Enhance Security and Efficiency with IT Auditing Practices
For audit and accounting firms, legal auditors, and accountants who apply International Standards on Auditing (ISA & SOCPA) and manage comprehensive audit files, IT auditing is now a core part of every engagement. This article explains practical steps for scoping, testing and documenting IT controls; how to select appropriate sampling in auditing; what to include in Files and Working Papers; and how to integrate IT procedures into Audit Programs and Procedures, Audit Planning and Closing, and Documenting Evidence and Findings to reduce risk and support audit opinions.
Why this topic matters for auditors and accountants
IT systems now process, record and store the majority of transactions for most clients — from small corporates to large listed groups and banks. Weak controls in IT lead directly to material misstatements, fraud or breach of regulation. Auditors must therefore incorporate IT auditing into risk assessments, tests of controls and substantive procedures to satisfy requirements in International auditing standards and local SOCPA rules.
IT auditing also intersects with other specialized audit domains such as Cyber auditing and sector-specific reviews like Bank auditing, so a pragmatic and standards-based approach saves time, improves assurance quality and reduces rework.
Core concept — What is IT auditing and its components?
IT auditing is the process of evaluating IT systems, infrastructure and controls that support accounting and reporting. It spans three main layers:
- IT General Controls (ITGC): access management, change management, backup and restore, operations and systems development controls.
- Application Controls: input, processing and output controls for major applications (ERP, payroll, billing), including validation rules, reconciliations and interfaces.
- IT-dependent manual controls: manual reconciliations or compensating procedures that rely on IT-generated information.
Key deliverables and documentation (Files and Working Papers)
Typical workpapers for IT audit work include:
- IT risk assessment memo (scoping and mapping to financial statement assertions)
- Control matrix showing control owner, control description, control type and audit tests
- Test scripts, evidence logs (screenshots, extracts, hashes) and sampling worksheets
- Findings register, management responses and remediation tracking
- Final conclusion tying IT controls to substantive procedures and audit opinion
How IT auditing maps to ISA and auditing standards
IT audit procedures should be designed to satisfy requirements in ISA Standards such as understanding the entity and its environment (ISA 315), testing controls (ISA 330) and documenting audit evidence (ISA 500). For auditors operating under regional frameworks, confirm how SOCPA complements ISA for IT matters, particularly in documentation and reporting.
Practical use cases and scenarios
1) Year-end financial statement audit for a mid-size ERP client
Scenario: A 200-employee distributor uses a cloud ERP for sales, inventory and receivables. The audit team must rely on automated revenue postings and inventory valuation.
Approach: In Audit Planning and Closing include IT walkthroughs documenting interfaces, test IT access controls for privileged users, perform application controls testing (price master, credit limit checks), and run data analytics to test completeness and cutoff. Capture evidence in Files and Working Papers: screenshots, query extracts and reconciliations.
2) SOC/SaaS vendor reliance and third-party risk
Scenario: The client uses a cloud payroll provider that issues a SOC 1 report. You need to determine the extent of reliance and additional tests.
Approach: Read the SOC report, test related controls at the client (e.g., reconciliations), and as-needed perform targeted tests on payroll interface processes. Document limitations and additional procedures required in the audit program.
3) Fraud suspicion and anti-corruption inquiries
When transactions or overrides suggest possible fraud or corrupt payments, coordinate IT procedures with fraud specialists and consider enhanced logging, privileged user access review and transaction tracing. Such scenarios naturally connect to broader Auditing & anti-corruption work streams and may require legal consultation.
4) Tax audit evidence and compliance
IT controls also affect tax reporting quality. Examples include automated tax codes in invoicing systems and retention of electronic tax records. When performing a tax review, integrate IT control findings with the tax audit program to support positions under Tax auditing.
5) Operational and risk management assurance
Use IT audit outputs to inform broader Auditing & risk management activities — for example, identifying single points of failure in infrastructure or weak change controls that could amplify operational risk.
Impact on audit decisions, performance and outcomes
Effective IT auditing affects audit quality in tangible ways:
- Reduces substantive testing time when ITGCs are reliable: tested strong ITGCs can justify reduced detailed testing.
- Improves risk identification: IT findings often reveal control weaknesses that change the nature, timing and extent of audit procedures.
- Strengthens investor protection: robust IT assurance supports accurate financial reporting and enhances stakeholder confidence, linking to themes in Auditing & investor protection.
- Enables efficient use of technology: automation, analytics and tool-based evidence collection accelerate work and increase reproducibility.
For listed companies and financial institutions, IT audit outcomes directly influence regulatory reporting and remediation timelines. Coordinate internal teams and client IT to close findings promptly and include remediation testing in the next audit cycle.
Common mistakes in IT auditing and how to avoid them
- Insufficient scoping of systems: Mistake: treating IT as “IT department’s problem.” Fix: map system-to-accounting flows early in Audit Planning and Closing; document key applications in your control matrix.
- Over-reliance on vendor attestations: Mistake: accepting SOC reports without assessing their relevance or testing complementary controls. Fix: identify user entity controls and perform targeted tests at the client.
