The objective of this audit is to review the general ICT infrastructure of KHRC, system security employed, controls and policy decisions required to ensure the protection of all internal information systems and data.
The expected output of this audit will be a report that details the dependability of existing systems at the commission, recommends improvements to these systems and provide a basis for the formulation of an ICT policy.
The scope will entail conducting an assessment of ICT systems as per Section C: Audit Services Required. This includes: identification and evaluation of both hardware and software of the commission and recommending/assist in implementing a set of best practices and tools governing the ICT systems within the commission.
The Auditor will inform the Commission as soon as possible of any limitations in the scope of work he/she may find prior to or during the audit.
The IT Audit shall include, but not be limited, to the following:-
I. Operating System (OS) for servers, Databases, network equipment, Security Systems and Storage Area Networks.
a. Set up and maintenance of system parameters
c. Change Management Procedures
g. Performance, Scalability and Availability
II. Review of IT Processes and ICT Management Tools
b. Enterprise Management System
f. Data and Systems Backup Management
g. Enterprise Anti-Virus Management
j. Hardware Power Backup Management
a. Security Equipment Configurations & Policies Penetration testing and Vulnerability Assessment (PT / VA) of various security zones.
c. Network architecture review
d. Network traffic analysis and base lining
a. Network architecture review
b. Network traffic analysis and base lining
V. Review the existing policy documents of the commission such as IT Policy, IT Procurement Policy, IS Security Policy etc., and suggest required changes.
VI. Review of installed applications and web portals at the commission, with emphasis on security. Though these systems have already been tested by the developers and end-users, an audit is required as a measure to enhance quality and assurance on adequacy, security, appropriate internal checks and controls in the systems. A list of the applications to be audited will be provided to the Auditor prior to engagement.
D. Audit Planning & Reporting:
The consultants/consulting firms should deliver at the end of the Audit exercise, a complete Audit Report comprising an Executive Summary, Findings and Recommendations which should include, but not limited to, System Vulnerabilities, Security Program Management of Information Technology Resources and Application Life Cycle Controls.
The Auditor should in accordance with ISAE 3000, prepare audit documentation and obtain sufficient appropriate audit evidence to support audit findings and to draw reasonable conclusions on which to base the audit report. The Auditor should use professional judgment to determine whether audit evidence is sufficient and appropriate.
This report should be submitted to the Director, Finance & Administration. Any significant deviation from the formally approved work schedule shall be communicated to the director through periodic activity reports.
E. Knowledge & Skills requirements
The consultant/ consulting firm should have a minimum of 5 years work experience in computer systems audit. The key personnel who will be handling this assignment should be graduates in Computer Science, Computer Technology or its equivalent. They should also include their resumes in the proposal which will be considered during the initial evaluation process. They must also be members of professional bodies such as CISA, CISCO and ISACA. The consultant/ consulting firm should have undertaken similar engagements previously and have ready references to corroborate.
The Auditor will provide the Commission with CV's of the partner or other person in the audit firm who is responsible for the audit and for signing the report together with the CVs of the other audit team members. CVs will include appropriate details on the type of audits carried out by the staff indicating capability and capacity to undertake the audit as well as details on relevant specific experience. The Commission will examine the CV's before it signs an order form or other applicable contractual document for this engagement and reserves the right to reject them if they are not considered suitable for the requirements of the engagement.
The Auditor who performs this systems audit is governed by: The IFAC International Framework for Assurance Engagements and International Standard on Assurance Engagements ('ISAE') 3000 for Assurance Engagements other than Audits or Reviews of Historical Financial Information insofar as these can be applied in the specific context of a systems audit intended to provide assurance that risks to the achievement of the objectives of the Project are properly managed and controlled. The IFAC Code of Ethics for Professional Accountants (issued by IFAC's International Ethics Standards Board for Accountants (IESBA), which establishes fundamental ethical principles for Auditors with regard to integrity, objectivity, independence, professional competence and due care, confidentiality, professional behaviour and technical standards; though the auditor needn’t be an accountant, adherence to these fundamental ethical principles is paramount during the audit. The IFAC International Standards on Quality Control (ISQCs), which establish standards and provide guidance on an Auditor's system of quality control.The duration of the IT Audit exercise is expected to take around 10 weeks. The end of the contract will be determined as the audit progresses.
If you meet the criteria above submit an application to admin@khrc.or.ke by 4th January 2013 that includes: Your company profile Resumes of the key personnel to handle this assignment. 3 Professional referees of whom you have done a similar assignment for. Costing based on the work described above
No comments:
Post a Comment