SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
Governance, Risk, and Compliance
A Look into the Future: The Next
Evolution of Internal Audit
Continuous Risk and Control
Assurance
Content
	 3	 About the Author
	 4	 Executive Summary
	 5	 The Vision
	 7	The Journey from Traditional Auditing
	10	 The Next Evolution of Internal Audit
	11	 Model Overview
	12	 Continuous Risk Monitoring
	13	 Continuous Controls and Data Auditing
	16	 Continuous Fraud Detection
	16	On-Demand Data Mining
	16	The Monitoring of Key Performance Indicators
	17	 Continuous Reporting
	18	 Additional Considerations
	20	 Other Resources
	21	 Notes
About the Author
Before joining the governance, risk, and compliance (GRC) solutions team at SAP,
Norman Marks was the leader of internal audit functions at major U.S. and global
corporations for more than 15 years, also serving at times as chief ethics and
compliance officer and chief risk officer. He is a recognized international leader in
the theory and practice of internal auditing and was profiled by the magazines of
the American Institute of Certified Public Accountants and the Institute of Internal
Auditors (IIA) for his innovative practices. He is the author of some of the IIA’s
most downloaded publications, including Sarbanes-Oxley §404: A Guide for
Management by Internal Controls Practitioners.
4
The not-too-distant future for internal auditing includes
a technology-driven revolution that will enable a dramatic
and necessary change in the way internal auditors operate.
The internal auditing function will be able to provide almost
continuous assurance that risks of significance are effec­
tively managed and that related controls are performing as
desired across the organization.
Traditional assurance projects will largely be replaced by
a combination of continuous auditing and monitoring and
rapid-response audits of risk hot spots. Resources will be
freed up for process improvement and other con­sulting
opportunities. Many of the seeds of that change have
already borne fruit that is ready to be reaped today.
Our vision is illustrated through the telling of a story, set
a few years from now, by the fictional Charles Andrew
Edgar, senior vice president of internal audit for Tap Toes
Inc., a global shoe-manufacturing com­pany based in
San Francisco.
Executive Summary
5
“This morning my quiet breakfast was
interrupted by a loud chirp from my
smart phone. I answered immediately,
as it was the special tone I had set for
alerts from our continuous risk and
control assurance system.
“The alert told me that one of our con­
tinuous audit and monitoring routines
had detected an unusually large physical-
inventory variance in our Blackpool,
England, location. Clearly, my normal
morning routine was going to change.
“The message included a detailed
description of the alert, but even with
today’s technology, the screen on the
smart phone was too small for me to
read comfortably. I took a cup of coffee
into my home office and, after going
through the normal security protocols,
opened the alert on my laptop.
“Apparently, a routine monthly physical-
inventory check in the Blackpool location
had identified a large discrepancy in the
finished goods inventory of ballroom
dancing shoes. The Blackpool finance
director had posted a journal entry
writing off the shoes, which our moni­
tor­ing had detected. The shoes are
expensive, so the write-off was above
the thresholds (dollar and percentage)
we had set our software to monitor.
“I used a hyperlink in the message to
enter the corporate risk and control
system (CRCS), which drives our con­
tinuous assurance program. CRCS
monitors the health of the more signifi­
cant risks (in this case, those related to
the safeguarding and accurate report­
ing of inventory) and related controls.
“First, I checked out the general level
of risk at the Blackpool location, as
that would give me an idea whether
there was any indication of employee
dis­satis­faction or other situation that
could lead to theft. I found that:
•	General risk levels related to the
Blackpool location were recently
raised due to UK press reports that
the Blackpool plant might be closed.
(We have standard feeds from com­
mercial news agencies and supple­ment
them with our own search engine.
The data is both structured, such as
government employment reports, and
unstructured, such as articles in the
local press. The results are collected
and analyzed in the corporate data
warehouse and links added to the
risk management system.)
•	The latest human resources depart­
ment employee surveys did not iden­
tify any elevated employee concerns.
In general, it appeared employee
morale was good, in line with the rest
of the organization.
•	There had not been any significant
change in personnel turnover, includ­
ing in management.
•	The most recent external audit had
not identified any issues. In addition,
there were no open remediation
items – from external audit, internal
audit, or other assurance functions.
(By the way, all our assurance func­
tions – such as the corporate compli­­
ance and cor­porate quality teams, as
well as internal auditing – use CRCS
and its multicompliance framework
for risk identification and assess­ment,
audit planning, tracking of audit results,
and the monitoring of remediation
items.)
•	The internal audit team had been to
Blackpool 18 months ago. As with
most of our on-site audits, the latest
was an operational audit. This par­
ticular audit was of the lean finance
operation (several of the internal
audit team are Lean Six Sigma Black
Belts) and the resulting assessment
was positive. There were no deficien­
cies of significance.
“I moved from the top-level Blackpool
risks to a view that focused on inven­
tory risks. I first checked out the risk of
inventory theft. Our continuous assur­
ance program is driven by a top-down,
risk-based process for identifying the
key controls relied upon to achieve the
company’s strategic objectives. For
each of the objectives, we worked
collaboratively with management and
the risk officer to identify the risks to
achieving the objectives. Then we deter­­
mined the strategy or response to be
followed to manage each risk (transfer
or share, avoid, reduce or mitigate,
or accept) and the controls required
to ensure that the strategy is effective.
Finally, we implemented con­tinuous
testing for each of the controls.1
The Vision
Continuous Risk and Control Assurance
6
“The dashboard for the controls showed
green lights across the board. Notably:
•	There were no other unusual inven­
tory transactions such as physical-
inventory variances in prior months,
write-offs for quality, transfers between
locations, inventory reclassi­fications,
or transactions posted directly by IT.
•	The individuals accessing the inven­
tory records did not have incompat­
ible functions. (Ours is a real-time test,
rather than the after-the-fact analysis
and reporting that was popular five
years ago.)
•	All new access rights granted to the
inventory records were approved by
appropriate senior management, and
no new inventory access rights had
been granted in the last quarter.
•	Prior monthly physical inventories had
been performed as scheduled without
significant variances, and the results
were approved by appropriate senior
management.
•	Related application controls were
reliable. These included, for example,
controls to ensure that inventory
records agree with the general ledger,
opening inventory plus purchases
less sales and adjustments equals
closing inventory, shipments cannot
be made in excess of sales orders,
and so forth. This was based on con­
tinuous testing of IT general controls,
such as approval for configuration or
code changes, and reperformance of
selected key application controls.
•	Access to the physical inventory was
limited to employees with appropriate
business needs. This was achieved
through an automated test. We
extract­ed from the security system,
on a weekly basis, a list of employ­
ees who had access to the inventory
and verified their business need
(based on a lookup of HR system
records).
•	The risk management system had
more details on assessments by the
other assurance providers, including
a copy of the last quarterly inspection
by corporate security.2 The corporate
security team had assessed the risk
from inventory theft to be low. All the
cameras were in place and working
properly, management and employ­
ees demonstrated the appropriate
level of attention to security, and the
inventory was properly secured. The
Blackpool security team was at full
strength, and only current employees
had access to the finished goods
inventory.
