The Ultimate CPA Guide to IT Systems & Data (AUD & ISC Exam)

AUD

The Ultimate CPA Guide to IT Systems & Data

AUD & ISC exam review

Last updated: March 2026 • Reviewed by Kyle Lee Ashcraft, CPA

IT topics appear across both AUD and ISC, and they are one of the easiest areas to lose unnecessary points if the material feels scattered. The concepts are very manageable once they are organized correctly.

This guide consolidates the major IT themes you need: IT governance, IT participants, systems, change management, relational databases, ETL, SQL, general IT controls, SOC reports, and risk frameworks — all in one place.

Who this guide is for:

  • AUD students who need to connect IT systems to risk assessment and control testing
  • ISC students who need a broad IT and data-management review page
  • Students struggling with SOC reports, ERP, ETL, SQL, or IT controls
  • Anyone who wants a single IT pillar page instead of many disconnected notes

Want a full study roadmap for AUD and ISC?

I built a free course covering the exact strategies that helped me score 90+ on all four CPA exams.

Get My Free CPA 101 Course

IT Governance AUD / ISC High-Yield

IT governance is the framework for managing an entity’s IT environment. It aligns IT strategy with business goals, delivers value, manages IT risk, allocates resources, and monitors performance.

The IT Governance Institute identifies five core components. This section tends to be easier once you realize it behaves a lot like other framework topics on the CPA exam.

# Component
1Strategic Alignment
2Value Delivery
3Risk Management
4Resource Management
5Performance Management

1. Strategic Alignment

IT should support the overall strategy of the company, not just function as a back-office utility. If the business strategy and the IT strategy do not match, the IT environment is misaligned.

This can also include high-level design choices such as physical vs. virtual networks and centralized vs. decentralized networks.

2. Value Delivery

Management should view IT as a value-generating investment, not just a cost center. Strong IT can automate processes, reduce labor costs, improve service, and strengthen decision-making.

3. Risk Management

IT governance includes identifying and managing IT risks, balancing mitigation cost against the severity and likelihood of the risk. Risk identification must be ongoing rather than one-time.

  • Natural disasters
  • User error
  • Fraud and intentional misuse
  • Unauthorized access
  • System unavailability
  • System inefficiency and compliance failures

4. Resource Management

This focuses on using IT resources efficiently — software, hardware, personnel, and related support.

5. Performance Management

Once an IT system is implemented, the company must monitor whether it is actually delivering the expected value and whether resources should be adjusted.

IT Participants: Roles in an IT Setting AUD / ISC

The key participants in IT governance look very similar to the participants you see in internal control and ERM topics.

Board of Directors

The board oversees IT governance at a high level and ensures alignment with the company’s overall strategy.

Executive Management (CEO, CFO)

Management is responsible for implementation and day-to-day tone at the top. Their attitude affects how seriously employees take IT structure and controls.

Steering Committee

The steering committee is the senior group that directs, reviews, and approves strategic IT plans, major initiatives, and IT resource allocation.

Study Tip: The steering committee directs the company in the right direction for its IT needs.

Types of IT Systems AUD / ISC High-Yield

Rather than trying to memorize every single system type in isolation, it helps to group them into two broad categories.

Category Purpose
Decision-Making Systems Provide information that helps management or executives make decisions
Transaction-Processing Systems Help the entity complete business processes efficiently

Study Tip: Decision-making systems inform decisions. Transaction-processing systems help execute processes.

Decision-Making Systems

System Purpose
Management Information SystemSupports the strategic process
Decision Support SystemSupports day-to-day decisions
Executive Information SystemSpecifically for senior executives
What-If AnalysisForecasts scenarios
Artificial IntelligenceAutomates or supports decision-making
Performance Management SystemsSupport executive decision-making

Transaction-Processing Systems

Accounting Information System (AIS)

An AIS handles accounting processes such as invoices, cash receipts, reconciliations, and financial reporting. It also creates audit trails and can contain edit checks and other controls.

Customer Relationship Management (CRM)

A CRM helps manage relationships with customers and prospects. Salesforce is the classic example.

Enterprise Resource Planning (ERP)

An ERP integrates departments into one shared platform so that accounting, inventory, sales, warehouse, and other functions communicate in real time.

Study Tip: The goal of an ERP is to centralize and integrate departments to provide better information.

Supply Chain Management System

This manages the process from sourcing raw materials through production and delivery.

IT Change Management AUD / ISC

IT change management is the process for implementing new or modified IT systems in a controlled way. Change introduces risk, so companies need policies, assigned responsibilities, segregation of duties, and fallback plans.

