Comprehensive Study Guide with 103 Interactive MCQs · Based on ISACA CISA Review Manual 2025
IT Operations encompasses the daily activities required to deliver reliable, secure, and efficient IT services. The IS auditor evaluates whether operations controls are adequate to ensure availability, integrity, and confidentiality of IT services and data.
| Function | Description | Key Controls |
|---|---|---|
| Job Scheduling | Automated scheduling of batch jobs, scripts, and processes | Scheduling authorization, error handling, restart/recovery procedures |
| Output Management | Controlling and distributing system outputs (reports, print jobs) | Output distribution lists, sensitivity labels, secure disposal |
| Storage Management | Managing disk, tape, SAN, and cloud storage resources | Capacity monitoring, tiered storage, retention policies |
| Print Management | Controlling physical output and sensitive document handling | Secure print release, printer access controls, shredding policies |
| Help Desk / Service Desk | First point of contact for user IT issues and requests | Ticket logging, SLA adherence, escalation procedures |
| System Monitoring | Real-time monitoring of systems, performance, and security events | Alerting thresholds, on-call procedures, SIEM integration |
All operator activities on critical systems must be logged. IS auditors review logs to detect:
🎯 CISA Key Point: Operator logs are critical audit evidence. The IS auditor should review logs for completeness, evidence of tampering, and whether logs are reviewed regularly by management.
ITIL 4 replaces processes with 34 practices across three categories:
| Category | Key Practices |
|---|---|
| General Management | Risk management, information security management, continual improvement, knowledge management, portfolio management |
| Service Management | Incident management, problem management, service desk, change enablement, service level management, availability management, capacity & performance management, IT asset management, monitoring & event management, release management, service continuity management |
| Technical Management | Infrastructure & platform management, software development & management, deployment management |
Key availability concepts the IS auditor must know:
| Term | Definition / Formula |
|---|---|
| Availability % | (Agreed Service Time − Downtime) / Agreed Service Time × 100 |
| MTTR | Mean Time To Repair — average time to restore a failed service |
| MTBF | Mean Time Between Failures — average time between service failures |
| MTTF | Mean Time To Failure — average time until first failure (non-repairable) |
| MTBSI | Mean Time Between Service Incidents — includes all incidents |
🔵 Exam Formula: Availability = MTBF / (MTBF + MTTR). Higher MTBF and lower MTTR = higher availability. To improve availability: increase MTBF (prevent failures) or decrease MTTR (faster recovery).
ITIL's approach to continuously improving services using the CSI register and the 7-Step Improvement Process: Define → Measure → Gather → Process → Analyze → Present → Implement improvements.
The service catalogue documents all IT services offered, their descriptions, SLAs, and dependencies. IS auditors verify the catalogue is maintained, accurate, and used for service request management.
| Zone / Component | Purpose | Key Controls |
|---|---|---|
| DMZ (Demilitarized Zone) | Hosts public-facing services (web, email, DNS) between internet and internal network | Dual firewalls, no direct internet-to-internal traffic |
| Internal Network | Core business systems and user workstations | Firewall, IDS/IPS, NAC, VLAN segmentation |
| Management Network | Out-of-band management of IT infrastructure | Restricted access, separate VLAN, strong authentication |
| Guest Network | Internet access for visitors/contractors | Isolated from internal network, captive portal, bandwidth limits |
| Protocol | Use | Audit Note |
|---|---|---|
| HTTPS / TLS | Encrypted web communication | Verify TLS 1.2+ enforced; certificates valid and managed |
| SSH | Secure remote server management | Preferred over Telnet; verify key management practices |
| SNMP v3 | Network device monitoring | v1/v2 are insecure; verify v3 with authentication is used |
| DNS | Domain name resolution | DNSSEC, split DNS, DNS logging for threat detection |
| NTP | Time synchronization | Accurate time is critical for log correlation and audit trails |
⚠️ CISA Exam Point: NTP (time synchronization) accuracy is a foundational control — inaccurate system clocks make log correlation impossible and invalidate audit trails used in forensic investigations.
