Cobit in Relation To Others International Standards
Cobit in Relation To Others International Standards
T
he US Sarbanes-Oxley Act and similar legislation
worldwide calls for increased corporate governance and was published in January 2004 and is available as a free
includes huge requirements for IT, which can be defined download from the ISACA web site,
by the term IT governance. Board members, IT professionals www.isaca.org/cobitmapping. It discusses the following
and IT auditors need guidance to implement IT governance to important international standards and guidance for IT control
maintain a level of control throughout the process. and IT security in relationship to COBIT:
The IT Governance Institute (ITGI) Research Board and the • COSO
Control Objectives for Information and related Technology • ITIL
(COBIT) Steering Committee recognized that for IT topics, • ISO/IEC17799:2000
several other standards exist in addition to COBIT. As the clear • ISO/IEC13335
target of ITGI and as shown in the recent publications from • ISO/IEC15408
Gartner Group, COBIT is the best available framework for • TickIT
control and governance for IT. For members of Information • NIST 800-14
Systens Audit and Control Association, as well as companies The result is a road map of guidance supporting IT
and organizations interested in implementing IT control and IT governance implementation. For each of the international
governance, the question arises whether and how COBIT and standards/guidance examined, the document provides a
other standards classification, a short overview of the contents and the business
can be integrated. The mapping of COBIT with several other driver for implementing the guidance, and the risks of
standards was increasingly being requested by the public. noncompliance.
ISACA and the ITGI responded with COBIT Mapping: A scheme of different dimensions that allows the
Overview of International IT Guidance. comparison of the standards was defined, and the following
The publication’s audience includes a broad spectrum of sections of this article contain an abstract of the results.
stakeholders, including ISACA members; other security,
control and audit professionals, managers, CIOs and CFOs; Document Taxonomy
corporate and IT governance professionals; government There was a need to determine whether the guidance is an
regulators; and the business community involved in the most international or a national standard, a collection of best
important standards of IT control and IT security. practices, etc. (figure 1).
The research provides all stakeholders with an overview of
the current state of security and integrity risk issues associated
with a global overview of most of the important standards of Figure 1—Description of Guidance
IT control and IT security. It also offers a detailed mapping of
ISO17799 and COBIT, as perceived by IT, business, Guidance Taxonomy
government and assurance executives in key countries around Control Objectives for Collection of publications,
Information and related classified as best practice for
the world. The overview, phase I, offers solutions to overcome Technology (COBIT) IT control and IT governance
the perception of security as a barrier, and a global overview of IT Infrastructure Library Collection of books, referred
most of the important standards of IT control and IT security. (ITIL) to as best practice for IT service
Phase II, or the detailed mapping of COBIT and ISO17799, is management
developed from a business process, accounting, security and ISO/IEC 17799:2000 International standard
control and/or audit perspective. ISO/IEC TR 13335— Technical report
Guidelines for the
Overview Phase Management of IT Security
The project was initiated to map the most important and ISO/IEC 15408—Security International standard
Techniques—Evaluation
commonly used standards and guidance to the COBIT processes Criteria for IT Security
and control objectives. The term “standard” is used to TickIT Scheme for assessment and
encompass guidance publications. While the list of certification
international standards compared in this research is not NIST 800-14—Generally Special publication
exhaustive, several standards were identified as the main Accepted Principles and Practices
guidance for IT governance. The research gives an overview of for Securing Information
the most popular guidance for managing IT, or at least parts of Technology Systems
the tasks and duties of IT. COSO Internal Control— Report
Integrated Framework
Completeness
The completeness of the standard is classified using two Figure 10—COBIT Mapping Methodology
dimensions (figure 8):
• Vertical—How detailed are the guidelines in terms of Step Description
technical or operational profundity? 1 Split the original document into segments of information that
• Horizontal—How complete is the guidance? How much of can be mapped to one or more COBIT control objectives. Those
COBIT is addressed with the guidance? What is more pieces of information will be called “information blocks.”
comprehensively addressed in the particular standard than in 2 Map the information blocks to COBIT control objectives by
COBIT? What is missing, compared to COBIT? using the following algorithm:
2a Do a 1:1 mapping—The information block fits to a single
Figure 8—Level of Detail control objective.
2b Do a 1:n mapping—The information block fits to more
than one control objective.
ITIL 2c If the information block covers a complete COBIT process,
15408 13335 map it to the COBIT process (control objective PPnn.0, e.g.,
COBIT
17799
DS5.0).
TickIT NIST 2d If 2a, 2b and 2c fail, COBIT does not cover the requirement
of this specific information block. Select the most
appropriate process and map the information chunk to
the control objective of the process.
COSO
3 Describe the requirements described by the information
narrow broad
blocks (from the original documents), and sort the result as
horizontal
defined by the COBIT Framework.
160
140
120
100
80
60
40
20
0
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
PO10
AI1
AI2
AI3
AI4
AI5
AI6
DS1
DS2
DS3
DS4
DS5
DS6
DS7
DS8
DS9
DS10
DS11
DS12
DS13
M1
M2
M3
M4
Information Systems Control Journal, formerly the IS Audit & Control Journal, is published by the Information Systems Audit and Control Association, Inc.. Membership in the association, a voluntary
organization of persons interested in information systems (IS) auditing, control and security, entitles one to receive an annual subscription to the Information Systems Control Journal.
Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of the Information Systems Audit
and Control Association and/or the IT Governance Institute® and their committees, and from opinions endorsed by authors' employers, or the editors of this Journal. Information Systems Control Journal
does not attest to the originality of authors' content.
© Copyright 2004 by Information Systems Audit and Control Association Inc., formerly the EDP Auditors Association. All rights reserved. ISCATM Information Systems Control AssociationTM
Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the
association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles
owned by the Information Systems Audit and Control Association Inc., for a flat fee of US $2.50 per article plus 25¢ per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume,
and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the
association or the copyright owner is expressly prohibited.
www.isaca.org