云题海 - 专业文章范例文档资料分享平台

当前位置:首页 > IBM AS400 Security Procedures

IBM AS400 Security Procedures

  • 62 次阅读
  • 3 次下载
  • 2025/5/25 17:20:01

IBM AS400 Security Procedures

Table of Contents

A. Purpose and Scope B. Preparatory Steps C. General information D. Standards E. Documentation F. Physical Security G. Backup Procedures H. Disaster Recovery

I. Implementation & Change Control

J. Operations/Processing

(Job Scheduling, Tape Library Management, Output Handling) K. System Security - General

System Security Values User Group Profiles Libraries Objects

System Utilities System Commands System Logs L. Physical Inventory M. Systems Performance N.

Preventative Maintenance

Page 1 2 3 5 6 8 9 11 12 16 19 20 27 34 35 36 37 39 41 42 43

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

A.

Purpose And Scope

This program is designed to enable the auditor to examine and test the effectiveness of controls and procedures at data centers using IBM System/34, 36, 38 and AS/400 computers.

Included in the audit program are suggested audit steps that are designed to obtain evidence that key control procedures are operating effectively.

The audit approach includes: background information, standards, documentation, implementation/change controls, backup procedures (including those financial files required by law - such as general ledger, payroll, receivables, sales, cost of sales and any master file/tables required to complete the financial information - such as chart of accounts, cost, price masters), disaster recovery, computer operations and logical access security.

This guide should be read through in its entirety before an audit is commenced in order to gain a thorough understanding of the audit approach.

The Appendix contains added information on classifying data and background information on the various machines that are covered in this audit program.

1

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

B.

Preparatory Steps 1.

Review existing corporate computer policies and guidelines and evaluate their impact on the planned audit scope.

Review the workpapers and response to the prior audit report. Obtain and review the current organizational chart for the relevant data center location.

Review the letter of recommendations issued by the external audit firm when evaluating the audit scope.

Document interviews and meetings with key audited personnel.

2.

3.

4.

5.

2

Auditor(s) Assigned Audit Date

Workpaper

Audit Objectives and Procedures Ref. By

________________________________________________________________________________________________________

C.

General Information

1.

Document the type of data processing equipment, ownership, capacity and future expansion plans.

2.

Document the type of major software applications currently in production, who owns them and future development plans.

3.

Review insurance coverage for hardware, software, facility, etc.

4.

Determine if outside service bureaus or contract programmers are employed and list all applications processed or programmed.

5.

Review procedures for obtaining these services.

6.

Determine if any additional controls are provided to ensure all work performed by contract programmers is reviewed and approved.

7.

Evaluate the contract with the service bureau(s) or outside programmer(s) for ownership of data, confidentiality statements, etc.

8.

Review relevant job descriptions to ensure adequately defined duties, lines of responsibilities, etc.

9.

Verify that procedures are in place for management review of the daily history log of computer processing activity and program changes.

10.

Review EDP staffing policies relating to absenteeism, training, transfers and employee terminations.

11.

Verify that an EDP steering committee has been established and review objectives, members and frequency of meetings.

GENERAL

C/PROG

3

Page 1 of 2

搜索更多关于: IBM AS400 Security Procedures 的文档
  • 收藏
  • 违规举报
  • 版权认领
下载文档10.00 元 加入VIP免费下载
推荐下载
本文作者:...

共分享92篇相关文档

文档简介:

IBM AS400 Security Procedures Table of Contents A. Purpose and Scope B. Preparatory Steps C. General information D. Standards E. Documentation F. Physical Security G. Backup Procedures H. Disaster Recovery I. Implementation & Change Control J. Operations/Processing (Job Scheduling, Tape Library Management, Output Handling) K. System

× 游客快捷下载通道(下载后可以自由复制和排版)
单篇付费下载
限时特价:10 元/份 原价:20元
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
VIP包月下载
特价:29 元/月 原价:99元
低至 0.3 元/份 每月下载150
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219
Copyright © 云题海 All Rights Reserved. 苏ICP备16052595号-3 网站地图 客服QQ:370150219 邮箱:370150219@qq.com