Capacity management ensures IT infrastructure can meet current and future business demand in a cost-effective manner. Three sub-processes:
| Metric | Description | Threshold Action |
|---|---|---|
| CPU Utilization | Percentage of processor capacity used | Alert at 80%; action at sustained 90%+ |
| Memory Utilization | RAM usage and paging/swapping frequency | Excessive paging indicates memory pressure |
| Disk I/O | Read/write throughput and latency | High latency impacts application response time |
| Network Bandwidth | Traffic volume vs. available capacity | Congestion causes packet loss and latency |
| Response Time | Time for system to respond to a user request | Compare against SLA targets |
| Throughput | Number of transactions processed per unit time | Degradation may indicate bottlenecks |
ITAM tracks and manages IT assets (hardware and software) throughout their lifecycle to optimize utilization, control costs, and ensure compliance.
| Lifecycle Stage | Key Controls |
|---|---|
| Procurement | Approved vendor list, purchase authorization, receiving verification |
| Deployment | Asset tagging, inventory recording, configuration baseline applied |
| In-Use / Maintenance | Patch management, license compliance, periodic physical verification |
| Disposal | Data sanitization (NIST SP 800-88), destruction certificates, asset deregistration |
The CMDB is the authoritative repository of all Configuration Items (CIs) and their relationships. It is the foundation for change management, incident management, and capacity planning.
Timely patching is one of the most effective security controls. IS auditors review:
🎯 CISA Key: The CMDB is only valuable if it is kept accurate and up-to-date. Outdated CMDB records undermine incident resolution, change impact analysis, and capacity planning — making configuration audits essential.
| Type | What Is Backed Up | Restore Time | Storage |
|---|---|---|---|
| Full Backup | All data every time | Fastest restore (single backup set) | Highest storage use |
| Incremental Backup | Only data changed since last backup (full OR incremental) | Slowest restore (need full + all incrementals) | Lowest storage use |
| Differential Backup | All data changed since last FULL backup | Medium restore (need full + last differential) | Medium storage use |
| Continuous Data Protection (CDP) | Every change captured in real-time | Near-zero RPO; very fast restore | Very high storage |
| Term | Definition | Who Sets It |
|---|---|---|
| RTO (Recovery Time Objective) | Maximum acceptable time to restore a service after a disruption | Business (based on business impact) |
| RPO (Recovery Point Objective) | Maximum acceptable data loss measured in time (e.g., 4 hours of data) | Business (based on data value) |
| RCO (Recovery Consistency Objective) | How consistent the data must be after recovery (for distributed systems) | Business / IT jointly |
| MTPD (Maximum Tolerable Period of Disruption) | Maximum time a business function can be unavailable before unacceptable impact | Business |
🔵 Key Relationship: RTO must be less than MTPD. RPO determines backup frequency — if RPO is 4 hours, backups must occur at least every 4 hours.
| Type | Description | RPO |
|---|---|---|
| Synchronous Replication | Write committed to primary and secondary simultaneously | Near-zero (no data loss) |
| Asynchronous Replication | Write committed to primary first; secondary updated after | Seconds to minutes of potential data loss |
Business Continuity Planning (BCP) ensures an organization can continue critical business functions during and after a disruptive event. BCP is broader than DRP — it covers all business functions, not just IT.
✅ Key Distinction: BCP covers ALL business functions (people, processes, facilities, suppliers). DRP is the IT subset of BCP focused on recovering IT systems and infrastructure.
