IT Audit Fundamentals | Peju At Your IT Career | Skillshare

Playback Speed


1.0x


  • 0.5x
  • 0.75x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 1.75x
  • 2x

IT Audit Fundamentals

teacher avatar Peju At Your IT Career

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Watch this class and thousands more

Get unlimited access to every class
Taught by industry leaders & working professionals
Topics include illustration, design, photography, and more

Lessons in This Class

    • 1.

      1. Introduction

      0:22

    • 2.

      2. Introduction to IT Audit and Controls

      23:49

    • 3.

      3. Controls Testing and Sampling

      18:49

    • 4.

      4. Thank You

      0:17

  • --
  • Beginner level
  • Intermediate level
  • Advanced level
  • All levels

Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.

117

Students

2

Projects

About This Class

This course is for beginners that are interested in a career in IT Audit, Compliance, Governance, Risk and Controls (GRC), or Cybersecurity.  This course teaches the foundational principles that are needed for a successful career in the IT Audit and Compliance field.

This is a beginner level course for those that are new to IT Audit. However, the course is also valuable for those looking to refresh their basic knowledge about IT Audits. This course is not for those that do not need a foundational knowledge/refresher of IT Audits. See link in my profile for more information on other courses.

This course teaches the practical aspects of conducting IT audits and is not focused on the CISA certification. CISA aspirants can still benefit from taking this course because they will learn and better understand basic IT Audit concepts in preparation for the exam.

Instructional Goal

Upon completion of this course, students will be able to understand some basic principles around IT Audit and Controls Testing.

Learning Objectives

Upon completion of this course, students should be able to:

1. Understand what an IT Audit is

2. Understand what controls are and their importance

3. Understand the key elements of controls

4. Understand the different types of controls (including IT General Controls and Application Controls)

5. Understand how to select the correct sample size to test controls

Meet Your Teacher

Level: Beginner

Class Ratings

Expectations Met?
    Exceeded!
  • 0%
  • Yes
  • 0%
  • Somewhat
  • 0%
  • Not really
  • 0%

Why Join Skillshare?

Take award-winning Skillshare Original Classes

Each class has short lessons, hands-on projects

Your membership supports Skillshare teachers

Learn From Anywhere

Take classes on the go with the Skillshare app. Stream or download to watch on the plane, the subway, or wherever you learn best.

