Comprehensive Study Guide with 100+ Interactive MCQs · Based on ISACA CISA Review Manual 2025
IT Governance is the system by which the current and future use of IT is directed and controlled. It involves evaluating and directing the use of IT to support the organization and monitoring this use to achieve plans.
🎯 CISA Key Point: IT governance ensures IT investments support business objectives, with accountability at the board and executive level — NOT just the IT department.
COBIT (Control Objectives for Information and Related Technologies) is the primary IT governance framework referenced in CISA. COBIT 2019 replaced COBIT 5.
| Component | Description |
|---|---|
| Governance Domain (EDM) | Evaluate, Direct, Monitor — Board-level decisions on goals & risk appetite |
| Management Domain (APO) | Align, Plan, Organise — Translates strategy into action plans |
| Management Domain (BAI) | Build, Acquire, Implement — IT project delivery |
| Management Domain (DSS) | Deliver, Service, Support — Day-to-day IT operations |
| Management Domain (MEA) | Monitor, Evaluate, Assess — Performance & compliance monitoring |
COBIT 2019 Design Factors: Enterprise strategy, enterprise goals, risk profile, I&T-related issues, threat landscape, compliance requirements, IT adoption, enterprise size.
Focus Areas: IT governance, DevOps, cybersecurity, cloud, data, digital transformation, agile.
ITIL 4 is a framework for IT service management (ITSM). While COBIT focuses on governance, ITIL focuses on service delivery.
International standard for corporate governance of IT. Six principles:
| Governance | Management |
|---|---|
| Board/executive responsibility | Management responsibility |
| Evaluate, direct, monitor | Plan, build, run, monitor |
| Sets direction & accountability | Executes within set direction |
| Strategic | Operational/tactical |
IT strategic alignment ensures IT investments and initiatives support the overall business strategy. The IS auditor evaluates whether IT plans align with business goals.
🎯 Key Audit Focus: Does the IT strategic plan derive from the business strategic plan? Is there a formal process for updating IT strategy when business strategy changes?
A business case justifies IT investments. Key components the auditor reviews:
Organizations manage IT as a portfolio of investments, categorized as:
| Category | Purpose |
|---|---|
| Run | Keep existing IT systems running (operational) |
| Grow | Expand and improve existing capabilities |
| Transform | Innovation and competitive differentiation |
The Balanced Scorecard translates strategy into performance measures across four perspectives:
IT-specific BSC (Val IT) applies these perspectives to IT value delivery.
Val IT (ISACA) focuses on IT value delivery — ensuring IT investments create business value. Three domains:
| Level | Description | Authority |
|---|---|---|
| Policy | High-level mandatory statements of intent | Board / Senior Management |
| Standard | Specific mandatory requirements supporting policies | Management |
| Procedure | Step-by-step instructions for implementing standards | IT / Operations |
| Guideline | Recommended (non-mandatory) best practices | IT / Operations |
| Baseline | Minimum security configuration requirements | Security/IT teams |
⚠️ Audit Note: Policies must be formally approved, communicated to all staff, and regularly reviewed. An outdated policy or one that staff are unaware of is a control weakness.
| Model | Characteristics | Pros/Cons |
|---|---|---|
| Centralized | Single IT department serves entire organization | Cost-efficient; may be slow to respond locally |
| Decentralized | Each business unit has own IT | Responsive; duplication of effort, inconsistency |
| Federated | Central IT sets standards; BU IT handles local needs | Balance of control & flexibility |
Critical control: no single person should have end-to-end control of a process. Key IT SoD examples:
🎯 CISA Hot Topic: Compensating controls (management review, logs, reconciliation) are required when SoD is not feasible, especially in small organizations.
| Term | Definition |
|---|---|
| Threat | Potential cause of an unwanted incident |
| Vulnerability | Weakness that can be exploited by a threat |
| Risk | Likelihood × Impact of a threat exploiting a vulnerability |
| Control/Safeguard | Measure that reduces risk |
| Residual Risk | Risk remaining after controls are applied |
| Inherent Risk | Risk before any controls are applied |
| Risk Appetite | Amount of risk an org is willing to accept |
| Risk Tolerance | Acceptable variation around risk appetite |
| Response | Description | When Used |
|---|---|---|
| Terminate (Avoid) | Stop the activity causing the risk | Risk too high, cannot control |
| Treat (Mitigate) | Implement controls to reduce likelihood/impact | Most common response |
| Transfer | Insurance, outsourcing, contracts | Risk too costly to mitigate internally |
| Tolerate (Accept) | Accept residual risk within appetite | Cost of control > potential loss |
Key quantitative formulas:
A risk register documents identified risks and tracks them. Key fields: Risk description, Category, Owner, Likelihood, Impact, Risk rating, Controls, Residual risk, Action plan, Review date.
