In: Accounting
Entity-Level Controls from AS5
A. Access control and monitoring software. |
B. Budgetary controls. |
C. Report highlighting credit sales, returns, and allowances over the complete and entire reporting period, including 30 days after the close of a financial reporting period. |
D. Use of control frameworks such as those provided by COSO and COBIT. |
E. A report of all employees not taking required vacation days. |
F. Development of a business interruption plan. |
G. Program change controls. |
H. Supervision. |
1. Controls related to the control environment. |
2. Controls over management override. |
3. The company’s risk assessment process. |
4. Centralized processing and controls, including shared service environments. = G |
5. Controls to monitor the results of operations. |
6. Controls to monitor other controls, including activities of the internal audit function, the audit committee and self-assessment programs. |
7. Controls over the period-end financial reporting process. |
8. Policies that address significant business control and risk management practices |
1. Controls related to the control environment |
Establishment of a code of cunduct Use of control frameworks such as those provided by COSO and COBIT. |
2. Controls over management override. |
Segregation of duties H. Supervision |
3. The company’s risk assessment process. |
F. Development of a business interruption plan. A report on IT risks and a risk action plan |
4. Centralized processing and controls, including shared service environments |
A systems development life cycle methodology (SDLC) G. Program change controls |
5. Controls to monitor the results of operations. |
B. Budgetary controls Service Leval agreements and reporting process |
6. Controls to monitor other controls, including activities of the internal audit function, the audit committee and self-assessment programs. |
E. A report of all employees not taking required vacation days. A file of signed code conduct letters |
7. Controls over the period-end financial reporting process. | Not covered |
8. Policies that address significant business control and risk management practices |
A. Access control and monitoring software. Selection and hiring control plans |