Transcripts

1. 1. Introduction: Hello, and welcome to the IT audit Fundamentals course. My name is patient and as your instructor, my goal is to share with you the foundational principles of IT audit. This course is a foundational building block that is important to gaining a better understanding of IT. Auditing and controls tested. 2. 2. Introduction to IT Audit and Controls: Okay, let's get started with the first lecture, Introduction to IT audit and controls. In this lecture, we will cover the following items. We will define IT, audits, defined controls, explain the hierarchy of controls, reasons for controls and elements of controls. We will also review control types and go over several examples to get you comfortable with the concept of controls. So first, what is an IT audit? On the screen you can see what I call the more formal definition of IT audits. In layman terms though, an IT audit is simply an examination of controls that are embedded in and around the IT system. And this controls are evaluated for effectiveness. That means we're evaluating to determine if it is working the way it's supposed to be. Easy mitigating the risk that was designed to address or does it meet minimum compliance requirements? You may be wondering, what is a control? If you do not know what a control is right now, that's okay. Hang on. We'll cover that a little later. One thing I do want to cover here is that when IT audit are performed, they only provide reasonable assurance regarding the completeness and accuracy of data in the IT systems. They do not provide absolute assurance because they are always aspects of the control environment that cannot be accounted for. E.g. automated controls can feel maybe a system goes down. Or a manual control may be overridden by any human being. Or you may have control objectives that are not adequately designed to begin with. It. Audits are not meant to be absolute. They can only give reasonable assurance regarding the completeness and accuracy of data in the IT systems. Alright, next, let's define controls. What our controls. Again, on the screen you can see a more formal definition of controls. But in layman's terms, a control is like a checkpoint activity that is implemented to reduce the risk of an unwanted action happening. The goal of a control is to mitigate risks that can hinder the company from achieving its corporate objectives. The risks could be compliance risks, operational risks, reputational risks, or even financial reporting risks. So the control is the activity that is implemented to reduce that risk. Now, let's talk about key controls, because there may be several, even hundreds of controls in an organization. However, typically only a subset of them are considered key controls. Keep controls are the controls that are really vital to protecting the integrity of the systems from a compliance perspective or from any of the other risk area perspectives, as noted on the slide. And you can see their key controls are required to achieve an objective. The failure of a key control typically has significant impact on the organization. If a non-key control fills that sometimes, okay? But if a key control fields, that usually means there's a bigger problems. So let's have an example here. E.g. a. Key control may be limiting access to make changes to the balance sheet. Meaning there's a control that limits individuals that can change the balance sheet directly. If that control fills, it means that the information in the balance sheet may not be reliable because another because an unauthorized individual may have made inappropriate changes. Please, I do want you to note that a deep understanding of controls, how they are defined and implemented is key to your success as an IT auditor. My belief is that you need to understand why you are testing a control before you can effectively designed how you test that control. If you don't understand what the control is protecting, e.g. the balance sheet or invoice payment approvals, the test that you design and perform may not be adequate to address the risk of that control not being properly implemented. Alright, let's discuss the controls hierarchy. This image depicts the hierarchy of controls or control typically exists to meet a control objective. An example of a control objective could be one. Controls provide reasonable assurance that access to the accounts payable system is limited to authorize individuals. Or second one, controls provide reasonable assurance that access to make changes to financial systems is limited to authorize individuals. These are control objectives. In order to meet these control objectives, controls such as user access controls, which limits. Individuals that can access those areas or password controls which determines or mandates that passwords must be used to access those systems. And privilege controls are implemented. Next, I'll control objective is in place to meet an audit objective. An example of audit objective is there is reasonable assurance that the financial statements can be relied upon and are free of material misstatements. Or for PCI related audit, an audit objective could be there is reasonable assurance that system's processing payments adequate, quickly secure to protect customer information. So this audit objectives are the higher level. They are the top level what needs to be achieved. In order to achieve the audit objective, we have to come down to the control objective that breaks it down further. And then in order to achieve a control objective, you need to have the actual controls that are going to help you to meet that objective. And as you can see on the slide, the audit objective is usually the purpose of the audit, what the auditor expects to achieve. And then the control objective is the objectives of management that are used as a framework for developing and implementing controls in order to meet the overall objective. Welcome to the second part of the lecture on IT audit and controls. We will start off with the reasons for controls. So let's discuss why organizations implement controls. Controls are implemented for many different reasons. One that I have here is reliability of financial reporting. Organizations need to show that they have controls in place to provide reasonable assurance that the financial reports are accurate and can be relied upon by public or private keys, the stakeholders. So in order to be able to show these, organizations need to show that they have controls in place to allow that assurance. Another item we have here is compliance with applicable laws and regulations. Controls are implemented because laws and regulations require them to be implemented. E.g. the Sarbanes-Oxley Regulation requires management to provide an assertion on controls they have implemented and tested around their financial reporting process. This is called Eco for internal controls over financial reporting. Other examples include PCI and SSE 16 regulatory standards. This also require controls to be implemented so that they can be tested against as appropriate based on those particular standard. Another reason for controls would be to achieve effectiveness and efficiency of operations. When organizations