.

Document testing procedures established for all new/modified systems.

Ensure that users participate in the creation of test.

Verify that test results are reviewed by both EDP and User management to provide compliance with specifications.

Review the plan for converting new/modified systems from development to production. Does it include at a minimum: a. b. c.

The training of users.

Completion of documentation.

Defining user access requirements.

9.

10.

12.

13. < …… 此处隐藏:3508字,全部文档内容请下载后查看。喜欢就下载吧 ……

IBM AS400 Security Procedures(3).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.jiaowen.net/wendang/411897.html(转载请注明文章来源)
Copyright © 2020-2025 教文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:78024566 邮箱:78024566@qq.com
苏ICP备19068818号-2
Top
× 游客快捷下载通道(下载后可以自由复制和排版)
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能出现无法下载或内容有问题,请联系客服协助您处理。
× 常见问题(客服时间:周一到周五 9:30-18:00)