“To add perspective, I reviewed the
latest financial performance results:
•	The Blackpool location has been
con­sistently profitable, although the
results in the last quarter were 5%
below forecast.3
•	The inventory write-off was substan­
tial but less than 5% of total inven­tory,
causing the plant to have a small loss
for the quarter.4
•	Sales were quite seasonal, with the
highest volumes in the fall. Inventory
balances were consistent, with sales
at their highest just before the sales
peak and at their lowest in the
following quarter.
“The auditor assigned to monitor
Blackpool operations and risks was
Fred Eagle. (Each member of our team
is assigned to work with the manage­
ment of selected locations or functions
7
signs might be electronically monitored,
but every so often a nurse needs to
check in to make a physical observa­tion.
The situation in Blackpool was the same:
all the monitors indicated that the con­
trols were working fine, but sometimes
you need that in-person contact.
“In this case, Fred and the local con­
troller convened a meeting with the
inventory, operations, and finance staff.
Fred walked them through the process­
es they had followed to perform the
inventory and found a problem with
their cutoff procedures. They had not
checked to ensure that all the inventory
movements were in the system. In
response to Fred’s questions, they
realized that one of the shipping clerks
had taken ill the day before the inven­
tory count. The controller made a call
and confirmed that a couple of pickups
by the carrier had not been processed.
The amounts involved were almost
exactly the inventory shortage.
“The problem was solved, and
Blackpool management agreed to im­
prove pro­cesses for future inventory
counts. In the meantime, Fred and I
talked about whether we should add
automated risk-monitoring procedures
for inventory counts and then start con­­
tinuous audit­ing for related controls.
We decided that the current inventory
risk monitors were sufficient. That is
con­sis­tent with our whole approach to
contin­uous assurance: focus on the
more sig­nifi­cant risks and improve the
pro­gram over time as we learn from
experience.”
The Journey from Traditional
Auditing
Edgar describes how his company
devel­oped the continuous risk and
control assurance program.
“For years before we started our pro­
gram, the internal audit community had
been very interested in continuous
audit­ing and monitoring.5 (There is no
fundamental difference between the two.
The distinction lies not in the work being
performed but in who is perform­ing it:
‘auditing’ by internal audit and ‘moni­
toring’ by management.6) The value was
seen in:
•	Automating certain control tests
where there was a need to test every
year – for the annual Sarbanes-Oxley
assessment of internal control over
financial reporting, for instance
•	Testing data and gaining insight into
related controls in more sensitive busi­
ness processes such as accounts
payable and payroll, particularly where
there was a risk of fraud
“The focus was on using automation
to test controls and examine data, but
there was no linkage to or focus on risk.
In addition, a number of internal audit
leaders had been talking for a long time
about the fact that our role in internal
audit is not to perform audits. In fact,
our role is to provide the board and exe­
cutive management with assurance that
the organization’s risks are under­stood
and managed within board-established
risk tolerances, and that the system of
internal control is operating as intended.
to understand the business and its
more significant risks. In the old days,
we updated the risk-based audit plan
for­mally once a year and informally
every quarter. Now, I expect it to be
updated weekly in CRCS by the audit
team.) Fred had confirmed the internal
audit risk assessment as low just
last week.
“I called Fred and we talked about what
to do. We agreed the first step was to
check that the other Blackpool inven­
tory risks were all green lights and that
the updates were current. We were
interrupted by a call from the logistics
manager. I put him on hold while I asked
Fred to check out the other controls
and call the Blackpool controller to get
a status report. In particular, Fred was
to confirm that the physical inventory
count had followed the correct
procedures.
“The logistics manager told me that he
had also received an alert. He was con­
cerned that we did not have sufficient
inventory on hand in Blackpool to fill
a large order from an important custom­­
er. He was glad to know that we were
already looking into the situation and
asked that we let him know as soon
as possible what the resolution was,
so he could work something out with
the customer.
“About an hour later, Fred called back.
He said that automated continuous
assurance only goes so far. It’s like
having a patient in the intensive care
unit of the hospital: the patient’s vital
8
(The Institute of Internal Auditors’
Standards defines internal auditing as
an activity that ‘provides independent,
objective assurance and consulting
services.’ Emphasis is added.) We
recognized that providing this peace of
mind – the ability to ‘sleep during the
storm’ – could best be done through
continuous risk and control assurance.
We define this activity as follows:
‘The ability to provide stakeholders with
assurance on a continuing basis that
the more significant risks are managed
and related controls are operating
effectively.’7
“We worked with management, espe­
cially the risk management team, to
identify the areas of greatest risk to the
company’s objectives. The risk man­
age­ment team agreed to implement a
continuous risk-monitoring program to
measure and report the status of those
risks. Next, we identified the key con­
trols required to manage those risks.
For each, a strategy was developed:
how would we monitor the performance
of the controls? Where possible, we
automated the testing of the controls
(which often included auditing of related
transactions or activities). The results
of the monitoring activities were used
to maintain, in part, the risk status.
“The continuous risk and control assu­r­
ance program provides management in
all areas with reports and dash­boards
showing the status of all the key risks.
Where there are adverse incidents,
potential control breakdowns or frauds,
or risks appearing to spike upward,
internal audit and responsible manage­
ment receive immediate alerts, such as
the one I received during breakfast.
“Our program enables us to give man­
agement and the board the continuous
assurance they value so highly. It also
enables us to move to more of a
‘monitor and respond’ approach in the
assurance area and focus our project
time on issues and opportunities to
drive process efficiencies and other
improvements in the operation of the
company.
“The success of our continuous assur­
ance program has been significantly
enhanced by the GRC convergence
program we conducted at about the
same time. All the functions involved in
GRC work together to avoid duplication
of effort, rely on each others’ work, and
use the same systems and processes
where possible. In our case, that
involves internal audit, risk manage­ment,
supply and logistics, physical security,
IT governance, legal compliance, and
financial compliance (Sarbanes-Oxley,
tax and statutory reporting, and so on).
“As internal auditors, we are obliged
to provide independent and objective
assurance to our stakeholders. Where
we have decided to rely on other assur­
ance providers’ work, we make sure
we have performed procedures our­
selves to give us reasonable assurance
of the quality and consistency of that
work. So we perform periodic audits of
the risk management office, corporate
security, IT security, and the like.
“Convergence involved process and
tools. While we considered integrating
some of the GRC functions, in the end
we decided to keep them independent
but cooperating. From a process point
of view, we all decided to take a risk-
based approach, especially around
com­pliance topics. Legal compliance
might identify a high-level risk related
to compliance with U.S. technology
export laws, for example. That would
be identified as a risk in our risk man­
agement system, where we would also
identify the controls in place to manage
the risks. The level of risk, the number
and severity of any adverse incidents,
the controls in place to manage the
risks, and corrective actions (where
issues are identified) are all monitored
and tracked in the same system. This
approach provides the legal compliance
and risk management leaders with a
single source of truth about the risk
level and how well it is managed. It also
enables all the operational managers
responsible for any of the processes
involved, such as supply and logistics,
to include monitoring of this risk in their
daily, weekly, and monthly dashboards.
