10.04.2023 Views

TIAPS Module 1 Audit and Assurance workbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table of Contents<br />

<strong>Module</strong> 1: <strong>Audit</strong> <strong>and</strong> <strong>Assurance</strong> ............................................................................................ 4<br />

A. Internal <strong>Audit</strong>ing’s Contribution to Good Governance ....................................................... 6<br />

A.1 Public Sector Environment .......................................................................................... 6<br />

A.2 Public Sector Governance ........................................................................................... 9<br />

A.3 Governance Models ............................................................................................... 15<br />

A.3.1 ISO 37000:2021 Governance of organizations – Guidance ................................ 15<br />

A.3.2 The IIA’s Three Lines Model ............................................................................... 16<br />

A.3.3 CIPFA International Framework: Good Governance in the Public Sector ............ 19<br />

A.3.4 King IV Corporate Governance Report, 2016 ...................................................... 20<br />

A.3.5 Examples of Best Practice in Public Sector Governance .................................... 22<br />

B. M<strong>and</strong>ate, Independence, <strong>and</strong> Objectivity ........................................................................ 26<br />

B.1 Importance of Independence <strong>and</strong> Objectivity ............................................................. 26<br />

B.1.1 Independence, Objectivity, <strong>and</strong> the Code of Ethics ............................................. 29<br />

B.1.2 Independence, Objectivity, <strong>and</strong> Competency ...................................................... 30<br />

B.2 Internal <strong>Audit</strong> M<strong>and</strong>ate .............................................................................................. 32<br />

B.3 Threats to Independence <strong>and</strong> Objectivity .................................................................. 36<br />

B.4 Safeguards for Independence <strong>and</strong> Objectivity ........................................................... 39<br />

C. <strong>Assurance</strong> <strong>and</strong> Advisory Engagements .......................................................................... 43<br />

C.1 Characteristics of <strong>Assurance</strong> <strong>and</strong> Advisory Engagements ........................................ 43<br />

C.1.1 <strong>Assurance</strong> Engagements .................................................................................... 46<br />

C.1.2 Consulting (Advisory) Engagements ................................................................... 46<br />

C.1.3 <strong>Assurance</strong> <strong>and</strong> Advisory Engagements Compared ............................................. 48<br />

C.1.4 Blended Engagements ....................................................................................... 49<br />

C.1.5 Internal <strong>Audit</strong> Opinions ....................................................................................... 51<br />

C.1.6 Competencies Needed for <strong>Assurance</strong> <strong>and</strong> Advisory Engagements .................... 52<br />

C.2 <strong>Audit</strong>ing Governance................................................................................................. 55<br />

C.3 Fraud, IT, <strong>and</strong> Cybersecurity ..................................................................................... 58<br />

C.3.1 Fraud .................................................................................................................. 58<br />

C.3.2 Information Technology ...................................................................................... 64<br />

C.3.3 Cybersecurity ..................................................................................................... 67<br />

C.3.4 Data Privacy ....................................................................................................... 70<br />

References <strong>and</strong> Additional Reading .................................................................................... 72<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!