| Metric Type | Description |
|---|---|
| KGI (Key Goal Indicators) | Measure outcomes — did we achieve our goal? (lagging indicators) |
| KPI (Key Performance Indicators) | Measure performance of processes (leading indicators) |
| KRI (Key Risk Indicators) | Early warning signals that risk may exceed appetite |
| CSF (Critical Success Factors) | Things that must go right for objectives to be achieved |
SLAs define agreed service levels between IT and the business. Key elements:
🎯 Audit Note: OLA (Operational Level Agreement) is between IT teams internally. UC (Underpinning Contract) is with external suppliers. Both support the SLA.
Comparing IT performance against industry peers or best practices. Types:
Provides management visibility into IT performance. Effective dashboards include traffic light (RAG) status, trend data, exception reporting, and alignment to business outcomes.
| Standard/Regulation | Scope |
|---|---|
| SOX (Sarbanes-Oxley) | US public companies; financial reporting controls (Section 302, 404) |
| GDPR | EU data privacy regulation; personal data protection |
| HIPAA | US healthcare; protected health information (PHI) |
| PCI-DSS | Payment card industry; credit card data security |
| ISO 27001 | Information security management system (ISMS) |
| NIST Cybersecurity Framework | Identify, Protect, Detect, Respond, Recover |
| BASEL III | Banking; operational risk and capital requirements |
SOX 404 requires management assessment and external auditor attestation of internal controls over financial reporting. Critical IT General Controls (ITGCs):
⚠️ CISA Exam Focus: IS auditors play a key role in SOX compliance — evaluating ITGCs, identifying deficiencies, and distinguishing between control deficiencies, significant deficiencies, and material weaknesses.
EA describes the structure and operation of an organization, its processes, information, and technology. Key EA frameworks:
| Domain | Focus |
|---|---|
| Business Architecture | Business strategy, governance, organization, key processes |
| Data Architecture | Structure of an organization's logical and physical data assets |
| Application Architecture | Blueprint of individual applications, interactions, relationships to business processes |
| Technology Architecture | Hardware, software, middleware, network infrastructure |
IS auditors review EA to ensure IT architecture decisions align with governance requirements, security standards, regulatory compliance, and risk management. Key audit questions include: Is there an approved EA? Are deviations from the EA formally approved? Does the EA include security and privacy by design?
| Strategy | Description | Risk |
|---|---|---|
| Insourcing | IT services delivered internally | High cost, skills gaps |
| Outsourcing | Third-party delivers IT services | Vendor dependency, data security |
| Offshoring | Outsourcing to foreign country | Regulatory, cultural, time-zone challenges |
| Nearshoring | Outsourcing to nearby country | Less timezone risk than offshoring |
| Cloud Sourcing | IT services via cloud providers | Shared responsibility, data residency |
| Multi-sourcing | Multiple suppliers for different services | Complex management, integration |
Critical for IS auditors. Key controls:
Tracking and managing IT assets throughout their lifecycle: Procurement → Deployment → Maintenance → Disposal. Key controls include asset inventory, license compliance, configuration management database (CMDB), and secure disposal (data sanitization).
Shared Responsibility Model — responsibility varies by service model:
| Level | Name | Characteristics |
|---|---|---|
| 1 | Initial | Unpredictable; ad hoc; "heroic" efforts |
| 2 | Managed | Projects managed; reactive; basic planning |
| 3 | Defined | Org-wide standard processes; proactive |
| 4 | Quantitatively Managed | Measured and controlled using statistics |
| 5 | Optimizing | Continuous improvement; innovation focus |
COBIT uses 0-5 capability levels: 0 (Incomplete) → 1 (Performed) → 2 (Managed) → 3 (Established) → 4 (Predictable) → 5 (Optimizing)
Based on TQM and ISO 9001 principles. Key concepts:
