📑 DISA 3.0 Project Topics
- IS Audit of Banking Application
- Migrating to cloud based ERP solution
- Security control review of railway reservation system
- Review of cyber security policies and procedure
- Security and control risk assessment of toll bridge operations
- System audit of a hospital automation system
- Review of vendor proposal for SaaS services
- Information Systems audit of a mutual fund systems
- Audit of outsourced software development
- Network security audit of remote operations including WFH
- Infrastructure audit of a Bank data Centre
- Conducting vulnerability assessment and penetration testing
- Auditing Business continuity plan for Manufacturing system
- IS Audit of Banking Application
- Auditing robotic process automation system
- Implementation of adequate governance in hotel management system
- Outsourced migration audit of merger of Banks
- Audit of an E-Commerce web site
- Audit of Online booking system for a hotel chain
- Audit of Business Continuity Planning of a financial institution
- Audit of online brokerage firm
- Audit of Security Operation Centre of a Bank
- Audit of Cyber Security Framework of a PSB
- EVALUATION OF OUTSOURCING IT OPERATIONS
- Auditing SWIFT operations in a Bank
- Project Report Template and Guidelines on Project Report Submission
- Information Systems Audit of ERP Software
- Implementing Grc As Per Clause 49 Listing Requirements
- Review of IT Security Policies and Procedures in audit
- Evaluation Of Software Development Project
- Auditing Business Continuity Plan
Dear DISA participant,
🎉 Congratulations! on the successful joining of the DISA 3.0 training. We would like to reiterate the objective of the updated DISA course 3.0 is:
For being eligible to write the DISA exam, you have to pass the eligibility test and this includes submission of a project report (20 marks). The objective of the project report is to test the understanding and application of knowledge of the DISA 3.0 Course as relevant. The project you need to work on is based on practical scenarios relating to one/more modules of the DISA course. Please use DISA course learning material, ICAI, and international best practices in preparing the project report.

📌 Specific Guidelines for the project report
📊 Evaluation Criteria
Please note that the evaluation of the project would be based on the following criteria:
- Usage and application of course material in terms of knowledge and skills to the problem.
- Usage of best practices and IS Audit skills as required for the problem.
- Presentation of the solution in a structured manner.
- Presentation of solution in the form of deliverables as appropriate for the problem.
- Name………….. Membership No……………..Signed…………………….…………
- Name……….… Membership No ……………..Signed…………………….…………
- Name……….… Membership No ……………..Signed…………………….…………
- Introduction
- Auditee Environment
- Background
- Situation
- Terms and Scope of assignment
- Logistic arrangements required
- Methodology and Strategy adapted for execution of assignment
- Documents reviewed
- References
- Deliverables
- Format of Report/Findings and Recommendations
- Summary/Conclusion
- Introduction
- Auditee Environment
- Background
- Situation
- Terms and Scope of assignment
- Logistic arrangements required
- Methodology and Strategy adapted for execution of assignment
- Documents reviewed
- References
- Deliverables
- Format of Report/ Findings and Recommendations
- Summary/Conclusion
A. Please provide your understanding in one or two para information about the auditee covering nature of business, organisation structure, technology infrastructure, policies and procedures, etc.)
Please provide complete details of nature of business, organisation structure, technology deployed. The Technology deployed must include information of system software, database and application software). Provide specific details of regulatory requirements and overview of specific internal policies and procedures such as information security policy. This has to be as detailed as possible. Please make suitable assumptions and add more details as required.
Please provide details highlighting the client need for the assignment. Provide reasons why the enterprise wants the assignment to be done in 2-3 paras.
Please provide details of existing scenario which has given rise to the need for the assignment. Provide all the details of the current situation. Include here the identified problem areas and control weaknesses.
Please provide details of terms and scope of assignment clearly identifying areas being reviewed or area in which consulting is required.
Please provide details of logistics required for execution of assignment including hardware, system software, application software, data, documentation, etc. Please include details of any CAAT tools used.
Please provide details of structured methodology which is adapted from ICAI standards/guidelines, International standards/guidelines and best practices as relevant for the assignment. This may include how the standards, guidelines and best practices are used for preparing specific audit plan, audit program or detailed audit procedures.
Please provide list of sample documents reviewed during the assignment, such as information security policy, organisation structure, vendor contracts or SLA, access matrix, audit findings, etc. These documents will be the basis for review and coupled with the all the prior information can be used for identifying control weaknesses and providing recommendations.