have controls, certain operational activities are more streamlined and they are better positioned to help the organization achieve its goals. While this may not be related to certain laws and standards, they are still crucial to the success of the company. E.g. there are controls around HR hiring practices to ensure that qualified candidates get hired. Or there could be controls around the protection of trade secrets or formulas. Another reason for controls is they help achieve definable, repeatable processes that improve consistency of operating results. When controls are adequately implemented, certain activities become repeatable and standardized and potentially even automated to ensure the ongoing consistency of processes. E.g. a. Trial balance reports may be reviewed periodically to identify and address any discrepancies in the financial books. Also, you may have reconciliation controls that are implemented to ensure that financial balances are always in sync across entities so that you can quickly identify and address any discrepancies. So you want to be able to check items frequently to make sure that things that are supposed to be in sync or still incident. Last and definitely not the list system security system security warrants that controls are implemented to keep or at least deter bad guys from accessing systems. User access controls, password controls, network controls, example, firewall configuration. These are all implemented to ensure that only users that are authorized and appropriate or accessing systems. So this gives an overview of some reasons for controls. Next, we'll go over elements of controls. Controls should have certain elements in order to qualify as adequate controls. Depending on the type of control, it may not have all the elements listed in this slide. However, it should have enough of these elements in order to be considered adequate. Adequate example of a control. I'm going to read an example out and then we'll go over this element. Passwords are required prior to accessing the system. So this is the password check or another control is access to the system requires a completed user access request form and approval from the manager. Those are controls for specific items in the system. So the first element is, what is a control activity? What is the control activity? E.g. it could be an authentication control and authorization control, a password control, like what I just read out. Access control or books, reconciliation control. Your control has to state what the activity is in one of the examples I read earlier, part of that is the approval of an access request form by a manager. The second element here is how often the control occurs, which is the frequency. It could be hourly, daily, weekly, or even M0. And you could also have an automated control that is just the frequent check. So you want to state what the frequency is. And if there's no set frequency, if it's automated, you want to set that as well. I'll stick that as well rather. Another element is the title the WHO that's performing the control. And if there's any segregation of duties involved, are there any potential conflicts with the person performing the control, the manager approving the form shouldn't be the same person that's creating access in the system, e.g. you want to make sure that you have a separation of duties in place. So you want to state the title of the person performing the control. In an example that I stated earlier, the manager is the person or proven the form, but then access to the system is typically granted by the administrator and you may want to include that into control. Another element here is when does the control activity occur? Is there a specific time of database occurs that's important to note. So e.g. a. Daily review of journal entries may occur at 04:00 P.M. every day before the close of business or does it occur after specific activities? Does it have any predecessors in the process? So you may want to stick this all. You may also want to state something like a temporary privilege user account activity that may take place after a user has locked out. So if there's any specific sequence for that control, That's something that you would consider adding to the control. Another element that we have here is if there are any report document files that are going to be used in performing the control, it may be reasonable to include that into control. E.g. if there is a control regarding user access reviews and you need specific access report to be generated from the system. You may want to stick that into controls so it's clear what that control is about. Or if they are balanced cross checks, account balance cross checks that requires reports from different specific systems. You may want to state that so it's clear which system or which reports are being reconciled. Last but not least, we have evidence that's produced as a result of performing the control. So when the control has been performed, what evidence will be retained to show that the control was actually performed? E.g. that could be a report with the results of reviewing users access or a report showing the account balances that were reconciled. It's something that you may consider including in your control. Now I know we've talked a lot about controls, but one important thing to notice here on the slide, a process is not in control. The process supports the control. The control objective is not the control. The control objective is simply the objective of the control. And last item is that testing is performed over the actual control. It's important to know the difference between a control which is the checkpoint activity and the process that surrounds the supports that control. And then the ultimate control objective that many key controls are going to support. This concludes this part of the lecture and the next part of the lecture, we will talk about control types. Alright, welcome to the next part of this lecture. We'll start off by talking about control types. There are different types of controls, and these are the three main types of controls. You may find other texts or other control types in audit texts, but these are typically smaller categories. These are the main categories of control types. The first one we have at the preventive controls. Preventive controls are implemented to prevent an undesirable event from happening. So these controls are put in place to try and stop something bad from happening. So the development of these controls involves trying to predict potential problems that could occur and then implementing ways to avoid those controls, e.g. passwords, you require individuals to use login IDs and passwords before they can get into systems. Or you can have another list, privilege control, meaning you only give individuals access to what they need to perform their job function. So by doing this, you are preventing potential issues down the road. The next control tab is the detective controls. Detective controls are implemented to identify undesirable events that have already occurred. So e.g. if your preventative control was not able to stop something from happening, you want to have detective controls in place so that