HG55: How to Audit z/OS Applications
(2 days, 16 CPE credits, $1170 )
- Currently available for in-house sessions
Please click: Here for Registration Form
For more information on seminar dates, locations, and hotels, and how to register, please click here:
Schedule/Registration/Locations/Hotels for IS Audit Training
This comprehensive class in mainframe application auditing shows you how to scope and plan your audit, what data to collect and how to analyze it, why mainframe applications are different from those on other types of computer, the controls that are unique to the mainframe, and how to relate your findings to the financial audit.
(For information on how to audit the security infrastructure on the mainframe and how it supports each application, two related seminars will prove useful: HG64: How to Audit z/OS with MVS, RACF, ACF2, Top Secret, CICS, DB2, and MQ Series Security and HG65: How to Audit z/OS with USS, TCP/IP, FTP, and the Internet )
An application is a collection of programs that supports a single business function, such as Payroll, Order Entry, General Ledger, or Marketing. This class shows you how to select which application to audit, how to plan and scope the audit, how to conduct the audit quickly and efficiently, how to relate this all to the financial audit, and how to document your findings and recommendations.
Whether you are auditing an application for security, quality of data, reliability, user satisfaction, cost efficiency, compliance, or some other objective, you will learn a systematic approach to conducting an effective audit.
HG55: You Will Learn:
- Characteristics of each application
- What documentation to expect on each application
- How logging is provided for each application and how to use it in the audit
- How to audit the application itself
- How to audit the control environment it lives in
- What data to collect and how to interpret it
- How to conduct the audit, from planning and scoping through follow-up
- What all the related buzzwords and acronyms mean
- How to conduct mainframe audits rapidly and efficiently, with maximum benefit to your organization
The workbook is a valuable reference, and includes complete audit programs.
Who Should Attend HG55?
- Information Techology auditors who will be auditing applications
- Financial auditors who want to learn more about IT auditing on the mainframe
- Anyone who wants to understand how well the applications support financial reporting
Class Outline
Table of Contents and Class Outline: HG55: How to Audit z/OS Applications I Concepts and Keywords A. Introduction Critical Mainframe Concepts for Applications Audits How Mainframe Applications are Different Why Mainframe Application Audits are Becoming More Important Application Support Tools That Make the Mainframe Environment Unique Types of Application Audit Leveraging the Financial Audit Essential Middleware MVS Environment versus USS Environment Test of Design and Test of Effectiveness A Working Example Audit Rules B. Application Architecture Online Batch Started Task Networked over TCP/IP Networked over SNA Relation to Database and to Transaction Managers Relation to Message Queueing Basic Data to Gather on Any Application II. Action Plan A. Scoping and Planning the Applications Audit A1. Mapping the Environment Selecting an Application Essential Data to Gather Describing the Risk A2. Learning the Application Support Tools Data to Gather on Support Tools B. Auditing an Application for Security B1. What Data to Gather and How B2. How to Analyze it C. Auditing an Application for Quality of Data C1. What Data to Gather and How C2. How to Analyze it D. Auditing an Application for Reliability D1. What Data to Gather and How D2. How to Analyze it E. Auditing an Application for User Satisfaction E1. What Data to Gather and How E2. How to Analyze it F. Auditing an Applications for Cost Efficiency F1. What Data to Gather and How F2. How to Analyze it G. Auditing an Application for Compliance G1. What Data to Gather and How G2. How to Analyze it H. Auditing an Application for Disaster Recovery G1. What Data to Gather and How G2. How to Analyze it I. Wrap-up, Reporting, Working Papers, and Follow-Up III Forms and Reference A. Basic Security Model B. Change Control Tools C. Transaction Managers D. Database for Applications E. Message Queuing F. Tape Management Software G. Problem Management H. SMF (log) Data Details I. Elements of Data Quality INDEX
Please note that these seminars are available for In-House Sessions.
You can save more money by learning about our seminar Discounts
Return to Top of Page Return to Home Page
Stu Henderson offers MVS security audits, consulting, seminars, articles, and other information sharing related to information security and auditing. His consulting includes: security reviews, risk assessments, RACF implementation assistance, and Information Technology audit technical counseling.
His most popular seminars provide: RACF training, mainframe audit training including MVS and z/OS audit training. His RACF seminars include: "Effective RACF Administration", "Advanced RACF Administration", and "UNIX (USS) for RACF Administrators".
His audit seminars include: "How to Audit MVS, RACF, ACF2, TopSecret, CICS, DB2, and MQ Series Security" and the follow-on "How to Audit z/OS with USS, TCP/IP, FTP, and the Internet". They also include "How to Audit TCP/IP Security" and "How to Audit UNIX and Windows Security".
Information on class location and schedules, as well as articles, links and other useful information sharing may be found on his website at www.stuhenderson.com