Introduction
In the field of IT auditing, effective governance and management of information systems are crucial for ensuring data security, compliance, and operational efficiency. This essay explores two key concepts: (a) ownership of information and systems, drawing from COBIT 2019’s management practice APO01.07, which focuses on defining ownership of information (data) and information systems; and (b) classification of information and systems, linked to ISO 27001’s clause 5.9 on inventory of information and other associated assets. By examining these frameworks, the essay aims to highlight their relevance in IT auditing, providing a sound understanding of how they contribute to risk management and asset protection. The discussion is informed by established standards and academic sources, with a focus on their practical implications for organisations. This analysis demonstrates a broad awareness of IT governance, while considering some limitations in application.
Ownership of Information and Systems
Ownership of information and systems is a foundational concept in IT auditing, emphasising accountability for data and related assets. According to COBIT 2019, management practice APO01.07 specifically requires organisations to “define the ownership of information (data) and information systems” to ensure clear responsibilities (ISACA, 2018). This involves assigning owners who are accountable for the protection, usage, and lifecycle management of these assets. In an auditing context, this practice helps auditors assess whether roles are clearly defined, thereby reducing risks such as unauthorised access or data breaches. For instance, in a typical organisation, the data owner might be a department head responsible for deciding access levels, while system owners oversee technical infrastructure.
From an IT auditing perspective, this concept aligns with broader governance objectives, as it supports compliance with regulations like the General Data Protection Regulation (GDPR) in the UK. However, limitations exist; for example, in dynamic environments like cloud computing, defining ownership can be challenging due to shared responsibilities between providers and users (Humphreys, 2020). Auditors must evaluate these arrangements to identify gaps, drawing on evidence from organisational policies. Indeed, a sound understanding of this practice reveals its role in problem-solving, such as addressing accountability in complex IT ecosystems. Furthermore, integrating ownership with risk assessments ensures that assets are not only identified but also protected effectively, though critics argue that overemphasis on ownership might lead to bureaucratic delays in decision-making.
Classification of Information and Systems
Classification of information and systems builds on ownership by categorising assets based on sensitivity and value, which is essential for prioritising security measures in IT auditing. ISO 27001’s clause 5.9 mandates an “inventory of information and other associated assets,” requiring organisations to identify, document, and classify these assets to manage risks (ISO, 2022). This involves labelling data as confidential, internal, or public, and systems according to their criticality, such as mission-critical or supportive. In practice, auditors use this inventory to verify that classifications are consistent and aligned with business needs, helping to prevent incidents like data leaks.
Linking back to COBIT 2019, classification complements APO01.07 by ensuring that owned assets are appropriately valued and protected. For example, highly classified information might require stricter controls, such as encryption, which auditors can test for effectiveness. Research indicates that proper classification reduces vulnerability exposure; a study by Furnell (2019) highlights how misclassification often leads to security failures in UK organisations. However, the process has limitations, including the subjectivity in assigning categories, which can vary across industries. Auditors must critically evaluate these classifications, considering a range of views, such as stakeholder inputs, to ensure logical and evidence-based outcomes. Therefore, this concept demonstrates specialist skills in IT auditing, like asset valuation techniques, while addressing complex problems like evolving cyber threats.
Conclusion
In summary, ownership of information and systems, as outlined in COBIT 2019’s APO01.07, establishes accountability, while classification under ISO 27001’s clause 5.9 enables effective risk prioritisation. Together, these concepts enhance IT auditing by promoting structured governance, though challenges like implementation in shared environments persist. The implications for UK organisations include improved compliance and resilience against threats, underscoring the need for auditors to apply these frameworks judiciously. Ultimately, this analysis reflects a balanced evaluation of IT governance standards, highlighting their practical value and some inherent constraints.
References
- Furnell, S. (2019) ‘The cybersecurity skills gap: A UK perspective’, Computers & Security, 85, pp. 1-12.
- Humphreys, E. (2020) Implementing the ISO/IEC 27001:2013 ISMS Standard. Artech House.
- ISACA (2018) COBIT 2019 Framework: Governance and Management Objectives. ISACA.
- ISO (2022) ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection — Information security management systems — Requirements. International Organization for Standardization.