you can actually identify if something that already happened. So this could be a periodic review of usual access to make sure that only the right individuals to have access. Or you can have several alerting and event management controls in place that notify when issues happen. So these all fall under detective controls. And the third category here, the corrective controls. Corrective controls are designed to correct errors or irregularities that have been detected. So if you already have issues that are ongoing and you are thinking of ways to fix them. That's when you bring in corrective controls. And one good example for corrective controls is the user training or retraining. If you identify that user error is the reason why a lot of preventative preventive controls are failing, then you may want to retrain or train users if they were not initially trained. Now, let's go over some control examples. The examples I have on the screen here are in no particular order, so we'll just go through them. The first one on the screen is access authorization. And the control. User access to the application must be authorized by the individual's manager prior to access being granted. Here you'd see the control element that talks about what the activity is, which is the approval or authorization by the individual's manager. And you understand that that should occur before the user access is actually granted in the application. So you can see that some of the elements we discussed previously are in this particular control. The next example that we have on the list is administrative access, and it reads super user access to the SQL Server database is restricted to DBAs. Again, this also has the element of saying who this restriction is two. Because you see here that it's talking first about the super user access in the database. And it seemed that only individuals that have a job role of DBA should have superuser access to. And it tells you what the SQL Server database, again, you can see where some of these control elements that we discussed earlier have been covered. The third example we have is about terminated user access. And it reads, all terminated users have their network account removed within two days of termination. This is also very clear. It's talking about terminated users. It's talking about the axis, specifically the network account access and is given a duration two days. Within two days of termination, network access must be removed. So it's very clear what this particular control activity is about. And the last one we have on the screen is a password control that reads. The Oracle database requires users to have passwords with at least eight alphanumeric characters, and the password must be changed at least every 90 days. Again, you can see this is very specific. It's telling you this is for the Oracle database specifically. And it's telling you the characteristics or the sentence, the configuration settings that must be enabled. So the password setting should have eight alphanumeric characters that are noted. And then you also want to make sure that there's an exploration setting that says a password expires after 90 days, which time it must be changed. Here are some additional control examples. This first one says physical access and it reads, access to the data center is limited to IT personnel. And this one is also very clear. It's talking about the datacenter and access, and it's talking about the roles IT personnel that should have access. This control could be improved upon by stating if there's any groups within the IT group that should have access or shouldn't have access. That could be an improvement to this control where you are a little bit more specific about who should have access to the data center. The next control we have on the screen is changed management. All change requests to the organization's systems must be appropriately authorized, tested, and approved prior to implementation. This also has some of the elements we discussed because you can see here we're talking about the change requests. That's the part of the control and it's telling you the specific activities that have to occur for change requests, which includes authorization, testing, and approval before you implement it in production. So the word production is missing here. That's an improvement that we could add. But you can see here that several elements are present to make it very clear. This control is about the last control that we have here, is IT policy training? And this states the new hire orientation includes basic security awareness training. And upon completion, the new hire is required to sign that they completed the training. And you can see here that it's telling you what is occurring. The activity that's occurring is the training on security awareness. And you can see here that the evidence of that control taking place or being performed is the signature of the new hire that says that they have actually completed the training. And you can see some elements coming into play here. As previously discussed. All the elements we covered a few slides ago do not need to be present in every single control, but you need a good amount of booze to make sure that control is very clear. Alright, we've reached the end of this section. Let's talk about the items that we've learned in this lecture. We learned about the definition of IT audit. We also learned about definition of controls and key controls. We reviewed the hierarchy of controls, the reasons behind controls, why organizations implement controls. We also went over the basic elements of controls. And then we discussed the different types of controls, the three main types of controls, and we close that with control examples. Thank you very much for listening to this lecture. We'll see you in the next lecture. 3. 3. Controls Testing and Sampling: Welcome to the section on controls testing. Now that we know what controls are, let us talk about testing of controls. Here are the items that we will address in this section. We'll review. Why do we test controls? The types of controls that we test, the types of tests that we perform, and how to make selections for testing. So in this first lecture here, the question is, why do we test controls? The key reason, the main reason is that we test controls to determine if they are fulfilling the purpose for which they were implemented. If a control is not fulfilling the purpose for Egypt was implemented, then it's ineffective and it may need to be changed. So it's not enough just to say, I've designed and implemented controls in the environment. It is absolutely necessary to test those controls periodically to make sure that they are actually performing and doing the work they were implemented to do. And if there are any gaps, then management will need to make the decision on how to change those controls as appropriate. Let's talk about the types of controls that we test. There are two broad categories of controls. It general controls, or some people may call it general IT controls and application controls. Application controls are specific to certain business processes that occur in an application. And B are typically based on the client's