“The tools are also shared; we use a
number of products from SAP, includ­
ing SAP® BusinessObjects™ GRC
solutions for risk management, access
control, process control, and global
trade services. We also use SAP
BusinessObjects business intelligence
solutions to drive our corporate and
internal audit data warehouses, and
SAP BusinessObjects Text Analysis
software for Web-based searches of
unstructured data.
9
“The internal audit department had
received overtures from a number of
vendors offering excellent point solu­
tions designed for internal audit func­
tions or specifically for internal control
or data auditing. However, we placed
a high value on avoiding software pro­
lifera­tion in favor of using common
enterprise applications.
“We perform a large number of audit
projects that focus on operational effec­
tiveness and efficiency. We can do this
because the continuous assur­ance pro­
gram is highly effective. A com­paratively
small portion of our time is spent on
assurance, freeing up the audit staff
for value-added consulting projects.
The audit committee and executive
management have confidence in our
risk manage­ment and internal control
processes and have made it a priority
for internal audit to perform these
projects.
“The results of our consulting projects
sometimes indicate an opportunity to
improve business processes or opera­
tions, which we capture in our risk
management system. After all, efficiency
is a corporate objective, and we can
identify and monitor related risks.
“In the old days, when we performed
traditional assurance projects, we had
an audit management system. It was a
software product where we maintained
our work papers, tracked the history of
our audits, followed up on audit findings
and management actions, and generally
managed the audit team – project plan­
ning, skills inventory, and the like. The
continuous assurance program has
eliminated most of that, as follows:
•	The results of any audit work, includ­
ing risk and control assessments,
are captured in the risk management
system. The history is automatically
captured.
•	We also track corrective actions in
the risk management system.
•	Project planning, where needed, is
done using specialized project man­
agement software.
•	The skills inventory, which is very
important to our ability to staff proj­
ects like lean finance or inventory
management, is maintained in our
SAP ERP Human Capital Manage­
ment solution.”
10
The Next Evolution of Internal Audit
The Continuous Risk and Control
Assurance Model
Edgar’s story is typical of the internal
audit executive of the future. In its break­
through paper, Internal Audit 2012,8
PricewaterhouseCoopers discussed
a “consensus projection of the trends
likely to shape the world of internal
audit by the year 2012.” Of particular
note are the following observations
(emphasis added):
“Throughout the next five years, the
value of the controls-focused approach
that has dominated internal audit is
expected to diminish. As this occurs,
internal audit leaders must adopt
risk-centric mind-sets if they want to
remain key players in assurance and
risk management.”
“Some internal audit functions have
begun to rethink their fundamental value
propositions by shifting from an internal
audit model focused on controls assur­
ance to a risk-centric model where risk
and control assurance are based on
the effectiveness of risk management
processes developed by management.”
“One of the five key trends that will
drive this reshaping of internal audit by
2012 is technological advancement.”
Deloitte & Touche has a similar perspec­
tive, according to Patty Miller (a partner
and chairman of the Institute of Internal
Auditors for 2008–2009). She uses the
following table to illustrate the major
changes happening in internal auditing.
There are multiple points of interest in
the Deloitte vision:
•	The focus is on risk, with a forward-
looking and proactive style9 and
dynamic reporting.
•	The mandate is business assurance,
similar to risk and control assurance.
•	The technology application of greatest
importance will be automated testing
and continuous monitoring.
While there is a need for risk and
control assurance, we believe that the
optimal model for the future is one of
continuous assurance of risk and con­
trol. This is consistent with guidance
from the Institute of Internal Auditors,
which focuses on the provision of
assur­ance rather than the performance
of audits.10
Internal audit will provide its customers,
the board11 of directors, and executive
management with assurance that the
organization’s risks are subject to
appropriate and effective processes,
including related systems of internal
control. The assurance will be enabled
primarily through continuous risk and
control monitoring and auditing, with a
much reduced set of traditional audit
projects.
Table 1: Changes Taking Place in Internal Auditing
Historic Mainstream Cutting-Edge
Focus Audit entities based
on rotational plan
Prioritize audit entities
based on risk
Focus on strategic, busi­
ness, and pro­cess risk
Perspective Historic Historic Future
Style Corporate police “Father knows best” Consultant and advisor
Mandate Compliance with poli­
cies and procedures
Assurance on financial
control; compliance
Business assurance
Risk Focus Financial Financial plus Enterprise risks
Tool Kit Compliance work
programs
Audit work programs for
key processes; controls
Risk frameworks,
self-assessments
Technology None Automated work papers Automated testing and
continuous monitoring
11
Model Overview
Figure 1 illustrates the continuous risk
and control assurance model. It is far
more than an application of continuous
auditing or monitoring. Rather, it is a
top-down model that starts with under­
standing enterprise goals and objec­
tives, moves on to determine the poten­
tial risks to those objectives, and then
moves to the assessment and testing
of the con­trols required to manage the
risks. The overall effort usually encom­
passes the mining of data that can
provide indica­tors of the health of risk
management and related controls.
The model’s foundation is built upon
the more significant strategic and opera­
tional goals of the enterprise. Achieve­
ment of the goals and objectives is
measured through key performance
indicators (KPIs). The model includes
the monitoring of KPIs, as the failure
to achieve organizational objectives is
often the result of poor risk manage­
ment or control performance.
Risks to the achievement of those goals
and objectives are then identified.12
Continuous risk monitoring, generally by
a risk management function and not by
internal audit, ensures that the pro­gram
is focused on the more signifi­cant risks
to the enterprise, which may change
rapidly. Internal audit is a con­sumer of
the monitoring but not respon­sible for
its performance.
Management of those risks – risk
responses – is enabled by controls.13
The model includes the continuous
auditing of the key controls required to
manage risks within organizational
tolerances, usually performed by inter­
nal audit and other assurance provid­ers,
sometimes by operating management.
Some controls are difficult to test direct­
ly through automated routines, and the
continuous examination or testing of
data may provide a reason­able level
of assurance. The data mining may be
directly against information with­in the
organization’s applications or indirectly
after extraction to a data warehouse
(either an existing corporate data ware­
house or one developed specifically for
this purpose).
Fraud management is built into the
program:
•	Fraud risks are identified together
with other enterprise risks.
•	The controls over fraud risks are
assessed and tested together with
other key controls.
•	Data mining techniques can be used
to test data and identify potential
fraud situations.
Key performance
indicators
Continuous
assurance
dashboard
Alerts
Key risk
indicators
Continuous risk
monitoring
Continuous
control auditing
Continuous data
mining/auditing and
fraud detection
On-demand
data mining
Figure 1: The Continuous Risk and Control Assurance Model
Organizational goals
and objectives
Risks
Controls
Enterprise data
Data
warehouse
12
When assurance is continuous, infor­ma­
tion on the health of risk manage­ment
and related key controls needs to be
continuously available to stakeholders.
The model encompasses continuous
reporting through dashboards or similar
tools. It also includes more immediate
alerts signaling the need for a response
to a spike in risk levels, an adverse
incident, a potential controls failure, or
a data anomaly.
On-demand data mining enables an
intelligent response and investigation
of data anomalies, control failures, and
so on. The same tools that provide
continuous control and data auditing
will generally also support additional
data analytics that provide further insight
into the problem.
