IT Controls Assurance Use Case Design

This topic explains the IT Controls Assurance use case design.

Architecture Diagram

The following diagram shows the relationships between the applications in the IT Controls Assurance use case.

Download the source file of the diagram here: IT Controls Assurance Architecture Diagram

 

Applications and Questionnaires

The following table describes the use case applications and questionnaires.

Application/Questionnaire

Description

Control Procedures

The Control Procedures application serves as a central repository for instances of control procedures, baselines and activities that are mapped to corporate Primary Controls, establishing the foundation for enterprise-wide risk monitoring and compliance measurement. Control Procedures are categorized into two types: Technical and Process. Based on the selected type, different pieces of information are captured and different testing options are made available.

Note: The Control Procedures application is included in the Enterprise Catalog package.

Primary Controls

The Primary Controls application serves as a central repository for procedures, baselines, and activities that are mapped to corporate control standards, establishing the foundation for enterprise-wide risk monitoring and compliance measurement. Primary Controls are categorized into two types: Technical and Process. Based on the selected type, different pieces of information are captured and different testing options are made available.

Note: The Primary Controls application is included in the Enterprise Catalog package.

Control Generator

The Control Generator application allows users to create Control Procedures from Primary Controls. This allows Compliance Teams to view their controls broken down into several different options, such as Business Processes, Business Units, Applications, Devices, and Facilities.

Control Self Assessments

The Control Self Assessment application enables control owners to indicate whether the related control is still in operation and functioning as documented. The intent is that control owners would perform validation on an annual basis. If the owner indicates that the control has changed or is no longer in operation, the system flags the control as non-compliant, which prompts the organization to take follow-up action, with one possibility being removing the control from operation.

Configuration Checks

The Configuration Checks application facilitates the automated control testing of technical control procedures utilizing an automated assessment technology. To automate the compliance testing of a technical control procedure, a relationship between the control procedure and the external configuration assessment must be created. This application stores the external checks provided by the assessment technology and allows the company to map their technical control procedures in Archer to the check performed by the external system.

Configuration Check Results

The Configuration Check Results application stores the scan results fed into Archer through the Data Feed Manager to assess compliance with specified technology baselines. These records will contain the date of the scan, the device scanned, the configuration check that was performed, and the result of the check. The user may then address any instances of non-compliance through an exception request or remediation plan.

Compliance Engagement

Through the Compliance Engagement application, the Compliance Team can initiate and manage the testing life cycle, report the results of testing to executive management, and create engagements that target certain compliance scopes, control sets, or control instances.

Compliance Scope

Through the Compliance Scope application, users can define a testing scope for compliance so Compliance Teams can quickly generate and scope compliance engagements.

Evidence Repository

The Evidence Repository application provides your compliance program with a way to capture evidence for controls that you want to continuously monitor. Through this application, you can upload attachments, documents, or evidence and have an access-controlled method for capturing updates to versions of documents that have been uploaded. You can use the included workflow to submit, reassign, approve, and re-initiate the workflow for evidence records.

Design Test Results

The Design Test Results application enables you to document an evaluator’s assessment of whether a control is properly designed to achieve stated objectives and mitigate related risks. If a control is properly designed, the control meets the stated objective and the evaluator proceeds to test the control’s operating effectiveness. If, however, a control is ineffectively designed, the control is flagged as non-compliant and remediation of any related issues becomes the next step. Similar to Control Self Assessment, the intent is that design effectiveness is assessed on an annual basis.

Operating Test Results

The Operating Test Results application enables you to document the results of the operating tests designed to evaluate whether the control procedure is indeed in place and operating as intended. For SOX testing purposes, key controls should be tested on a quarterly basis with the total annual sample size to be tested and dictated by the frequency of the control’s operation.

Technical Control Manual Assessment

The Technical Control Manual Assessment questionnaire may be used to assess the compliance for devices related to their applicable technical control procedures. The admin would add the proper Archer Technical Control Content Library questions from the Question Library to match the company's technical baselines they wish to cover. The device owner could then answer the questions and the non-compliant answers would generate findings which would be linked back to the non-compliant control procedure. This is factored into the procedure's compliance rating.

