In: Accounting
Entity-Level Controls from AS5
|
A. Access control and monitoring software. |
|
B. Budgetary controls. |
|
C. Report highlighting credit sales, returns, and allowances over the complete and entire reporting period, including 30 days after the close of a financial reporting period. |
|
D. Use of control frameworks such as those provided by COSO and COBIT. |
|
E. A report of all employees not taking required vacation days. |
|
F. Development of a business interruption plan. |
|
G. Program change controls. |
|
H. Supervision. |
|
1. Controls related to the control environment. |
|
2. Controls over management override. |
|
3. The company’s risk assessment process. |
|
4. Centralized processing and controls, including shared service environments. = G |
|
5. Controls to monitor the results of operations. |
|
6. Controls to monitor other controls, including activities of the internal audit function, the audit committee and self-assessment programs. |
|
7. Controls over the period-end financial reporting process. |
|
8. Policies that address significant business control and risk management practices |
| 1. Controls related to the control environment |
Establishment of a code of cunduct Use of control frameworks such as those provided by COSO and COBIT. |
| 2. Controls over management override. |
Segregation of duties H. Supervision |
| 3. The company’s risk assessment process. |
F. Development of a business interruption plan. A report on IT risks and a risk action plan |
| 4. Centralized processing and controls, including shared service environments |
A systems development life cycle methodology (SDLC) G. Program change controls |
| 5. Controls to monitor the results of operations. |
B. Budgetary controls Service Leval agreements and reporting process |
|
6. Controls to monitor other controls, including activities of the internal audit function, the audit committee and self-assessment programs. |
E. A report of all employees not taking required vacation days. A file of signed code conduct letters |
| 7. Controls over the period-end financial reporting process. | Not covered |
| 8. Policies that address significant business control and risk management practices |
A. Access control and monitoring software. Selection and hiring control plans |