Each of the major elements of the model
is discussed in more detail below.
Continuous Risk Monitoring
The continuous risk and control assur­
ance program relies on the quality of
the enterprise risk management pro­cess
established by company management.
This process identifies and assesses
the risks to enterprise objectives to be
covered by the assurance program.
Although internal auditors may have an
independent assessment of risks (based
on their experience, for example), the
auditors’ rating should be integrated
with, or at least be a revision to, the
assessment of the management team,
rather than the result of a separate and
potentially redundant risk assessment
process.14
Internal auditors can (and should,
accord­ing to IIA standards15) gain com­
fort in the risk management process
through periodic audits. These audits
should address the adequacy of the
process established by management to
identify and assess risks to achieving
organizational objectives. Importantly,
the audits should evaluate whether the
risk assessment considers all factors
that internal auditors believe relevant
to the risk assessment, such as the
results of prior internal audits and the
status of open action items.
Most organizational objectives remain
relatively constant; typically, organiza­
tions only review them annually unless
there are major changes in business
conditions. But risks to the organization
change constantly. New risks emerge
while old ones fade in importance, and
existing risks rise and fall as business
conditions change. Continuous risk
monitoring is required to:
•	Ensure that assurance is provided on
today’s more significant risks
•	Identify new or growing risks that
require additional risk and control
monitoring
•	Identify sudden rises in risk levels that
may merit immediate attention by
management or internal auditors. The
large inventory write-off described
earlier led to an increase in inventory-
related risk levels. The internal audit
team responded because this might
signal a breakdown in related controls
and the potential for additional
inventory losses.
Management is typically responsible
for monitoring risks, while the internal
audit department is a consumer of risk
information. The ability to monitor risks
will become more effective when tech­
nology is used to:
•	Link enterprise information (such as
financial results, account balances,
and health and safety information)
with the risk management process.
For example, if Tap Toes Inc. sub­
stantially increases sales to China,
that should result in an increase in
related accounts receivable risks.
•	Link external information to risk
assessment processes. Many enter­
prise risks relate to external events,
and geopolitical or economic changes
may indicate a need to change risk
levels. For example, civil unrest in an
emerging nation may indicate the need
for Tap Toes to change risk levels if
the company relies on manu­facturing
operations in the area.
These technologies are available today,
and their ease of use and integration
into solutions should improve over the
next few years. The results of risk mon­
i­toring (including key risk indicators)
would typically be shown in dashboards
and other reports to the board and to
execu­tive and operating management.
13
Those dashboards enable the monitor­
ing of risk levels and taking of action
where needed.
In addition, alerts should be provided to
appropriate management and internal
audit teams when there are sudden
changes in risk levels warranting more
immediate action. Typically, the internal
audit team will review the alert to deter­
mine whether there has been a break­
down in either risk management or the
related internal controls. In some cases,
audit projects and even investigations
may be required to assess the situation
and identify remedial actions.
Continuous Controls and
Data Auditing
The continuous assurance program
should focus only on the more signifi­
cant risks and related controls. Once
the risks to be included in the program
have been identified, the controls and
data to be tested can be defined.
The selection process for risks to be
included should consider:
•	The highest-rated risks
•	Risks that may not be likely but
where an adverse incident could be
a threat to the entire enterprise
•	Areas where key stakeholders (such
as the board or executive manage­
ment) place a high value on assurance
Once the business risks are determined,
the next step is to identify the key con­
trols required to manage those risks
within organizational tolerances.16
In almost all cases, organizations rely
on a combination of controls to manage
a business risk.17 Most risks will depend
on controls at the entity level (a code
of conduct, a corporate policy, and so
on), in business processes (accounts
payable, for example), and within IT
pro­cesses (such as application change
control or security).
It is critical to understand all the key
controls, since an assurance strategy
has to include measures to obtain
assurance for them all. Table 2 lists
some of the key controls to manage
the risk of theft of finished goods
inventory at a hypothetical company.
Table 2: Example of a Combination of Key Controls
Controls Type of Control
The organization has a code of business conduct. Entity-level
New employees are required to confirm their understanding of
the code of conduct. Records are maintained in the HR system.
Entity-level
All employees sign a code of conduct certification annually and
records are maintained in the HR system.
Entity-level
Hiring procedures include background checks, with records
maintained in the HR system.
Entity-level
Physical access to finished goods inventories is restricted based
on business need.
Business process
Finished goods inventories are physically secured by doors and
monitored by guards; cameras are in place.
Business process
After inventory counts are entered, the inventory module provides
reports showing inventory variances. Each report shows the
inventory per the system, the inventory counted, and the calculated
variances.
Business process
Only the inventory manager can approve the posting of inventory
adjustments (for example, write-offs following the inventory count).
Business process
All inventory program changes are approved by the inventory
manager in the change control system.
IT general control
14
Some of these controls are difficult to
test directly on a continuous basis, and
it may be better to test the underlying
data. For example, the second control
above is “New employees are required
to confirm their understanding of the
code of conduct. Records are main­
tained in the HR system.” In a traditional
assurance project, the auditor would
review the employee records and con­
firm, through examination of a sample
of documents, that the employee had
signed to confirm understanding. In a
continuous assurance program, exami­
nation of signatures is unlikely to be an
option. Instead, the HR system records
might be tested to identify new employ­
ees where there was no record of a
confirmation (a data auditing or data
mining technique). The level of assur­
ance is not as strong as if the actual
signatures were tested, but the auditor
may decide that a reasonable level
of assurance is obtained that can be
upgraded by adding an annual exami­
nation of signatures (if the auditor deter­
mines the risk so merits).
The auditor may assess as low the
risk of noncompliance with a control
or the risk presented if the control was
ineffec­tive. In these cases, the auditor
may decide that sufficient assurance is
achieved by a less-frequent test strate­
gy. An example would be the first con­
trol above: “The organization has a
code of business conduct.” Because
the second control is tested, there is a
high degree of assurance that the code
of business conduct exists and is avail­
able to employees. The auditor may
decide not to test the control directly
or to test it only annually.
It is generally best to test data as it is
being processed by the application sys­
tem; if there are questionable results,
they can be investigated promptly and
adverse consequences can be prevent­
ed or at least minimized. However, there
are times when it may be better to use
data that has been extracted to a data
ware­house for testing. (This data may
be in an existing data warehouse or in
one developed for this particular pur­
pose – perhaps owned by the internal
audit department.) An example is where
the auditor wants to test trends over a
period of time. The use of a data ware­
house may also be valuable when data
is being compared to information in other
systems. For example, access to an
inventory warehouse should be limited
to individuals with warehouse responsi­
bilities, which can be identified through
information in each person’s HR records.
The key is that the auditor will consider
each of the key controls relied on for
the risk to be addressed and determine
the appropriate assurance strategy and
the specific assurance technique. (For
example, the strategy might be to test
the control, test the data, or rely on the
work of other assurance providers.)
Table 3 takes each of the controls in
Table 2 and assigns a strategy and
continuous assurance technique.
