Audit Evidence Collection Techniques
Auditing is a process of providing an opinion (in the form of a written audit report) about the functions or processes under the scope of an audit. This audit opinion is based on the evidence obtained during the audit. Audit evidence is critical in the audit as audit opinions are based on reliability, competence, and objectivity. The objective and scope of an audit are the most significant factors when determining the extent of the data requirements.
Reliability of Evidence
An IS auditor should consider the sufficiency, competency, and reliability of the audit evidence. Evidence can be considered competent when it is valid and relevant. The following factors determine the reliability of audit evidence.
Independence of the Evidence Provider
The source of the evidence determines the reliability of the evidence. External evidence (obtained from a source outside the organization) is more reliable than evidence obtained from within the organization. A signed agreement with external parties is considered more reliable.
Qualifications of the Evidence Provider
The qualifications and experience of the evidence provider are major factors when determining the reliability of audit evidence. Information gathered from someone without relevant qualifications or experience may not be reliable.
Objectivity of the Evidence
Evidence based on judgment (involving subjectivity) is less reliable than objective evidence. Objective audit evidence does not have scope for different interpretations.
Timing of the Evidence
Audit evidence that is dynamic in nature (such as logs, files, and documents that are updated frequently) should be considered based on relevant timing.
The following figure highlights the evidence-related guidelines:
Figure 2.6: Evidence-related guidelines
The rules shown in the preceding figure are very important from a CISA exam perspective. An IS auditor should also be aware of the best practices and techniques to gather evidence. These are discussed in the next section.
Evidence-Gathering Techniques
The following techniques are used by IS auditors to gather evidence during the audit process:
Factors |
Descriptions |
Review the organization’s structure |
|
Review IS policies, processes, and standards |
|
Observations |
|
Interview technique |
|
Re-performance |
|
Process walk-through |
|
Table 2.8: Evidence-gathering factors and their descriptions
The evaluation of evidence is a subjective matter, and the auditor needs the relevant skills, experience, and qualifications to judge the relevance, sufficiency, and appropriateness of the audit evidence. In the case of inconclusive evidence, it is recommended to perform an additional test to confirm the accuracy of the audit findings.
Evidence should be evaluated based on the business environment and the complexity of the business processes. The following are some general guidelines for evidence evaluation:
- In the case of unavailability of evidence, the auditor should report the relevant risk in the audit report.
- Evidence obtained from a relevant third party is considered more reliable compared to internal evidence. An audit report by a qualified auditor is considered more reliable than a confirmation letter received from a third party.
- Evidence collected by the audit team directly from the source is considered more reliable compared to evidence provided by business units.
Computer-Assisted Audit Techniques (CAATs) are the most effective auditing tools for computerized environments. The use of a CAAT ensures the reliability of audit evidence as data is directly collected, processed, and analyzed by the IS auditor.
Key Aspects from the CISA Exam Perspective
The following table covers important aspects from the CISA exam perspective:
CISA Questions |
Possible Answers |
What does the extent of the data requirements for the audit depend on? |
The objective and scope of the audit. |
What should audit findings be supported by? |
Sufficient and appropriate audit evidence. |
What is the most important reason to obtain sufficient audit evidence? |
To provide a reasonable basis for drawing conclusions. |
What is the most effective tool for obtaining audit evidence through digital data? |
Computer-assisted auditing techniques. |
What is the most important advantage of using CAATs for gathering audit evidence? |
CAATs provide assurance about the reliability of the evidence collected. |
What type of evidence is considered most reliable? |
Evidence directly collected from the source by an IS auditor is considered to be the most reliable. The source of evidence should be independent. |
What is the primary reason for a functional walk-through? |
To understand the business process. |
Table 2.9: Key aspects from the CISA exam perspective