Plan-Do-Check-Act

  1. Plan: Decide what should be implemented and how
  2. Do: Implement the change
  3. Check: Verify that it works properly
  4. Act: Make necessary adjustments

A parallel transition is safer than a direct changeover because both systems can run together while the new one is validated.

Business Process Re-Engineering vs. Business Process Management

  • Business Process Re-Engineering: major, radical change
  • Business Process Management: smaller, gradual change

Cloud Computing

Cloud computing is on-demand access to IT resources over the internet. Instead of maintaining physical servers on-site, a company rents storage or computing resources from a provider.

IT topics are easy points if you have them organized.

My Free CPA 101 Course walks through how I approached AUD and the discipline sections to score 90+. Check it out here.

Relational Database ISC

A relational database stores interconnected data in tables. Tables contain rows and columns, and data is linked through shared relationships and keys.
Term Definition
TableThe full dataset
Data TypesThe kind of data stored, such as names or numbers
Records / RowsHorizontal entries
ColumnsVertical entries
FieldsIndividual cells

Real-Time vs. Batch Processing AUD / ISC

Real-time processing posts transactions immediately. Batch processing groups transactions and processes them together later. The exam often tests the fact that batch processing allows a review step before final processing.
Method How It Works Example
Real-Time Processing Transactions are processed immediately as entered Immediate transaction posting
Batch Processing Transactions are accumulated and processed together End-of-day EFT file reviewed before submission

Systems Development Life Cycle (SDLC) AUD / ISC

The SDLC is a seven-step model for system development and implementation: Plan, Analyze, Design, Develop, Test, Deploy, Maintain.
Step Stage Description
1PlanIdentify needs
2AnalyzeGather and analyze requirements
3DesignVisualize the system
4DevelopBuild or code the system
5TestTest before live use
6DeployGo live or transition
7MaintainMonitor and update over time

Legacy Systems AUD / ISC

A legacy system is old software that the entity still uses. The exam tests both why companies keep it and why auditors should care about the risks.
Advantages Risks
  • Already paid for
  • Employees know how to use it
  • Customized to company needs
  • Security weaknesses
  • No vendor support
  • Poor integration with modern systems
  • Slower performance

Manual Controls vs. Automated Controls AUD / ISC

Manual controls rely on people. Automated controls are system-driven. Manual controls carry more direct human-error risk, while automated controls usually improve speed and consistency. Both still exist within the COSO framework.

Data Analytics ISC High-Yield

Data analytics is the process of examining data to draw conclusions. The easiest exam split is past-focused vs. future-focused analytics.
Type Time Focus What It Does Example
DescriptivePastDescribes what happened“We lost 20% of sales last year”
DiagnosticPastExplains why it happened“A competitor entered the market”
PredictiveFutureEstimates future outcomes“We will gain 10% market share”
PrescriptiveFutureSuggests how to achieve an outcome“Increase marketing spend to capture market share”

Study Tip: Descriptive and diagnostic look backward. Predictive and prescriptive look forward.

Extract, Transform, and Load (ETL) ISC High-Yield

ETL is the three-step process of extracting raw data, transforming it into usable form, and loading it into storage for analysis.

Step 1: Extract

Pull raw data from the source system.

Step 2: Transform

Clean and structure the data so it is ready for analysis.

Study Tip: Unstructured data is not ready for analysis. Structured data is cleaned and usable.

Step 3: Load

Store the data in the appropriate destination for analysis.

Storage Type Data Type Scope
Data WarehouseStructured onlyCompany-wide
Data MartStructured onlyDepartment-specific
Data LakeStructured and unstructuredBroader/raw storage

Study Tip: Warehouse and mart = structured only. Data lake = structured and unstructured.

General IT Controls AUD / ISC High-Yield

Logical Controls

Logical controls regulate system access — who can log in and what they can do once inside. Think logical = logging in.

Control Description
FirewallControls incoming and outgoing network activity
EncryptionMakes data unreadable to unauthorized parties
VPNEncrypted remote access tunnel
Multi-Factor AuthenticationRequires more than one credential factor
Digital SignatureVerifies authenticity and document integrity
E-SignatureElectronic signing of a document
PasswordsBasic access control; stronger and longer is better

Physical Controls

Physical controls prevent unauthorized physical access to systems and equipment.

  • Security cameras
  • Security guards
  • Key cards / smart cards
  • Biometric devices

Structured Query Language (SQL) ISC High-Yield

ISC often focuses on understanding how a query retrieves data and whether the resulting data set is relevant and complete.