Key points from the example include:
•	Assurance is obtained using a combi­
nation of techniques, including auto­
mated and nonautomated testing (such
as the annual review of the code of
ethics), the testing of controls and
data, and reliance on other assurance
activities (such as SOX testing and
corporate security audits).
•	Not all the techniques are continuous
in nature (for example, the periodic
testing of HR record keeping).
This particular example brings out a
limitation in most audits of internal con­
trol, whether using continuous assur­
ance techniques or traditional auditing
methods: the difficulty in auditing
behavioral aspects of internal control.
Do the people who have signed a certi­
fication of the code of conduct actually
understand and intend to follow the code
of conduct? The latter, which involves
the integrity of individual employees, is
hard if not impossible to test; instead,
controls that provide reasonable assur­
ance, such as background checks, are
assessed. However, it is possible to test
with reasonable effectiveness whether
individuals understand the code of con­
duct: through interviews during tradi­
tional audits or through online testing.
Employees might be asked to answer
questions about the content or the loca­
tion of the policy included in contin­uous
audit assurance programs.
15
Table 3: Example of Key Controls and Assurance Techniques
Controls Assurance Strategy Assurance Procedure
The organization has a code of business
conduct.
Annual test by examination Review the code of conduct and ensure it is current
New employees are required to confirm their
understanding of the code of conduct.
Records are maintained in the HR system.
Continuous data auditing of
HR records
Identify any employees who have not con­firmed the
code of conduct within 3 months of hire, according to
HR records
Periodic auditing of HR system
mainte­nance procedures
On a periodic basis, validate that HR records are
updated accurately and on a timely basis
All employees sign a code of conduct
certification annually and records are
maintained in the HR system.
Continuous data auditing of
HR records
Identify any employees who have not certified the
code of conduct as required
Periodic auditing of HR system
mainte­nance procedures
On a periodic basis, validate that HR records are
updated accurately and on a timely basis
Hiring procedures include background checks,
with records maintained in the HR system.
Continuous data auditing of
HR records
Identify any employees where a clean back­ground
check is not recorded in the HR system
Periodic auditing of HR system
mainte­nance procedures
On a periodic basis, validate that HR records are
updated accurately and on a timely basis
Physical access to finished goods inventories
is restricted based on business need.
Continuous data auditing Identify any individual whose badge grants access to
finished goods inventory but who does not have a
business need based on job function (per HR system)
Finished goods inventories are physi­cally
secured by doors and monitored by guards;
cameras are in place.
Reliance on physical security
audits by corporate security,
together with moni­toring of
security audits
Obtain an alert whenever a security audit report is filed
by exceptions
Continuous data auditing Identify any delays in filing the results of security
audits (required at least quarterly)
After inventory counts are entered, the inven­
tory module provides reports showing inventory
vari­ances. Each report shows the inventory
per the system, the inven­tory counted, and the
calculated variances.
Reliance on annual Sarbanes-
Oxley (SOX) reperformance
of application controls
Include reperformance of the inventory variance
calculation in SOX testing
Only the inventory manager can approve the
posting of inventory adjustments (for example,
write-offs following the inven­tory count).
Continuous control and data
auditing
Continuously test access control procedures, including
that no changes are made to authority to approve
inventory adjustments (an exception report is sent to
IT security and internal audit if there are changes)
All inventory program changes are approved
by the inventory manager in the change
control system.
Reliance on annual SOX testing
of IT general controls
Include continuous data testing in SOX testing: only
the inventory manager approves program changes
16
Continuous Fraud Detection
Fraud is one risk that needs to be
ad­dressed by every organization. In
gen­eral, the level of effort should be
commensurate with the level of risk and
the risk tolerance of the organization.
Fraud detection is one element of an
effective fraud management program,18
and it is more efficient when integrated
with the continuous risk and fraud
assur­ance program. For example:
•	Fraud risks are monitored with other
organizational risks to ensure that
fraud detection activities address
current risks.
•	Controls to prevent or detect fraud
are assessed, as with controls
related to other risks.
•	Continuous fraud detection is primar­
ily performed using the same contin­
uous data mining and other testing
techniques.
The level of frauds detected by the nor­
mal operation of controls or traditional
internal audits (including forensic or
fraud audits) is low: 42% according to
a 2008 study by the Association of
Certified Fraud Examiners. A contin­uous
risk and control assurance program that
includes monitoring risks, assessing
and testing controls, and testing data
should increase significantly the likeli­
hood that fraud is prevented or detected
on a timely basis.
On-Demand Data Mining
When potential control issues are
identified or risk levels rise for unclear
reasons, the auditor is likely to need
additional information to determine the
appropriate actions (which can range
from inquiries of management to an
on-site audit or even a formal investiga­
tion). The information may be obtained
through “on-demand data mining” of
application data or after extracting the
relevant information to a data ware­
house. As with continuous data mining,
the data warehouse could be an exist­
ing corporate data warehouse or one
developed for the continuous assurance
program.
The Monitoring of Key
Performance Indicators
KPIs are established so that manage­
ment at each level can monitor the
business. They provide the information
necessary to understand the success
or failure of initiatives and programs
and to take action as appropriate.
KPIs are important sources of infor­ma­
tion for auditors as well. A failure to
achieve goals and objectives, or finan­
cial and operation targets, is often a
strong indicator that related risks are
not effectively managed or related
internal controls are ineffective.
The monitoring of KPIs should be a key
component of the continuous risk and
control assurance program, and its
results considered together with those
of the continuous risk-monitoring pro­
gram. The internal audit team should
give strong consideration to periodic
reviews or audits of the KPI processes
to ensure that the KPIs can be relied
upon by management and used for the
continuous assurance program.
17
Continuous Reporting
Continuous assurance is not provided
without communication to the key stake­
holders. They will have peace of mind
and “sleep through the storm” only if
they have received assurance that the
more significant risks are man­aged and
related controls are operating effectively.
In the traditional world of internal audit­
ing, reports are provided at the conclu­
sion of each audit project. In addition,
many leading internal audit depart­ments
provide annual assessments of the
overall condition of the organization’s
risk management processes and sys­
tems of internal controls. When internal
audit functions evolve and provide con­
tinuous risk and control assurance,
these periodic communications have to
be replaced by more current, continuous
communications.
Each stakeholder’s needs must be con­
sidered when developing and providing
continuous risk and control assurance
information. Some may be satisfied
with occasional updates that focus on
exceptions – members of the board of
directors, for example. Others will prefer
more detailed information, with an
emphasis on risks and controls relevant
to their specific areas of responsibility.
If the organization has a risk manage­
ment organization in place, separate
from internal auditing, then both organi­
zations should work together to present
a single source of truth about the health
of risk management and related con­
trols. There is no value when the two
organizations provide different assess­
ments or assessments in different
forms that serve only to confuse.
Each organization will develop the com­
munication vehicles that best suit their
culture, their mode of operation, and the
needs of each stakeholder. Some may
decide to use dashboards for each high-
level risk area, with drill-down features
allowing them to see the under­lying
health of risk management and related
controls in detail. Others may want much
more detailed reports or have totally
separate reporting for each consumer
of the information – for example, sepa­
rate reports for the board, CEO, CFO,
chief risk officer, head of environmental
compliance, head of logis­tics, and so
on. However, it is criti­cal that all the
information be consistent at all times.
