Episode 21: Overview of Domain 2 – Management of IT

Welcome to The Bare Metal Cyber CISA Prepcast. This series helps you prepare for the exam with focused explanations and practical context.
In the context of Domain Two, it’s essential to distinguish clearly between governance and management, because while they are closely linked, their roles, responsibilities, and focus areas are fundamentally different. Governance sets direction—it defines policies, frameworks, and strategic priorities—but it does not carry out operational tasks. Management, by contrast, is responsible for executing the directives established by governance. IT managers translate high-level goals into tactical activities, assign resources, implement controls, and monitor results. They are responsible for the day-to-day delivery of IT services and for ensuring that systems remain functional, secure, and aligned with business needs. Management also includes vendor oversight, infrastructure upkeep, change response, and performance tracking. For CISA candidates, the ability to differentiate governance from management is critical, and you should be prepared to interpret exam questions that test whether specific responsibilities—such as approving access, deploying systems, or reviewing service levels—fall under one function or the other.
The core responsibilities of IT management span a wide range of tasks and processes, all of which are focused on delivering reliable, secure, and effective technology services that support business operations. Managers are responsible for maintaining infrastructure, applications, and data environments so that business units can carry out their functions without interruption. This includes managing help desk operations, maintaining system availability, and applying patches and updates to prevent vulnerabilities. IT managers must also supervise teams, negotiate and manage contracts, and respond to incidents, service requests, and change tickets in a timely and well-documented manner. Operational risk management is another critical element, as IT teams must monitor system health, track incidents, and ensure that failures or control gaps are addressed swiftly. Key performance indicators—such as mean time to resolution, system uptime, and user satisfaction—help management track performance and guide improvement. On the CISA exam, you’ll be expected to identify whether IT management has appropriately carried out these responsibilities and whether they support strategic goals or create control concerns.
Organizational structure has a direct impact on how IT services are delivered, how decisions are made, and how risks are managed, and auditors must understand how these structures support—or undermine—control effectiveness. Centralized IT models offer consistency and standardization, which can strengthen control design and reduce duplication, but may limit flexibility at the local level. Decentralized models empower individual business units, increasing responsiveness but potentially weakening enterprise-wide visibility and coordination. Hybrid models seek to balance these priorities but still require careful oversight. Decision hierarchies—defined by reporting lines, delegated authority, and approval workflows—determine who is accountable for what, and must be clear to avoid conflicts or gaps in responsibility. Common roles include IT operations managers, system owners, project leads, and service desk supervisors, each playing a role in managing resources and executing controls. CISA candidates should understand how organizational structures support segregation of duties, visibility into risk, and enforcement of policies, as exam scenarios may involve interpreting org charts or evaluating the control implications of reporting relationships.
IT resource management is another key area under IT management’s responsibility, involving the allocation, tracking, and optimization of staff, infrastructure, applications, and budgets. Effective management ensures that the right people, with the right skills, are assigned to the right tasks, and that hardware and software are purchased, maintained, and retired according to lifecycle plans. Capacity planning is essential to prevent outages or slowdowns, and skills development ensures that technical teams stay current with emerging threats, platforms, and tools. From a financial perspective, IT budgets must be aligned with business priorities and carefully monitored for overspending or underutilization. Resource utilization metrics—such as server workloads, project staffing ratios, or help desk call volumes—can reveal inefficiencies or bottlenecks. Poor resource management often results in missed deadlines, reduced control effectiveness, or audit findings. The CISA exam frequently presents scenarios where auditors must determine whether resource use supports organizational objectives or whether gaps in allocation, planning, or oversight have introduced unnecessary risk.
Vendor and outsourcing oversight is a major area of focus for IT management, as more organizations rely on third-party service providers for core functions such as cloud hosting, network monitoring, help desk support, and software development. Managing these relationships requires more than just contract negotiation—it involves continuous monitoring of service levels, compliance requirements, data protection, and performance outcomes. Contracts must clearly define responsibilities, expectations, and audit rights, including the ability to review controls or request evidence during audits. Risk assessments should be conducted before onboarding a vendor and updated periodically based on changes in service criticality or vendor performance. Issue logs, escalation procedures, and remediation tracking must be maintained to ensure that service problems are identified and resolved promptly. Auditors must evaluate whether vendor oversight processes are well-defined and consistently followed. On the CISA exam, you may be presented with vendor-related risk scenarios and asked whether oversight has been sufficient, whether contracts contain required clauses, or whether the right party has ownership over vendor performance management.
