ITGC Review/Advisory

  • Evaluate logical access management controls to ensure user access rights are appropriate, approved, reviewed, and aligned with the principle of least privilege.
  • Assess segregation of duties across applications and systems to identify conflicts that may result in fraud, unauthorized changes, or process bypass attempts.
  • Review change management controls ensuring that system changes undergo development, testing, approval, and controlled migration into production.
  • Evaluate IT operations including data backup processes, backup retention policies, scheduled job monitoring, incident management, resolution, and system maintenance.
  • Assess cybersecurity maturity including endpoint security, network controls, firewalls, antivirus, intrusion detection, patch management, and vulnerability remediation.
  • Evaluate disaster recovery and business continuity plans including readiness of DR sites, failover capabilities, recovery time objectives (RTO), and recovery point objectives (RPO).
  • Review IT governance frameworks including technology policies, IT strategy alignment, system documentation, SOPs, and IT risk management practices.
  • Recommend improvements to enhance security posture, ensure regulatory compliance, strengthen system reliability, and improve overall IT governance maturity.
External Auditing