18
Additional Considerations
Continuous Monitoring Versus
Continuous Auditing
The continuous risk and control assur­
ance model will enable the internal audit
function at any organization to provide
more valuable, effective assurance ser­
vices to their stakeholders at board and
management levels. Traditional, peri­odic
assurance engagements of relatively
narrow and shallow focus will be re-
placed by a continuous assurance pro­
gram with broader and deeper insight
into the health of risk manage­ment and
related controls.
One question each organization will
need to address is which monitoring
and auditing activities will be performed
by management and which will be per­
formed by the internal audit team.19 In
fact, writers on the topic of contin­uous
auditing have differentiated continuous
auditing and continuous monitoring
only by the function responsible for the
activities: continuous monitoring is per­
formed by management and continuous
auditing by internal audit departments.20
There may be little or no difference in
the tools and techniques used.
We do not take a position in this docu­
ment on where the division of duties
should be. That should depend on the
following:
•	The culture and organizational struc­
ture of each entity (factors to con­sider
include whether there are multiple
compliance or internal control func­
tions and whether management, the
internal audit team, or a combination
of the two is expected to monitor
controls)
•	The maturity of the risk management
process (such as whether there is a
separate risk function with resources
to monitor risks and report on the
health of risk management and
related controls)
•	The efficiency of the entity’s applica­
tions (such as the ease with which
monitoring can be built into the daily
process of each line of business)
19
When management performs contin­
uous assurance activities, internal
auditors will have to determine what
procedures they will follow to obtain a
reasonable level of assurance that the
monitoring performed by management
is consistent and effective. The audi­
tors will not be able to provide objective
and independent assurance on risk and
controls unless they are comfortable
with management’s continuous moni­
toring activities.
There will certainly be an initial invest­
ment required of time and resources,
and maintenance will be essential to
ensure that the continuous assurance
program continues to be effective in
addressing current risks and related
controls. But the continuous assurance
program should be more efficient and
consume fewer resources than a tradi­
tional, comprehensive assurance pro­
gram. This represents further opportu­
nities for the leading-edge internal audit
department, as follows:
•	Resources can be assigned to
monitor and respond to changes in
the health of risk management and
related controls, ensuring prompt
action by management to mitigate
any adverse effects.
•	Internal auditors can turn their atten­
tion to emerging risk areas, where the
business is changing. For example,
internal audit will have the resources
to participate proactively to ensure
that risk management and control
aspects of new processes and sys­
tems are part of the initial design and
implementation, rather than after­
thoughts. The same approach can
be taken to internal audit involvement
in merger and acquisition activities,
changes in business plans, develop­
ment of new products, and so forth.
Each time, the internal audit team
assumes an advisory role. It ensures
that risks associated with the busi­
ness change are considered and
responses are developed, that appro­
pri­ate risk monitoring will be in place,
and that all required key controls are
identified early and implemented
effectively.
•	Additional resources are likely to be
available for value-added consulting
activities that focus not only on
whether governance, risk manage­
ment, and internal control processes
are effective but also on whether
they are efficient.
•	In the traditional internal audit model,
significant resources may be spent
developing audit programs and build­
ing working papers. When technology
is used to enable continuous testing,
it generally includes the ability to
maintain a record of the tests per­
formed and results obtained –
including workflow for managing and
resolving exceptions. For example,
if an automated data mining routine
identifies an anomaly, where an indi­
vidual has been granted access to
finished goods inventory but his or
her job description (according to the
HR system) does not indicate that
there is a business need for the
access, then an alert is sent to the
auditor. Workflow associated with
that alert can capture the auditor’s
resolution of the issue. If manage­ment
action is required to address a prob­
lem (such as to remove the access),
then that is recorded in the system,
routed to management for action,
reported as open until completed,
and the resolution is captured and
retained.
The level and type of day-to-day work
performed by internal auditors will
change, and it will involve more and
deeper discussions with management
about the business, its risks, and
controls. Auditors will be recognized as
value-adding contributors, so that both
the work will be more interesting and
the recognition for their efforts will be
much greater.
20
Other Resources
Material referenced in this document
includes:
•	Institute of Internal Auditors:
–	 Global Technology Audit Guide:
Continuous Auditing: Implications
for Assurance, Monitoring, and
Risk Assessment
–	International Standards for the
Professional Practice of Internal
Auditing
–	 GAIT for IT and Business Risk
•	Institute of Internal Auditors,
Association of Certified Fraud
Examiners, and the American Institute
of Certified Public Accountants:
–	 Managing the Business Risk of
Fraud
•	KPMG:
–	 Continuous Auditing/Continuous
Monitoring: Using Technology to
Drive Value by Managing Risk and
Improving Performance
•	The Committee of Sponsoring
Organizations of the Treadway
Commission (COSO):
–	Enterprise Risk Management
Framework
–	 Guidance on Monitoring Internal
Control Systems
•	The Institute of Internal Auditors –
Australia and Standards Australia:
–	Delivering assurance based on
AS/NZS 4360:2004 Risk
Management
•	Standards Australia and Standards
New Zealand:
–	AS/NZS 4360:2004 Risk
Management
•	PricewaterhouseCoopers:
–	Internal Audit 2012, A study
examining the future of internal
auditing and the potential decline
of a controls-centric approach
21
1.	The continuous testing has several
forms, depending on what is most
efficient and effective, considering the
level of risk. It includes:
•	Automated tests of every trans­ac­
tion, where exceptions are reported
through alerts (for instance, invoices
approved for payment by individuals
without that authority, or with con­flict­
ing responsibilities)
•	Semiautomated testing, where spe­­
cific types of activity are reported
periodically for review to determine
whether there are reasonable expla­
nations or they are exceptions (for
example, changes to the configura­
tion of an SAP automated control)
•	In a few cases, reliance on manage­
ment’s continuous monitoring of the
controls
– Generally, an automated request
is sent to management asking
that it con­firm that the control is
operating properly. On a periodic
basis, depend­ing on the level of
risk, we will per­form audit pro­ce­
dures to confirm manage­ment’s
self-assessment.
2.	This is another result and benefit
from the GRC convergence program
(discussed in “The Journey from Tradi­
tional Auditing” section of this docu­
ment). The risk level for inven­tory theft
is changed if there is a poor security
inspection. Internal audit may respond
with unannounced attendance at the
next routine physical inventory.
3.	Edgar explains: “One of our strate­
gies for continuous assurance is that
we monitor the business results for
indicators of a change in risk levels.
In addition to attending management
operational and financial review
meetings with the major subsidiaries,
we download the detailed financial
results each month into our internal
audit data warehouse. Our business
intelligence software provides us with
regular reports of unusual vari­ances
and trends. For example:
•	An increase in sales in an emerg­ing
nation might indicate increased risks
to revenue recognition and ethics
compliance. This information is fed
into the risk assessment and the
underlying analysis retained in the
data warehouse.
•	A concentration of purchases through
a single vendor might be a fraud
indicator.
•	A large number of credit memos at
the beginning of the quarter could
indicate ‘channel stuffing’ and
increased revenue recognition risk.