customization of an application. E.g. application controls will be controls over approval limits, authorizations for payment, e.g. this person can only approve up to X dollars for payment. Or you can also have authorization to edit specific journal entries or access to run and view specific HR reports. For a regulatory audit, the audit team, the financial audit team that is typically identified, the application controls that are part of the scope of the audit. It's important to note that application controls are alcohol them, the business controls that drive the IT general controls that are tested. On the other hand, IT general controls or you may see them referred to as IT GCS. And we refer to them as that. They are pervasive controls that support the IT environment of the organization and the impact multiple applications in use by the organization. What does that mean? This means that the IT general controls support the entire IT environment which includes the specific application that may be in scope for an audit. Generally, the IT GCS, they need to be operating effectively in order for the application controls to be relied upon. Let's talk through an example just to make things a little bit clearer. It general controls around passwords and access, which we'll look at a few examples in our prior section. Because these are for authentication and authorization, they help to ensure that individuals need to be authenticated into the IT environment before they can access systems where they have authorization. If this controls are not operating effectively, meaning many users can access finance applications without proper authentication. And they can access parts of the application without proper authorization. It will be pretty difficult to prove that only authorized users have access to the finance applications. Unauthorized individuals may have access to approve payments in the application because the IT general controls were not effective. This example goes to show the importance of IT. General controls being effective in order for the auditors are those that are testing to rely on this application controls. In the next slide, we'll go through a pictorial example. This slide here is an image that depicts what we just discussed. So you can see here the IT environment is the big circle. The IT general controls over the entire network, servers, database, and applications. The controls are all encompassing. Well, I shouldn't say all, but they have a far reach and they are very pervasive. And you can see it covers various application systems that are in scope. However, you can see that each system will have its own specific application controls that are specific to the processes within that application, depending on which of these systems is in scope for an audit, you first need to test the overall IT environment and see how reliabilities, which will then determine the extent of testing that will be performed on each individual system. So hope this has given you a little bit more clarity on the differences between IT, general controls and application controls. Since this course is about IT auditing here as some subcategories of the IT general controls. We don't go into this in depth in this particular course, but it's good to give you guys an overview of what the subcategories are. The categories are logical security, which has to do with access. We also have program changes, program development, computer operations, physical and environmental controls. Now, let's discuss the types of tests that we perform for controls. In order to test controls, you have to first determine if the control is designed adequately before you determine if it is operating effectively. The test of design is to determine whether a control is properly designed, such that if you were implemented as designed, you would operate effectively. This means that you test the control to determine if there are any gaps or issues that will prevent it from working as it is designed. E.g. let's take a look at password controls. If you want to test the design of password controls that's picked up, passwords must be alphanumeric. You want to make sure that there are documented policies in place to govern the password settings for IT systems. You would want to make sure that the system being tested also has the capability to support alphanumeric passwords. If there are no corporate policies that require alphanumeric passwords, or if the system is unable to support alphanumeric passwords, then the control is not properly designed because it will fail when you try to test the operating effectiveness. The test of design can be performed using several methods so that we can conclude on the appropriateness of the design. And we'll go over that in the next slide. The test of operating effectiveness comes after the test of design. And it's used to determine if the control is operating as intended when it was designed. Going with the example of password controls. In order to test the operating effectiveness of that control, we would obtain the password settings from the system that's been audited and make sure that the settings, the configuration settings require alphanumeric passwords from users. Showing that the setting is enabled will be the evidence that the control for alphanumeric passwords is operating effectively. There are also several methods that can be used to perform tests of operating effectiveness. And we'll also go over that in the next slide. Before we wrap up this slide, there are certain things that we need to consider when we're performing a test of operating effectiveness. You have to consider the nature of the control. Is it an automated control or is it manual? This will impact the type of evidence that you need to review for testing. You also have to consider the frequency of the operation. How often is the control performed? This will impact the selection size that you need to make to test. And you also have to consider the significance of the control and the risk of failure. How important is this control? How key is a key control? And is it prone to failure? This will also impact the selection sizes that you make when you're testing this particular control. We'll go over selection sizes in a different lecture. In general, all these items will help determine how you design the test to be performed and how you make the selection of items that you will test. Next, let's talk about testing techniques. On the previous slide, I mentioned that there are various methods to perform tests of design and test the operating effectiveness. Here are some techniques and methods for tests of design would typically perform inquiry. First, which is the same as asking people questions by an interview. We inspect documents and then we also observe processes. You have to use at least two of these methods for tests of design, because inquiry alone is never sufficient for tests of design. In cases where it is absolutely impossible to inspect evidence or observed processes, it might be acceptable to perform what is called a collaborative inquiry, which means asking two or more people the same set of interview questions in order to determine if their responses regarding the process and