Comprehensive Study Guide with 103 Interactive MCQs · Based on ISACA CISA Review Manual 2025
| System Type | Function | Examples |
|---|---|---|
| ERP (Enterprise Resource Planning) | Integrates core business processes across functions | SAP, Oracle ERP, Microsoft Dynamics |
| CRM (Customer Relationship Management) | Manages customer interactions, sales pipeline, support | Salesforce, HubSpot, SAP CRM |
| SCM (Supply Chain Management) | Plans and manages supply chain activities | SAP SCM, Oracle SCM |
| HRM (Human Resource Management) | Manages HR processes: payroll, recruiting, performance | Workday, SAP SuccessFactors |
| BI/Analytics | Decision support: reporting, dashboards, data mining | Tableau, Power BI, SAP Analytics |
| Transaction Processing Systems (TPS) | Records routine daily transactions | POS systems, ATMs, order entry |
| Decision Support Systems (DSS) | Supports semi-structured management decisions | Financial models, what-if analysis tools |
| Expert Systems / AI | Applies knowledge rules to support decisions | Credit scoring, medical diagnosis |
| Method | Description | Audit Consideration |
|---|---|---|
| Batch Processing | Transactions collected and processed at scheduled times | Data integrity, completeness, timing controls |
| Online/Real-Time Processing | Transactions processed immediately upon input | Input validation, concurrency controls |
| Online Batch | Input online, processing deferred to batch | Interface controls, cut-off timing |
| Distributed Processing | Processing across multiple locations/nodes | Synchronization, network controls |
🎯 ACID Properties (CISA Favorite): Atomicity (all or nothing), Consistency (valid state), Isolation (concurrent transactions independent), Durability (committed changes persist).
| Phase | Key Activities | IS Auditor Focus |
|---|---|---|
| 1. Feasibility Study | Business case, cost-benefit, options analysis, go/no-go | Is the business case approved? Are alternatives considered? |
| 2. Requirements Definition | Functional & non-functional requirements, user stories, sign-off | Are requirements complete, testable, and formally approved? |
| 3. System Design | Architecture design, database design, UI design, security design | Are security and controls designed in (not bolted on)? |
| 4. Development / Coding | Programming, unit testing, code reviews, version control | SoD between developers and production; secure coding standards |
| 5. Testing | Integration, system, UAT, performance, security testing | Is testing independent? Are test plans approved? Are defects tracked? |
| 6. Implementation | Data migration, training, cutover, parallel running | Is there a formal migration plan? Is rollback tested? |
| 7. Post-Implementation Review | Benefits realization, lessons learned, performance monitoring | Did the system meet its objectives and business case? |
The IS auditor can participate in the SDLC as:
⚠️ Independence Risk: If an IS auditor actively participates in system design, they cannot independently audit that same system later — this impairs objectivity.
| Process Group | Key Activities |
|---|---|
| Initiating | Project charter, stakeholder identification, business case approval |
| Planning | Scope, schedule, budget, risk, quality, communications plans |
| Executing | Work execution, team development, procurement, communications |
| Monitoring & Controlling | Performance measurement, change control, risk monitoring |
| Closing | Formal acceptance, lessons learned, contract closeout |
| Metric | Formula / Meaning |
|---|---|
| Schedule Variance (SV) | Earned Value (EV) − Planned Value (PV). Negative = behind schedule |
| Cost Variance (CV) | EV − Actual Cost (AC). Negative = over budget |
| Schedule Performance Index (SPI) | EV / PV. <1 = behind schedule; >1 = ahead |
| Cost Performance Index (CPI) | EV / AC. <1 = over budget; >1 = under budget |
✅ Phase Gate Review: The IS auditor may participate in phase gate reviews to assess whether adequate controls exist before the project proceeds to the next phase.
Sequential, phase-by-phase approach where each phase is completed before the next begins.
Iterative, incremental development with continuous stakeholder collaboration and adaptability to change. Governed by the Agile Manifesto (4 values, 12 principles).
Agile Values: Individuals & interactions over processes & tools | Working software over comprehensive documentation | Customer collaboration over contract negotiation | Responding to change over following a plan.
⚠️ Auditing Agile: IS auditors face challenges with Agile — documentation may be sparse, controls must be built into the process (Definition of Done, code reviews, automated testing). Audit focus shifts to continuous assurance.
Emphasizes rapid prototyping and iterative delivery over extensive planning. Relies heavily on user involvement and CASE tools. Risk: inadequate documentation and testing.
Risk-driven model combining iterative development with systematic aspects of Waterfall. Each spiral loop: Planning → Risk Analysis → Engineering → Evaluation. Best for large, high-risk systems.
| Methodology | Flexibility | Documentation | Best For |
|---|---|---|---|
| Waterfall | Low | Extensive | Stable requirements, regulated systems |
| Agile/Scrum | High | Minimal | Evolving requirements, software products |
| RAD | High | Minimal | Small projects, time-critical delivery |
| Spiral | Medium | Moderate | Large, high-risk, complex systems |
Security must be integrated throughout the SDLC, not added as an afterthought. Key practices:
| Category | Purpose | Examples |
|---|---|---|
| Input Controls | Ensure data entered is valid, accurate, complete, authorized | Field validation, range checks, completeness checks, hash totals |
| Processing Controls | Ensure data is processed accurately and completely | Run-to-run totals, before/after images, control totals, balancing |
| Output Controls | Ensure output is complete, accurate, and delivered to authorized users | Output reconciliation, distribution lists, report totals |
| Control Total Type | Description |
|---|---|
| Financial Total | Sum of a monetary field (e.g., total invoice amounts) |
| Record Count | Total number of records/transactions in batch |
| Hash Total | Sum of a non-financial field (e.g., sum of account numbers) — meaningful only for control purposes |
When data flows between systems (interfaces), controls must ensure completeness and accuracy:
Applications should maintain audit trails capturing: who did what, when, what changed (before/after values), from where. IS auditors verify audit logs are:
🎯 CISA Key Distinction: Application controls are specific to individual applications and protect application data. IT General Controls (ITGCs) are broader and provide the environment for application controls to function reliably.