•	An increase in key inventory met­rics
(especially the number of days’ sales
we held in any inventory cate­gory)
might indicate an efficiency issue:
in procurement, manufact­ur­ing, or
logistics.”
4.	 “Although it did not come up during
our work on this incident, we found out
later that the CFO’s daily dash­board
reflected the potential loss situation and
he had called the local controller and the
corporate risk manager. Because we
were working together to resolve the
issue and take any necessary actions,
all he did was make a note and follow
up at the end of the month. He told me
in our next meeting how pleased he was
with the added value our continuous
assurance program, coupled with our
problem-solving approach, provided
him and the rest of the executive team.
The CFO made a point of informing the
audit committee.”
5.	 Protiviti Inc., a firm specializing in
internal audit, risk, and business con­
sulting, published the 2009 edi­tion of
its Internal Audit Capabilities and Needs
Survey summarizing responses from
more than 1,000 internal auditors. These
auditors cited continuous audit­ing,
com­puter-assisted audits tech­niques
(CAATS), data analysis tools (statistical
analy­sis), and data analysis tools (data
manipulation) as the areas where they
needed the greatest improve­ment,
regardless of their level of competency
in those areas. Further, chief audit exe­
cutives participating in the survey agreed
that they too most wanted to improve
in those areas, compared to more than
40 other topical choices covering inter­
nal audit process knowledge.
Notes
22
Robert Hirth, executive vice president
and global leader of Protiviti’s internal
audit practice stated, “Continuous
auditing, CAATS, and automated data
analysis are all just the kind of ‘looking
through the front windshield rather than
the rearview mirror’ techniques internal
auditors need in order to be relevant
and add value in the eyes of their stake­­
holders as well as to stay up with the
business itself and effectively help their
organizations manage risk, which by its
very definition is future oriented.”
6.	The IIA, in its global technology
audit guide, Continuous Auditing:
Implications for Assurance, Monitoring,
and Risk Assessment, defines contin­
uous auditing as “a method used to
perform control and risk assessments
automatically [we disagree with the
“automatically” limitation, as noted in
this document] on a more frequent
basis.” It describes continuous moni­tor­
ing as “the processes that manage­ment
puts in place to ensure that the policies,
procedures, and business processes
are operating effec­tively.” KPMG LLP’s
2008 publication Continuous Auditing/
Continuous Monitoring: Using Technol­
ogy to Drive Value by Managing Risk
and Improving Performance describes
continuous auditing as “the collec­tion
of audit evidence and indicators by
an internal auditor on information tech­
nol­ogy (IT) systems, processes, trans­
ac­tions, and controls on a fre­quent or
continuous basis through­out a period.”
KPMG defines con­tinuous monitoring
as “a feedback mechanism used by
management to ensure that controls
operate as designed and transactions
are processed as prescribed.” These
definitions are expanded later in the
document: “CA [continuous auditing]/
CM [continuous monitoring] needs to
monitor the risks that would prevent
the organi­zation from achieving its
objectives.”
7.	The 2008 publication Continuous
Auditing/Continuous Monitoring: Using
Technology to Drive Value by Managing
Risk and Improving Performance by
KPMG notes that “while the definitions
of CA and CM may vary across orga­
nizations and industries, the goal in
pursuing these disciplines is to provide
greater transparency, effectively man­
age risk and perfor­mance, and provide
continuous assurance. Depending on
an indi­vidual’s role within the organi­za­
tion, he or she can think of CA or CM
as a lens to assess and/or monitor the
effectiveness of the organization’s
governance, risk, and compliance
(GRC) program.”
8.	 Published in 2007.
9.	KPMG’s 2008 publication Contin­
uous Auditing/Continuous Monitoring:
Using Technology to Drive Value by
Managing Risk and Improving Perfor­
mance comments that:
“As business risks of all kinds con­tinue
to proliferate, management and internal
audit departments are actively seeking
23
new ways to quickly gain access to valu­­
able information to manage risk and
improve perfor­mance. Such efforts
increasingly include continuous auditing
and con­tinuous monitoring of organiza­
tional processes, systems, and controls.”
It continues:
“What’s more, management and inter­
nal audit efforts to adapt inno­vative
ways of assessing and man­aging risk
and enhancing perfor­mance are now
more critical than ever. Providing senior
management with a ‘post mortem’ after
a prob­lem has occurred is no longer
accept­able. . . . As a result, manage­ment
and internal audit teams are embrac­ing
CA and CM as important efforts that
can provide efficient and contin­uous
discipline to monitor issues on a frequent
or real-time basis, result­ing in risk events
being addressed before issues arise.”
10. The definition of internal auditing,
according to the Institute of Internal
Auditors, is as follows:
“Internal auditing is an independent,
objective assurance and consulting
activity designed to add value and
improve an organization’s opera­tions.
It helps an organization accomplish its
objectives by bringing a systematic,
disciplined approach to evaluate and
improve the effectiveness of risk man­
agement, control, and governance
processes.”
Standard 2120 provides further detail:
“The internal audit activity must evalu­
ate the effective­ness and contribute to
the improvement of risk management
processes.”
Interpretation:
“Determining whether risk management
processes are effective is a judgment
resulting from the internal auditor’s
assessment that:
• Organizational objectives support
and align with the organization’s
mission;
• Significant risks are identified and
assessed;
• Appropriate risk responses are
selected that align risks with the
organization’s risk appetite; and
• Relevant risk information is captured
and communicated in a timely manner
across the organization, enabling staff,
management, and the board to carry
out their responsibilities.
“Risk management processes are mon­
itored through ongoing manage­ment
activities, separate evalua­tions, or both.”
Standard 2130.A1 is important, as it
indicates that the evaluation of controls
should be as they relate to enterprise
risks:
“The internal audit activity must eval­u­
ate the adequacy and effec­tive­ness of
controls in responding to risks within the
organization’s governance, opera­tions,
and information systems regarding the:
• Reliability and integrity of financial
and operational information;
• Effectiveness and efficiency of
operations;
• Safeguarding of assets; and
• Compliance with laws, regulations,
and contracts.”
The handbook developed by IIA-
Australia and Standards Australia,
Delivering assurance based on AS/
NZS 4360:2004 Risk Management,
comments on the need to “focus audit
and assurance activities on those risks
which, if the controls were absent or
had failed, would expose us to high and
unacceptable conse­quences. In those
cases assur­ance activity is there to
provide ‘assurance’ that key controls
are both adequate and effective.”
11.	References to the “board” include
the board itself and/or one or more of
its committees, such as the audit com­
mittee, governance committee, risk
committee, or similar.
12.	The Committee of Sponsoring
Orga­nizations of the Treadway
Commission’s (COSO’s) Enterprise
Risk Management Framework (ERM),
published in Sep­tember 2004, defined
enterprise risk management as follows:
24
“Enterprise risk management is a pro­
cess, effected by an entity’s board of
directors, management, and other per­
sonnel, applied in strategy setting and
across the enterprise, designed to
identify potential events that may affect
the entity and manage risks to be within
its risk appetite, to provide reasonable
assurance regarding the achievement
of entity objectives.”
