Skip Ribbon Commands
Skip to main content

Global Technology Audit Guide (GTAG) 14: Auditing User-developed Applications

GTAG 14Almost every organization uses some form of UDAs because they can be more easily developed, are less costly to produce, and can typically be changed with relative ease versus programs and reports developed by IT personnel. However, once end users are given freedom to extract, manipulate, summarize, and analyze their UDA data without assistance from IT personnel, end users inherit risks once controlled by IT. These risks include data integrity, availability, and confidentiality. Because management relies on UDAs, which can be a significant part of financial reporting and operational processes, as well as related decision making; the internal auditor must determine and review UDA risks and build an audit of UDAs into the annual internal audit plan as appropriate.

GTAG 14: Auditing User-developed Applications provides:

  • Direction on how to scope an internal audit of UDAs.
  • Guidance for how the internal auditor’s role as a consultant can be leveraged to assist management with developing an effective UDA control framework.
  • Considerations that internal auditors should address when performing UDA audits.
  • A sample UDA process flow as well as a UDA internal audit program and supporting worksheets to help internal auditors organize and execute an audit.​

Downloads and Links

Non-members may purchase this GTAG from the IIA Bookstore.


An updated edition of the International Professional Practices Framework (IPPF) guide, more commonly known as the Red Book, is now available. Visit the IIA Bookstore for more information.