The BIA is the foundation of BCP — it identifies what matters most and how quickly it must be restored. BIA outputs:
⚠️ CISA Exam Hot Topic: The BIA is performed BEFORE risk assessment and strategy development. The BIA tells you WHAT to protect; risk assessment tells you WHAT threats to protect against. BIA is the starting point.
| Test Type | Description | Disruption Risk |
|---|---|---|
| Document Review / Checklist Test | Review plan for completeness and currency | None |
| Structured Walkthrough (Tabletop) | Team verbally walks through scenarios — discussion-based | None |
| Simulation Test | Realistic scenario simulated; teams respond as if real (no actual failover) | Low |
| Parallel Test | Recovery systems activated alongside production; both run simultaneously | Medium — resource intensive |
| Full Interruption Test | Production systems shut down; full failover to recovery systems | HIGH — most thorough; highest risk |
| Site Type | Description | RTO | Cost |
|---|---|---|---|
| Hot Site | Fully equipped, powered, staffed facility with real-time data replication. Ready within hours | Hours (1-4 hrs) | Highest |
| Warm Site | Partially equipped facility; hardware ready but needs data restoration and configuration | Hours to days (12-72 hrs) | Medium |
| Cold Site | Shell facility with power and connectivity; no equipment — must be procured and installed | Days to weeks | Lowest |
| Mobile Site | Portable recovery facility (trailer/container) that can be deployed to any location | Days | Medium |
| Cloud Recovery | On-demand cloud infrastructure; scales rapidly; pay-per-use | Minutes to hours | Variable (low fixed cost) |
| Mirrored Site | Identical duplicate of primary site; fully synchronous; near-zero RTO/RPO | Near-zero (minutes) | Very Highest |
IS auditors assess whether DRP testing is:
🎯 Critical Audit Point: An untested DRP is not a reliable DRP. The IS auditor must verify that recovery procedures have been tested, and that actual recovery times were measured against RTO targets — not just assumed to be achievable.
Physical security uses layered controls to protect IT assets and facilities:
| Control | Purpose | Target / Standard |
|---|---|---|
| Air Conditioning / CRAC | Maintain temperature and humidity for equipment reliability | ASHRAE: 18-27°C (64-81°F); 40-60% humidity |
| Fire Suppression | Detect and suppress fires without damaging equipment | FM-200, Novec 1230 (gaseous); water mist; NOT standard sprinklers near equipment |
| UPS (Uninterruptible Power Supply) | Continuous power during brief outages and voltage fluctuations | Sufficient capacity for graceful shutdown or generator startup |
| Generator | Extended backup power during prolonged outages | Regular testing; adequate fuel supply (72+ hours) |
| Raised Floor | Cable routing and cold air distribution underneath | Hot aisle / cold aisle containment configuration |
| Water/Leak Detection | Detect water ingress from flooding, HVAC condensation, pipes | Sensors under raised floor and near HVAC units |
A mantrap consists of two interlocking doors where the first must close before the second can open. It prevents tailgating/piggybacking — one of the most important physical security controls for data centers.
| Model | Customer Manages | Provider Manages |
|---|---|---|
| IaaS | OS, middleware, runtime, apps, data, access | Physical, network, hypervisor, storage hardware |
| PaaS | Applications, data, access management | Physical, network, OS, middleware, runtime |
| SaaS | Data classification, access management, user activity | Everything else including application |
| Term | ITIL Definition | Example |
|---|---|---|
| Event | Any change of state with significance for service management | CPU utilization reaches 85% threshold |
| Incident | Unplanned interruption or reduction in quality of an IT service | Email server down; application slow |
| Problem | The underlying cause of one or more incidents | Memory leak causing repeated application crashes |
| Known Error | A problem with a documented root cause and workaround | Known bug with a documented restart workaround pending vendor patch |
Problem management identifies and eliminates root causes to prevent incident recurrence. Two modes:
Root Cause Analysis (RCA) Techniques:
| Phase | Key Activities |
|---|---|
| Preparation | IRP development, tools, training, communication plans |
| Detection & Analysis | Identify incident, classify severity, collect evidence |
| Containment | Short-term (isolate) and long-term containment strategies |
| Eradication | Remove threat (malware, attacker access, vulnerabilities) |
| Recovery | Restore systems; verify normal operation; monitor closely |
| Post-Incident Activity | Lessons learned, report, improve controls |
⚠️ Evidence Preservation: During security incidents, evidence must be preserved using forensically sound methods (chain of custody, disk imaging, write blockers). Improper handling destroys admissibility in legal proceedings.