Business Processes

The Business Processes application captures the base data for a given process. A process may be assigned to a particular business unit or shared across multiple business units. A business process may also be referenced to one or multiple products or services. The application enables you to track the business processes personnel, criticality, recovery time objective (RTO) and ITIL category, and associate it with other aspects of the enterprise infrastructure.

Note: The Business Processes application is included in the Enterprise Catalog package.

Applications

The Applications application stores all software applications used by the organization to perform business operations. You can view how an application is used, the people that use it, and the devices on which the application is installed. You can also track the business impact, customer impact, and licensing details, and associate it with other aspects of the enterprise infrastructure.

Note: The Applications application is included in the Enterprise Catalog package.

Devices

The Devices application serves as a central repository for knowledge, such as criticality, about IT devices and which applications they support. You can manage devices to ensure that they are protected according to management expectations. The application is also associated with other aspects of the enterprise infrastructure.

Note: The Devices application is included in the Enterprise Catalog package.

Facilities

The Facilities application maintains a listing of all organizational facilities, such as data centers and branches. You can document and review all information associated with a specific facility, such as contact personnel, location information, and technologies associated with the location.

Note: The Facilities application is included in the Enterprise Catalog package.

Information Assets

The Information Assets application allows you to manage a repository of information assets, such as credit card data, financial forecasts, employee Social Security numbers, and trademarks. Use this application to perform online assessments to determine information classification ratings and required retention periods. Link information assets to the business processes they support, the applications where they are managed, and the facilities where they are housed.

Note: The Information Assets application is included in the Enterprise Catalog package.

Question Library

The Question Library application stores assessment questions that you can reference and copy into a questionnaire. Each question is stored as an individual record, and each record contains information including the question and answer text as well as information necessary to display and score the question. Depending on the solution that you have licensed, the Question Library contains a large set of pre-built questions by default. In addition, you can add new questions and store them in the Question Library.

Storage Devices

The Storage Devices application serves as a central repository for storage devices used within the infrastructure.

Note: The Storage Devices application is included in the Enterprise Catalog package.

Technologies

The Technologies application provides a searchable and extensible repository of technology version information that can be leveraged to relate devices of like technology. Devices can be identified and grouped using 1 of the 3 tiered hierarchical values lists detailed:

  • Operating System Technology. This list details information such as the operating system vendor, product, and version of the operating system.
  • Application Technology. This list contains information such as the application vendor, name, and version of the application.
  • Hardware Technology. This list describes information relating to hardware vendor, including name, description, and technology version naming conventions.

Users can filter technologies that have been company approved and view reports detailing known vulnerabilities threatening their technologies.

Note: The Technologies application is included in the Enterprise Catalog package.

Contacts

The Contacts application serves as a central repository for contact information, is utilized across multiple areas of Archer, and contains information that is often leveraged by other use cases. Updates to a profile record within this application automatically propagate in any records with displayed contact information.

Note: The Contacts application is included in the Enterprise Catalog package.

Control Scoping Unit

The Control Scoping Unit application works in the background of Compliance Engagement and enables users to determine whether control instances are in or out of scope for a specific engagement.

This application will also house point in time snapshot of Control Procedure compliance information and related elements of risk environment and business infrastructure. Regulatory and Customer requirements dictate the need to periodically capture information about the compliance posture of the control enviroment as well as the critical elements between control and the elements of the organization they support. The Control Scoping Unit application is configured with fields to capture critical information about Control Procedure a s well as sub-form fields that enables users to capture historical information about Business Process, Business Units, Applications and Devices that Control Procedure supports. Users can leverage platform to platform data feed to enable periodic capture of this information for record keeping and reporting purposes.

Access Roles and Record Permissions

The following table describes the use case access roles.

Access Role

Description

CM: Admin

Serves as the administrator for the use case, providing create, read, update, and delete access rights.