Please provide list of specific standards, guidelines and best practices or other references to be used in performing the assignment. Please include reference of specific section of background material, ICAI and international standards/guidelines/best practices and websites or publications as used in the assignment.
Please provide details of specific deliverables of the assignment. These would include the draft IS Audit Report, Final IS Audit report, executive summary, detailed findings and recommendations, etc.
Please provide report in standard/specific format as required. Each of the findings is also to be provided in the standard/specific format. You may adapt this from best practices or customize these as required.
Please provide overall summary/conclusion of the assignment. This could be in two to three paras.
Please consider the above guidelines in preparing your project report. We are attaching the Project template in which the project report is to be provided. We wish you all the best in the successful completion of the project and hope you will have a great learning experience.
🏆 Project Report of DISA 3.0 Course Certificate
This is to certify that we have successfully completed the DISA 3.0 course training conducted at: __________________________________________ from ______________ to _____________ and we have the required attendance. We are submitting the Project titled: ____________________________________________________________________________________________.
We hereby confirm that we have adhered to the guidelines issued by DAAB, ICAI for the project. We also certify that this project report is the original work of our group and each one of us have actively participated and contributed in preparing this project. We have not shared the project details or taken help in preparing project report from anyone except members of our group.
1. Name: …………..
Membership No: ……………..
Signed: …………………….…………
2. Name: ……….…
Membership No: ……………..
Signed: …………………….…………
3. Name: ……….…
Membership No: ……………..
Signed: …………………….…………
Place: ____________
Date: _____________
📂 Table of Contents
Details of Case Study/Project (Problem)
Project Report (solution)
- Auditee Environment
- Background
- Situation
- Terms and Scope of assignment
- Logistic arrangements required
- Methodology and Strategy adapted for execution of assignment
- Documents reviewed
- References
- Deliverables
- Format of Report/Findings and Recommendations
- Summary/Conclusion
📖 Project Report Details
Title: _______________________________________________
A. Details of Case Study/Project (Problem)
B. Project Report (solution)
1. Introduction
A. Please provide your understanding in one or two para information about the auditee covering nature of business, organisation structure, technology infrastructure, policies and procedures, etc.
B. Please provide one or two para information about audit firm (fictitious name) including your experience, team composition, skill-sets and team leader. Please do not include actual names of group members as members of assignment team in the project report so as to maintain confidentiality of the project.
2. Auditee Environment
Please provide complete details of nature of business, organisation structure, technology deployed. The Technology deployed must include information of system software, database and application software). Provide specific details of regulatory requirements and overview of specific internal policies and procedures such as information security policy. This has to be as detailed as possible. Please make suitable assumptions and add more details as required.
3. Background
Please provide details highlighting the client need for the assignment. Provide reasons why the enterprise wants the assignment to be done in 2-3 paras.
4. Situation
Please provide details of existing scenario which has given rise to the need for the assignment. Provide all the details of the current situation. Include here the identified problem areas and control weaknesses.
5. Terms and Scope of assignment
Please provide details of terms and scope of assignment clearly identifying areas being reviewed or area in which consulting is required.
6. Logistic arrangements required
Please provide details of logistics required for execution of assignment including hardware, system software, application software, data, documentation, etc. Please include details of any CAAT tools used.
7. Methodology and Strategy adapted for execution of assignment
Please provide details of structured methodology which is adapted from ICAI standards/guidelines, International standards/guidelines and best practices as relevant for the assignment. This may include how the standards, guidelines and best practices are used for preparing specific audit plan, audit program or detailed audit procedures.
8. Documents reviewed
Please provide list of sample documents reviewed during the assignment, such as information security policy, organisation structure, vendor contracts or SLA, access matrix, audit findings, etc. These documents will be the basis for review and coupled with the all the prior information can be used for identifying control weaknesses and providing recommendations.
9. References
Please provide list of specific standards, guidelines and best practices or other references to be used in performing the assignment. Please include reference of specific section of background material, ICAI and international standards/guidelines/best practices and websites or publications as used in the assignment.
10. Deliverables
Please provide details of specific deliverables of the assignment. These would include the draft IS Audit Report, Final IS Audit report, executive summary, detailed findings and recommendations, etc.
11. Format of Report/ Findings and Recommendations
Please provide report in standard/specific format as required. Each of the findings is also to be provided in the standard/specific format. You may adapt this from best practices or customize these as required.
12. Summary/Conclusion
Please provide overall summary/conclusion of the assignment. This could be in two to three paras.