Monitoring IT performance is a foundational responsibility for IT managers, and it allows them to detect problems, measure progress, and evaluate whether services are meeting business needs. This is typically accomplished through dashboards, monitoring tools, and structured reports that track key indicators such as system uptime, incident response time, help desk resolution rates, and adherence to service-level agreements. Trends in incident frequency, recurring service requests, or change-related errors can indicate deeper control problems or process weaknesses. Performance monitoring must be linked to stakeholder expectations so that gaps can be identified early and corrective actions implemented before issues escalate. Auditors assess whether performance data is used proactively and whether service delivery aligns with both operational commitments and strategic objectives. On the CISA exam, you may be asked to interpret performance reports, identify gaps in monitoring coverage, or assess whether service levels reflect organizational expectations or compliance obligations.
Change and configuration management are critical processes that enable organizations to implement system updates, apply fixes, and make infrastructure adjustments without disrupting services or compromising security. Change management controls ensure that all changes are requested, approved, tested, and documented before deployment. A weak change process can lead to unauthorized updates, configuration drift, or outages. Configuration management tracks system settings, dependencies, and relationships, maintaining a baseline for auditing and troubleshooting. When these controls are not in place, it becomes difficult to assess the root cause of issues, to detect unauthorized changes, or to recover from failures. Effective configuration management also supports incident response, disaster recovery, and asset tracking. For the CISA exam, expect to see scenarios involving missing change approvals, rollback failures, or undocumented system settings, and be ready to assess whether configuration records are maintained adequately and whether change controls were properly enforced.
Service management and quality assurance ensure that IT services are not only delivered, but delivered well—aligned with user needs, consistent with organizational goals, and continuously improved. Frameworks like ITIL provide structured guidance on how to manage service delivery, design support processes, and implement quality feedback loops. Core concepts include user satisfaction, incident handling, and problem management, all aimed at reducing service disruptions and improving overall performance. Continuous Service Improvement, or CSI, focuses on learning from issues and implementing process refinements over time. Auditors assess whether service issues are documented, root causes identified, and solutions implemented to reduce repeat occurrences. Quality management is not separate from control effectiveness—in Domain Two, they are tightly linked. CISA exam questions may test your understanding of how service quality impacts control assurance, or whether service improvement programs align with business priorities.
IT strategy execution and progress reporting are where management efforts meet governance expectations. IT managers are responsible for converting approved strategies into roadmaps, project plans, and resource allocations that drive real results. They must report periodically to governance committees, showing progress against key performance indicators, budget adherence, and milestones. Reports must also show whether risks are emerging, whether business case assumptions are holding true, and whether scope changes are needed. When execution deviates from the original strategy—due to delays, scope shifts, or budget constraints—management must present justifications and adjustment plans. Auditors evaluate whether execution remains aligned with the strategy and whether progress reporting is transparent, consistent, and risk-aware. In the CISA exam, candidates may be asked whether management has properly documented its execution or whether strategy alignment is being maintained as circumstances change.
From the CISA perspective, understanding IT management is about more than recognizing operational processes—it’s about evaluating whether those processes support the strategic and governance-level goals defined by the organization. You should be ready to assess whether management’s actions align with policy, whether resources are used efficiently, whether vendors are being monitored properly, and whether service levels meet expectations. CISA questions may present system logs, performance dashboards, organizational charts, or service reports and ask whether IT management has succeeded or failed in its duties. Strong IT management doesn’t just enable control effectiveness—it enables the governance framework itself to succeed. A well-managed IT environment reduces risk, supports compliance, enables strategic execution, and responds effectively to change. As an auditor, your ability to assess management performance makes you not just a reviewer of controls, but a contributor to organizational effectiveness and resilience.
Thanks for joining us for this episode of The Bare Metal Cyber CISA Prepcast. For more episodes, tools, and study support, visit us at Baremetalcyber.com.

Episode 21: Overview of Domain 2 – Management of IT
Broadcast by