control are the same. For test of operating effectiveness, you can utilize the techniques listed here. Let's go through each one. Observation means that you can observe a process occur to make sure the control is performed as part of that process. An example would be observing someone using their badge. To access the server room, to test the control that access to the server room is restricted by badge access. Inspection means that you review evidence provided to you to determine if the control is operating effectively. E.g. let us look at the server room access control. You can request and obtain a report from the batch system to determine if only approved individuals have the server room permissions on their badges. You want to make sure that everybody doesn't have the brought the server room permissions on their badge. And that's restricted only to individuals that need to access the server. Re-performance means that you are performing the control again to determine if you arrive at the same conclusion as the originally performed control. An example here would be e.g. a. Reconciliation control, where you reconcile the same items in the process and see if you come up with the same results. Recalculation means that you calculate items from the controller again to determine if he come up with the same result. E.g. if the control is supposed to calculate two numbers in different accounts for reconciliation, you can manually recalculate those numbers to make sure that the numbers that we use in the reconciliation where Correct. The last item that we have here is a system query. This means you can run reports from the system to view new users that are created, changes made to a field or other applicable reports that can be used for control testing. E.g. if you want to test the approval process for new users, you can run a report from the system of all new user accounts that were created. Then you can use that list to make a selection that you would then test to determine if each user had an access request form completed and properly approved by their manager. So this actually has two elements. The example I just used, you use the system query to generate a report that you can use for selection. And then when you get your evidence for the selection, you can then use the inspection to perform a test to make sure that all the elements of the control were met. This concludes the lecture on testing techniques. Let's go into selection sizes. Welcome to the lecture on Selection sizes. In this lecture, we will cover the concept of selections. This concept is based on the fact that when performing control testing, there are usually a lot of items that are testable, but it is not practical to test everything. As such. Only sample of items that are eligible for testing, do you get tested? So let's start with what is a selection? Simply put, according to the dictionary, acylation is a carefully chosen or representative collection of people or things, in this case, items or evidence for testing. Why do we make selections? As noted earlier, it's simply because it's not feasible to look at an entire population. Let's talk through an example. So we have a control about obtaining supervisor approval prior to granting users to access. The test of operating effectiveness be to check new users created and make sure approval was granted for each user. In order to identify the new users, we would run a system query, as we discussed previously, to determine the number of new users that were created during the audit period. And for a large organization, this can easily be in the hundreds. So this could be a hundreds of individuals. If the number of new hires is say, 200, 300, 500, it's not feasible or even reasonable to test all those users. In this case, it will be more practical to make a representative selection of those users and test those. By testing a representative sample of users, we can then extrapolate the conclusion of testing for the selection to the rest of the population. When selecting samples, you have to consider how frequently the control is performed and the risk of failure. This helps you to determine what an appropriate sample size selection should be. Most organizations have sample size guide that provide guidance and the number of samples to select based on the frequency of the control and the risk of failure. And I will show you a sample guide on the next slide. Finally, you also have to consider the range of variables in the population. What this means is that you should try to cover the entire audit period in your sample selection. So it covers the entire range of variables. E.g. if your audit period is from January to December, you want to make sure that you select samples that cut across the whole year, as opposed to having samples that are skewed towards just some months of the year. So this means that sample size selection is not entirely random because it has to be a representative sample of the whole population of items. Let's look at a sample guide of selection sizes. In this particular guide, you would see here that the control frequency is on the left column. And then you have the risk of failure on the right two columns lower and higher. So what this depicts is that for each control frequency, if based on the risk of failure, if it's a lower risk of failure or higher risk of failure, you get to select which the number of items that you would test. Let's look at weekly, e.g. for a control that occurs weekly, if it has a lower risk of failure, you only need to select five items to test per this particular guide. However, if it has a higher risk of failure, then you would want to test at least eight. These numbers are just minimums. You can test at least five on the lower end of the risk of failure, or eight on the higher end of the risk of failure. It's not telling you the maximum is just the minimum number of items that need to be tested to give comfort that a representative sample has been tested. Check with your organization to see if they have a similar chart whenever you're performing testing. One thing to note is that if the nature of the control is sporadic and the control frequency cannot be clearly identified. You should determine the frequency using the entire population. If the population is 12 items in total, then you can use the frequency of Motley. Or if you have about 52 items on the population, you want to use the frequency of weekly. However, if the population is between two control frequencies defined above always use the higher frequency. So e.g. if you have 25 items, then you don't want to use monthly. You want to use weekly because you're going to that next control frequency on the chart. Alright, we've reached the end of this section. Let's go over the items that we've learned. We learned about why we test controls. We discussed the types of controls that we test, the types of tests that are performed, and then how to make selections for testing. 4. 4. Thank You: Thank you so much for taking this course, and I hope that you find are the course objectives have been met, you should have learned the fundamentals of IT auditing. If you have any questions, please do not hesitate to reach out to me. Thank you.