Commands

Command Function
SELECTSelect data
FROMSpecify source table
WHEREFilter results
GROUP BYAggregate by group
ORDER BYSort results
HAVINGFilter grouped results

Operators

Operators perform comparisons and logical tests such as equals, not equals, greater than, and less than.

Aggregate Functions

Function What It Returns
COUNT()Number of matching rows
SUM()Total of numeric column
AVG()Average value
MAX()Highest value
MIN()Lowest value

String Functions

Function What It Does
CONCAT()Joins strings together
SUBSTR() / SUBSTRING()Extracts part of a string
REPLACE()Substitutes one substring for another
LENGTH()Returns string length

How Does the AUD Exam Test These Topics? AUD

The AUD blueprint places IT primarily in Area II: Assessing Risk and Developing a Planned Response. The exam is less about memorizing random IT vocabulary and more about how IT affects understanding the client, control design, and audit procedures.

Topic Representative Task Skill Level
COSO FrameworkDefine internal control, purpose, objectives, components, and structureRemembering & Understanding
IT General ControlsUnderstand and test design/implementation of relevant IT general controlsApplication
Business Processes & IT EnvironmentDocument significant processes and walkthroughsApplication
IT InfrastructureUnderstand ERP, cloud, and applicationsApplication
IT Applications & Transaction DataUnderstand systems that capture and process transactionsAnalysis
Automated & Manual ControlsTest relevant transaction-level controlsApplication

What this means for your exam prep

  • COSO remains more definition-based
  • IT general controls, ERP, cloud, and control testing are more application-based
  • Expect TBS-style thinking when the topic shifts to how the system affects the audit approach

SOC Reports AUD / ISC High-Yield

A SOC report provides assurance over controls at a service organization. SOC 1 focuses on financial reporting. SOC 2 focuses on customer data and systems-related trust criteria.

Purpose of a SOC Report

A SOC report lets user auditors rely on work already performed over the service organization’s controls rather than re-performing that work themselves.

SOC 1 vs. SOC 2

Report Focus Example
SOC 1Controls relevant to financial reportingPayroll processor affecting payroll expense
SOC 2Controls related to customer/system data protectionData security at a service provider

Study Tip: SOC 1 = financial statements. SOC 2 = customer data / system controls.

Type I vs. Type II

Type What It Covers Level of Assurance
Type IControl description as of a specific dateLower assurance
Type IIOperating effectiveness tested over a periodHigher assurance

Study Tip: Type II is more reliable than Type I.

Kyle’s 90+ Score Insight: Think of Type I as a photo and Type II as a movie. Type I shows controls at one point in time. Type II shows them working over a full period. If the exam asks which gives more assurance, the answer is Type II.

Inherent Limitations of Internal Controls AUD / ISC

Inherent limitations are unavoidable weaknesses that prevent any control system from providing absolute assurance.
Limitation Explanation
Human ErrorPeople make mistakes even when controls are well designed
Human BiasJudgment can be distorted by bias
Strategy MisalignmentA strong framework may still fail if it is misaligned with company goals
CollusionTwo or more people can circumvent controls together
Management OverrideManagement may bypass controls intentionally
External EventsOutside events remain outside company control

How Does the ISC Exam Test These Topics? ISC

For ISC, IT and data management sit in the largest exam area. The test becomes more analytical here, especially around SQL, databases, data storage, integration, and SOC 2 topics.

Section A: Information Systems

Topic Representative Task Skill Level
IT InfrastructureArchitecture, cloud models, and governance basicsRemembering & Understanding
ERP & AISEvaluate ERP, AIS, and process improvementsAnalysis
Business Process ReconciliationCompare actual vs. documented process flowAnalysis
SOC 2 & Trust Services CriteriaDetect control design/operation deficienciesEvaluation

Section B: Data Management

Topic Representative Task Skill Level
Data Extraction & Storage TypesIdentify extraction methods and storage optionsRemembering & Understanding
Data Life CycleSummarize data from creation to disposalRemembering & Understanding
Relational DatabasesAnalyze structure and integrity rulesAnalysis
SQL QueriesEvaluate whether retrieved data is relevant and completeAnalysis
Data IntegrationCombine data from different sources for decision useAnalysis
Business Process ModelsReview process models and suggest improvementsAnalysis

What this means for ISC candidates

  • Definitions matter, but ISC heavily shifts into analysis
  • SQL, ERP, ETL, data integration, and relational databases are not just vocabulary topics
  • SOC 2 / Trust Services Criteria is especially important because it pushes toward evaluation-level thinking

Enterprise Risk Management (ERM) AUD / ISC

ERM is a broader, entity-level risk framework. It considers risk across the whole organization and aligns risk decisions with strategy and risk appetite.

