The report is important because it reveals the common information system weaknesses we identified that can seriously affect the operations of government and potentially compromise sensitive information held by agencies. … Read more →
The objective of this audit was to determine whether selected government agencies have effective controls to prevent, detect and respond to malware threats and malicious software infecting their computer systems.
The first part of the report contains the results of our audit of key business applications at 5 agencies. The second part presents the results of our general computer controls … Read more →
This audit assessed how effectively Health had managed its Centralised Computing Services contract.
This report contains the results of our audit of key business applications at four agencies.
This report shows how seven agencies are managing the security of their databases.
Identity Access Management Project, Cloud Computing Management, Application Controls Audits, General Computer Controls and Capability Assessments
The objective of our general computer controls (GCC) audits is to determine whether the computer controls effectively support the confidentiality, integrity, and availability of information systems. General computer controls include … Read more →
We reviewed five key business applications at four agencies. Each application was selected on the basis of the significant impact on the agency or the public if the application was … Read more →
In this audit we set out to assess whether agencies are adopting better practice in managing their information systems security. As our benchmark we used the International Standard (A/NZS ISO … Read more →