| Test Type | Who Performs | Purpose |
|---|---|---|
| Unit Testing | Developer | Tests individual modules/components in isolation |
| Integration Testing | Developer / Test Team | Tests interactions between components/modules |
| System Testing | Independent Test Team | Tests complete system against requirements |
| User Acceptance Testing (UAT) | End Users / Business | Validates system meets business requirements |
| Regression Testing | Test Team | Verifies changes haven't broken existing functionality |
| Performance Testing | Test Team | Load, stress, volume, scalability testing |
| Security/Penetration Testing | Security Team / Third Party | Identifies vulnerabilities and exploits |
| Parallel Testing | Users / Operations | New and old systems run simultaneously; outputs compared |
Key questions the IS auditor asks:
⚠️ Critical Control: UAT must be performed by actual business users who will use the system — NOT by developers or IT staff. This ensures the system meets real business needs.
All defects must be: Logged with severity/priority → Assigned for resolution → Fixed → Re-tested → Formally closed. Outstanding defects should be formally accepted by business management before go-live.
Change management controls ensure that only authorized, tested changes are made to production systems. The ITIL change management process:
| Type | Description | Approval |
|---|---|---|
| Standard Change | Pre-approved, low-risk, routine change (e.g., password reset) | Pre-authorized; no CAB review needed |
| Normal Change | Requires full assessment and CAB approval | CAB approval required |
| Emergency Change | Urgent; cannot wait for standard CAB cycle (e.g., critical security patch) | ECAB (Emergency CAB); retroactive full documentation |
The IS auditor verifies:
🎯 Audit Technique: Comparing the authorized change log against the actual changes made to production is a key audit procedure to detect unauthorized changes.
Release management controls the build, testing, and deployment of releases to the production environment. Key controls: release packages (bundled changes), release testing in staging environment, release calendar, back-out plans, and production deployment authorization.
| Factor | Build (Custom Development) | Buy (COTS) |
|---|---|---|
| Fit to requirements | Exact fit possible | May require process changes |
| Cost | High initial cost | Lower initial cost; licensing ongoing |
| Time to implement | Longer | Faster |
| Maintenance | Organization responsible | Vendor responsible for updates |
| Vendor dependency | None | High (vendor viability risk) |
When acquiring packaged software, the IS auditor reviews:
An arrangement where the software source code is held by a neutral third party. Released to the customer if the vendor goes bankrupt or fails to maintain the software. Critical for business continuity.
Organizations must ensure compliance with software licenses. Risks: legal liability for unlicensed use, audit by vendors (BSA), reputational damage. IS auditors review: license inventory, software asset management tools, and reconciliation of licenses purchased vs. deployed.
| Strategy | Description | Risk Level |
|---|---|---|
| Big Bang (Direct Cutover) | Old system switched off; new system goes live immediately | HIGH — no fallback; suitable for simple, well-tested systems |
| Parallel Running | Old and new systems run simultaneously; outputs compared | LOW — but costly and resource-intensive; most thorough validation |
| Phased / Staged | System implemented in phases (by module, geography, or user group) | MEDIUM — reduces risk; allows gradual adoption |
| Pilot | New system deployed to a subset of users first; then rolled out | LOW-MEDIUM — problems identified before full deployment |
✅ CISA Exam Tip: Parallel running provides the MOST assurance during implementation but is the MOST expensive. Big bang is the highest risk strategy.
Moving data from old system to new requires rigorous controls:
User adoption is critical for implementation success. IS auditor reviews:
PIR evaluates whether the implemented system achieved its stated objectives and business case. Key PIR activities:
IT investments should deliver measurable business benefits. Benefits types:
| Benefit Type | Examples |
|---|---|
| Financial / Tangible | Cost savings, revenue increase, reduced headcount |
| Non-Financial / Intangible | Improved customer satisfaction, faster decision-making, regulatory compliance |
| Efficiency | Reduced processing time, fewer errors, automated manual processes |
| Strategic | Competitive advantage, new market access, innovation capability |
After implementation, the system enters maintenance phase. IS auditor focuses on:
When a system reaches end-of-life, IS auditors review: migration or decommission plan, data retention and archival, data sanitization before disposal, regulatory compliance for record retention, and contract termination controls.
DevOps breaks down silos between development and operations, enabling faster, more reliable delivery.
⚠️ DevOps Audit Risk: The speed of CI/CD can bypass traditional change management controls. IS auditors must ensure automated gates (automated testing, security scanning, approval workflows) compensate for reduced manual review.
"Shift Left" — integrate security testing early and throughout the development pipeline:
Software robots automate repetitive, rule-based tasks. IS auditor considerations:
Modern applications rely heavily on APIs. Key security controls: Authentication (OAuth 2.0, API keys), Rate limiting, Input validation, Encryption (HTTPS/TLS), API gateway for centralized control, and API versioning/deprecation management.