Key ERM Terms

Term Definition
Risk AppetiteThe type and amount of risk the organization is willing to accept
Risk PortfolioThe total collection of risks across the entity
Inherent RiskRisk before mitigation
Residual RiskRisk after mitigation

The 5 Components of ERM

ERM Component Internal Control Parallel Key Point
Governance and CultureControl EnvironmentVery similar to COSO control environment
Review and RevisionMonitoringOngoing review and correction
Information, Communication, and ReportingInformation and CommunicationParallel to COSO information flow
PerformingRisk Assessment + Control ActivitiesBroader risk response lens than pure controls
Strategy and Objective-SettingNo direct equivalentUnique ERM component focused on alignment and appetite

The 4 Risk Responses

Response Meaning Example
Risk AcceptanceTake no actionAccept competitor risk
Risk AvoidanceExit the activityLeave a market entirely
Risk ReductionLower the riskAdd controls or diversify
Risk SharingShare risk with another partyJoint venture / insurance / partnership

Absolute Assurance vs. Reasonable Assurance

Absolute assurance is impossible. Reasonable assurance is the achievable standard.

Quick Reference Glossary

Use this glossary for final review before exam day.

Term One-Line Definition Exam
IT GovernanceFramework for managing IT across strategy, value, risk, resources, and performanceAUD / ISC
Steering CommitteeSenior group that directs strategic IT plansAUD / ISC
ERPIntegrated system connecting departments in real timeAUD / ISC
AISAccounting system that records transactions and supports reportingAUD / ISC
Cloud ComputingOn-demand IT resources accessed over the internetAUD / ISC
SDLCPlan, Analyze, Design, Develop, Test, Deploy, MaintainAUD / ISC
Legacy SystemOld system still in use despite risk and support issuesAUD / ISC
Relational DatabaseInterconnected data stored in tablesISC
Real-Time ProcessingTransactions processed immediatelyAUD / ISC
Batch ProcessingTransactions grouped and processed together laterAUD / ISC
ETLExtract, Transform, LoadISC
Data WarehouseStructured data, broad company scopeISC
Data MartStructured data, department-specific scopeISC
Data LakeStructured and unstructured data storageISC
SQLLanguage for retrieving and manipulating database dataISC
Logical ControlsAccess-related controls such as passwords, MFA, and VPNAUD / ISC
Physical ControlsControls over physical access to systems and facilitiesAUD / ISC
SOC 1Service organization controls relevant to financial reportingAUD / ISC
SOC 2Service organization controls relevant to customer/system dataAUD / ISC
Type IControls described as of a single dateAUD / ISC
Type IIControls tested over a periodAUD / ISC
Inherent RiskRisk before mitigationAUD / ISC
Residual RiskRisk remaining after mitigationAUD / ISC
Risk AppetiteRisk the organization is willing to acceptAUD / ISC
Reasonable AssuranceAchievable confidence level; absolute assurance is impossibleAUD / ISC

FAQ

What is the easiest way to think about IT systems on the CPA exam?

Start by splitting them into decision-making systems and transaction-processing systems. That makes the topic much easier to organize mentally.

What is the difference between SOC 1 and SOC 2?

SOC 1 focuses on controls relevant to financial reporting. SOC 2 focuses on controls related to customer data and system trust criteria.

What is the difference between Type I and Type II reports?

Type I describes controls at a point in time. Type II tests whether controls operated effectively over a period.

What is the easiest way to remember ETL storage types?

Warehouse and mart hold structured data only. A data lake can hold both structured and unstructured data.

Which general IT controls matter most for exam questions?

Logical controls, physical controls, access provisioning, passwords, MFA, firewalls, encryption, and VPNs are the most testable areas.

Ready to put it all together for AUD and ISC?

IT concepts are just one piece of the puzzle. My Free CPA 101 Course gives you a complete roadmap for studying smarter and passing each section the first time.

Kyle Ashcraft is a CPA who scored a 90+ on all four CPA exams. Kyle founded Maxwell CPA Review, which is an exam-prep company that offers a comprehensive CPA exam review course and private tutoring.

Previous
Previous

The Ultimate AUD Guide to Economics

Next
Next

AUD Exam Structure & Blueprint Explained Simply