CM: Executives

Provides create, read, and update access to executive stakeholders within the use case.

CM: Manager

Provides create, read, and update access to management stakeholders within the use case.

CM: Owner

Provides create, read, and update access to business process owners within the use case.

CM: Read Only

Provides read-only access for the use case.

CM: Tester

Provides Control Testers with read and update access to the Control Procedures application.

Note: For detailed, page-level access rights, see the Data Dictionary.

The following table describes the specific roles (fields) within the IT Controls Assurance applications. These fields may correspond to different members of the team depending on the actual nature of the controls. As part of the implementation process, these roles should be designated to the appropriate users.

Role

Description

Control Testing Submitter

Creates questionnaires that target control procedures.

Control Testing Reviewer

Tests and reviews controls, assesses the compliance of devices, and completes questionnaires and tests.

Evidence Owner

Edits and submits evidence for affected controls.

Note: This user can change user access to Evidence Repository records.

Contributor

Can submit evidence with attachments.

Control Owner/Approver

Reviews and approves submitted evidence.

Note: This user is inherited from related Primary Controls and Control Procedures records.

Dashboards

The following table describes the dashboards in this use case.

Dashboard

Description

Compliance Program Dashboard

This dashboard allows you to track the status and compliance of your Compliance Program, including active test work, assessments, and configuration check compliance by filtering work for both submitters and reviewers. Compliance by Control Set, a report in the Compliance Summary iView, is filtered by control sets that are tagged to control procedures. The report tracks compliance against different control sets that an organization attempts to comply with.

Control Testing Portal

This dashboard allows you to track active control tests, submitting and reviewing control tests, assessment evidence, scope records, and configuration check compliance by filtering work for both submitters and reviewers. Users can only see results for which they have been granted access.

Evidence Overview

This dashboard allows you to track the status of ongoing evidence collection. This dashboard features metrics, such as evidence requests that are overdue, due today, or pending approval. This dashboard also uses interactive charts to show data, such as controls based on evidence requests, overdue evidence requests by evidence provider, and evidence submitted per month. Any user who is assigned to a CM or FCM role can access this dashboard.

My Evidence Queue

This dashboard is specific to the user viewing it, and allows individual evidence providers to quickly view evidence requests that are assigned to them, with featured metrics to highlight evidence requests that are overdue, due today, or pending approval. This dashboard also shows evidence providers which control procedures they are listed on.

Data Feeds

The following table describes the data feeds in this use case.

Data Feed

Description

ITCA: Move Control Procedures to Primary Controls (1 - Source)

Moves Control Procedure records to the Primary Controls application. This data feed should be run once to populate Primary Controls. This data feed brings the top level of the Authoritative Sources (Source) and associates it to the Primary Control where applicable.

ITCA: Move Control Procedures to Primary Controls (2 - Topic)

Moves the second level of the Authoritative Sources content (Topic) to the Primary Controls application, and associates it to the newly created Primary Control, where applicable.

ITCA: Move Control Procedures to Primary Controls (3 - Section)

Moves the third level of the Authoritative Sources content (Section) to the Primary Controls application, and associates it to the newly created Primary Control, where applicable.

ITCA: Move Control Procedures to Primary Controls (4 - Sub Section)

Moves the fourth level of the Authoritative Sources content (Sub-Section) to the Primary Controls application, and associates it to the newly created Primary Control, where applicable.

ITCA: Control Snapshots

Runs against the Control Procedures application for any Control Procedures that have been queued for snapshot creation. This data feed creates a record in the Control Snapshots application using data that is selected from Control Procedures for historical reporting purposes and associates the record back to the Control Procedure so that users can look at point-in-time snapshots of their controls.

ITCA: Controls Generation

Runs against the Control Generator application. Users identify Primary Controls to be instantiated as Control Procedures and queue the Control Generator record for Control Procedure creation. This data feed generates Control Procedures using the selected variables in the Control Generator record.