- Poor sampling and inconsistent sampling in auditing: Mistake: small or non-representative samples. Fix: adopt a sampling approach consistent with the assessment of risk — explain whether statistical or non-statistical sampling was used and document rationale.
- Weak documentation of evidence and findings: Mistake: undocumented screenshots or no hash/checksum for log extracts. Fix: use time-stamped extracts, maintain chains of custody and include step-by-step reproduction instructions in Files and Working Papers.
- Not involving IT specialists early: Mistake: missing technical nuances in setups (encryption, tokenization). Fix: involve IT specialists for environments with complex cloud or hybrid setups and link findings to technical people for remediation.
Practical, actionable tips and checklists
Below is an operational checklist you can drop into Audit Programs and Procedures and Files and Working Papers.
Planning (preliminary)
- Identify top 5 systems supporting accounting estimates and disclosures.
- Document interfaces, batch jobs and schedule of reconciliations.
- Assign IT specialist if cloud, third-party or custom code is material.
Control testing (sample tests and scripts)
- Access controls: test 10–15 privileged accounts and 25–50 regular account access changes as a rule of thumb; adjust based on population and risk.
- Change management: sample recent production changes (e.g., last quarter) and verify approval, testing and migration evidence.
- Backup & restore: verify backup frequency and perform one restore test in coordination with the client.
- Application controls: for key automated controls, test 40–60 transactional items for accuracy and completeness depending on population and risk.
Documenting evidence and findings
- Capture screenshots with timestamps; include SQL or query used to extract data.
- Hash log extracts (SHA-256) and store hashes in the workpaper index to show evidence integrity.
- Use a findings register with severity, root cause, remediation owner and target date.
Closing and follow-up
- Relate IT control conclusions to the substantive strategy in the final audit report.
- Confirm remediation actions in writing and schedule re-testing where remediation is material.
- Archive Files and Working Papers according to firm retention policies and ISA documentation requirements.
Tools and automation
Where practical, use continuous monitoring tools, log aggregators and automated query scripts to reduce manual work. Coordinate tool outputs and evidence with standard workpapers to meet ISA Standards and quality control requirements; this is especially effective when integrating with broader assurance programs such as Auditing & anti-corruption or sector reviews.
KPIs / success metrics for IT auditing
- Percentage of high-risk ITGCs with satisfactory evidence (target: ≥ 90%).
- Average time to test and document a critical control (days).
- Reduction in substantive sample size due to tested and effective ITGCs (relative %).
- Findings closure rate within 90 days (target: ≥ 75%).
- Completeness of Files and Working Papers measured by a standard checklist (target: 100% pass on internal review).
- Number of repeat IT findings year-over-year (trend should decline).
FAQ
1. What is the difference between IT auditing and cyber auditing?
IT auditing focuses on controls that affect financial reporting and compliance; cyber auditing is broader, assessing cybersecurity posture, threat management and resilience. Both overlap—use cyber audit insights to inform IT audit scope and vice versa, particularly for high-risk systems.
2. How do I choose sample sizes in IT auditing?
Sampling in auditing depends on population size, expected deviation rate and tolerable deviation. Use statistical sampling where precision is required; for many IT control tests, non-statistical sampling with documented rationale is acceptable. When in doubt, increase sample size for higher-risk areas (e.g., 50–100 items for application-level controls if population is large and risk is high).
3. What should be included in Files and Working Papers for IT procedures?
Include scoping memos, control matrices, test scripts, raw extracts, screenshots with timestamps, hash values, explanations of anomalies, conclusions and sign-offs. This demonstrates compliance with ISA documentation requirements and facilitates subsequent reviews.
4. Can I rely on automated evidence collection tools?
Yes, but verify tool integrity, access controls and extraction methods. Document how the tool obtains evidence and validate outputs with spot checks. Treat tool results as audit evidence and retain extraction scripts and configuration in the workpapers.
Reference pillar article
This article is part of a content cluster that supports our pillar piece, The Ultimate Guide: What is external audit and why is it vital for investor confidence?. Consult that guide for broader context on how IT audit outputs feed into the external audit opinion and investor assurance.
Related practical reading
For complementary topics and deeper practice notes across the audit lifecycle, see our guides on ISA Standards for documentation and testing, and specialized pages such as Auditing & risk management, Auditing & investor protection, and auditing approaches for cloud and third-party services like those discussed in Auditing & anti-corruption and Bank auditing.
For tax-specific evidence implications, consult our Tax auditing guide where IT evidence requirements often intersect with tax positions.
Next steps — quick action plan
Ready to tighten IT auditing in your firm? Follow this four-step plan:
- Update your standard Audit Programs and Procedures to include ITGC checklists and data extraction templates.
- Train at least two audit staff on IT control walkthroughs and evidence extraction per engagement.
- Adopt or pilot a lightweight evidence repository (Screenshots + hashes) to standardize Files and Working Papers.
- Use auditsheets to store and track IT findings and remediation actions to demonstrate closure and compliance across audits.
Try auditsheets to centralize workpapers, automate evidence logs, and link IT findings to audit conclusions — get a demo or start a free trial to see how it fits your methodology.