ITCA: Evidence Repository

The Evidence Repository data feed runs against records being re-initiated in the workflow. The function of this feed is to create a sub-form record in the Version History section of the Evidence Repository application and associate the current document with the sub-form record, so that if a new document is uploaded during re-initiation - users have a historical record via sub-form where they can view what the document used to look like.

ITCA: Generate Assessments (Full Scope)

Creates Control Self Assessments, Design Test Results, and Operating Test Results using variables selected in the Compliance Engagement record. This data feed always uses every Control Procedure that is identified in the Scope tab of the Compliance Engagement application record.

ITCA: Generate Assessments (Partial Scope)

Creates Control Self Assessments, Design Test Results, and Operating Test Results using variables selected in the Compliance Engagement record. This data feed runs when Partial Scope is selected within a Compliance Engagement and uses Controls that are In Scope from the Partial Scope Selection section to generate assessments.

ITCA: Scope Compliance Engagement by Compliance Scope

Uses identified Compliance Scope records and associates related data to the Compliance Engagement Record. Control Procedures, Primary Controls, Business Processes, Applications, Devices, Storage Devices, Facilities, and Information Assets that are related to the Compliance Scope record are linked to the Compliance Engagement record. The data feed creates a Scoping Unit record for each Control Procedure that is associated to the Compliance Engagement.

ITCA: Scope Compliance Engagement by Compliance Scope/Control Set

Uses identified Compliance Scope records and associates related data to the Compliance Engagement Record. Control Procedures, Primary Controls, Business Processes, Applications, Devices, Storage Devices, Facilities, and Information Assets that are related to the Compliance Scope record are linked to the Compliance Engagement record. The data feed creates a Scoping Unit record for each Control Procedure that is associated to the Compliance Engagement.

ITCA: Scope Compliance Engagement by Control Procedures/Control Set

Uses identified Control Set values within Control Procedures records to identify Control Procedures matching the selected criteria and associates any related data to the Compliance Engagement Record. Business Processes, Facilities, Primary Controls, and Applications linked to Control Procedures. Information Assets, Storage Devices, and Devices linked to Applications. The data feed creates a Scoping Unit record for each Control Procedure that is associated to the Compliance Engagement.

ITCA: Scope Compliance Scope Records by Business Process

Uses identified Business Process records and associates related data to the Compliance Scope Record. Control Procedures are linked to Business Processes. Facilities, Primary Controls, and Applications are linked to Control Procedures. Information Assets, Storage Devices, and Devices are linked to Applications.

ITCA: Scope Compliance Scope Records by Control Procedure

Uses identified Control Procedures records and associates related data to the Compliance Scope Record. Business Processes, Facilities, Primary Controls, and Applications are linked to Control Procedures. Information Assets, Storage Devices, and Devices are linked to Applications.

ITCA: Scope Compliance Scope Records by Control Set

Uses identified Control Set value within Control Procedures records to identify Control Procedures matching the selected criteria and associates any related data to the Compliance Scope Record. Business Processes, Facilities, Primary Controls, and Applications are linked to Control Procedures. Information Assets, Storage Devices, and Devices are linked to Applications.

Primary Controls Automatic Evidence Collection Data Feed

This data feed automates the evidence repository records creation for Primary Control records when the Evidence Collection Method is 'automated', on a desired scheduled frequency.

Control Procedures Automatic Evidence Collection Data Feed

This data feed automates the evidence repository records creation for Control Procedure records when the Evidence Collection Method is "automated", on a desired scheduled frequency.

Data Migration from Scoping Unit to Compliance Partial Scope

This data feed migrates the records from Scoping Unit application to Control Scoping Unit application. Run this data feed after upgrading to Archer version 6.13.

Data Migration - Control Snapshot to Control Scoping Unit

This data feed migrates the records from Control Snapshot to Control Scoping Unit application. Run this data feed after upgrading to Archer version 6.13.

Data Dictionary

The IT Controls Assurance Data Dictionary contains configuration information for the use case.

You can obtain the Data Dictionary for the use case by contacting your Archer Account Representative.