13.	COSO ERM defines control activi­
ties as “the policies and procedures
that help ensure risk responses are
properly executed. Control activities
occur throughout the organization, at
all levels and in all functions. Control
activities are part of the process by
which an enterprise strives to achieve
its business objectives.”
14.	Internal auditors use factors such
as the results of prior audits, the status
of open audit findings, and the time since
the last audit in addition to opera­tional
factors typically included in man­age­
ment’s assessment of risk (such as the
volume of business and related trends).
We believe these factors should be
included in management’s risk assess­
ment process as well.
15.	See note 10.
16.	The IIA standards define control
processes as “the policies, proce­dures,
and activi­ties that are part of a control
framework, designed to ensure that
risks are con­tained within the risk toler­
ances estab­lished by the risk manage­
ment process.”
The concept of key controls has been
described in other IIA documents. For
example:
•	The IIA-Australia and Standards
Australia Handbook, Delivering assur­
ance based on AS/NZS 4360:2004
Risk Management, defines key
control as “controls or groups of con­
trols that are believed to be main­tain­
ing an otherwise intolerable risk at a
tolerable level.” The hand­book con­
tinues to discuss control adequacy:
“Adequacy of risk management, con­
trol, and governance processes is
present if management has planned
and designed them in a manner that
provides reasonable assurance that
the organization’s objectives and
goals will be achieved efficiently and
economically.”
•	Similarly, the IIA’s GAIT-R publication,
GAIT for Business and IT Risk, says
key controls “relied on to ensure fail­
ures in achieving business objectives
will be either prevented or detected
on a timely basis.”
17.	This document does not include
details on how to identify all the key
controls required to address a business
risk. There are other publications that
provide such guidance, including the
IIA’s GAIT for IT and Business Risk,
25
available from the technology section
of its Web site at www.theiia.org.
18.	An excellent reference is the joint
publication of the Institute of Internal
Auditors, Association of Certified Fraud
Examiners, and the American Institute
of Certified Public Accountants:
Managing the Business Risk of Fraud.
Principle 2 in that document states:
“Fraud risk exposure should be
assessed periodically by the organiza­tion
to identify specific potential schemes
and events that the organization needs
to mitigate.”
Principle 4 addresses fraud detection:
“Detection techniques should be estab­
lished to uncover fraud events when
preventive measures fail or unmitigated
risks are realized.”
19.	While management as a whole is
responsible for the system of internal
control, when it comes to monitoring
the system of internal control, the
board and management may rely on a
combination of management and
internal audit-monitoring procedures.
COSO’s 2009 publication Guidance on
Monitoring Internal Control Systems
explains:
“Organizations may select from a wide
variety of monitoring procedures,
including but not limited to:
•	Periodic evaluation and testing of
controls by internal audit,
•	Continuous monitoring programs built
into information systems,
•	Analysis of, and appropriate follow-up
on, operating reports or metrics that
might identify anomalies indicative of
a control failure,
•	Supervisory reviews of controls,
such as reconciliation reviews as a
normal part of processing,
•	Self-assessments by boards and
management regarding the tone they
set in the organization and the effec­
tiveness of their oversight functions,
•	Audit committee inquiries of internal
and external auditors, and
•	Quality assurance reviews of the
internal audit department.”
20.	The IIA’s Global Technology Audit
Guide (GTAG) on Continuous Auditing:
Implications for Assurance, Monitoring,
and Risk Assessment defines contin­
uous auditing and continuous monitor­
ing as follows:
“Continuous auditing is a method used
[by auditors] to perform control and risk
assessments automatically on a more
frequent basis.
“Continuous monitoring encompasses
the processes that management puts
in place to ensure that the policies,
procedures, and business processes
are operating effectively.”
The GTAG continues:
“Many of the techniques of continuous
monitoring of controls by management
are similar to those that may be per­
formed in continuous auditing by internal
auditors.
“Management’s use of continuous
monitoring procedures, in conjunction
with continuous auditing performed by
internal auditors, will satisfy the demands
for assurance that control procedures
are effective and that the information
produced for decision making is both
relevant and reliable.”
26
We at SAP would like to express our appreciation to the
following individuals (and to those who prefer to remain ano­ny­
mous), who contributed with their ideas and con­structive
criticism as the continuous risk and control assurance model
was being developed:
Professor Andrew Chambers, Management Audit LLP
David Coderre, CAATS
Mark Gosling, PricewaterhouseCoopers LLP
Roger Herd, Western Refining Inc.
Ed Hill, Protiviti
Robert Hirth, Protiviti
Suzana Keller, Coca-Cola Enterprises Inc.
Marty Patton, Cypress Semiconductor
Michael Rasmussen, Corporate Integrity
James Roth, Audit Trends
Dr. Sri Ramamoorti, Grant Thornton LLP
Miklos A. Vasarhelyi, Rutgers University
Louis Vaurs, Institut de l’Audit Interne
Curt Verschoor, DePaul University
Don Warren, DePaul University
Manfred Wolf, SAP AG
David Zechnich, Deloitte  Touche LLP
27
www.sap.com/contactsap
50 094 751 (09/04)
©2009 by SAP AG.
All rights reserved. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge,
ByDesign, SAP Business ByDesign, and other SAP products and services
mentioned herein as well as their respective logos are trademarks or
registered trademarks of SAP AG in Germany and other countries.
Business Objects and the Business Objects logo, BusinessObjects,
Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other
Business Objects products and services mentioned herein as well
as their respective logos are trademarks or registered trademarks of
Business Objects S.A. in the United States and in other countries.
Business Objects is an SAP company.
All other product and service names mentioned are the trademarks of their
respective companies. Data contained in this document serves informational
purposes only. National product specifications may vary.
These materials are subject to change without notice. These materials
are provided by SAP AG and its affiliated companies (“SAP Group”) for
informational purposes only, without representation or warranty of any kind,
and SAP Group shall not be liable for errors or omissions with ­respect to
the materials. The only warranties for SAP Group products and services are
those that are set forth in the express warranty ­statements accompanying
such products and services, if any. Nothing herein should be construed as
constituting an additional warranty.

Contenu connexe

Tendances

Ten tips on hazop quality control
Ten tips on hazop quality controlTen tips on hazop quality control
Ten tips on hazop quality controlPaul Baybutt
 
Practical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal AuditPractical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal AuditManoj Agarwal
 
Building continuous auditing capabilities
Building continuous auditing capabilitiesBuilding continuous auditing capabilities
Building continuous auditing capabilitiesWafaa N. AbuSadah
 
Continuous Auditing
Continuous AuditingContinuous Auditing
Continuous Auditingmcoello
 
Audit planning and risk assessment
Audit planning and risk assessmentAudit planning and risk assessment
Audit planning and risk assessmentcasahiljain1992
 
2018 ValAct - Session 22 - Material Weakness
2018 ValAct - Session 22 - Material Weakness2018 ValAct - Session 22 - Material Weakness
2018 ValAct - Session 22 - Material WeaknessMarkSpong1
 
Improving effectiveness of internal auditing
Improving effectiveness of internal auditingImproving effectiveness of internal auditing
Improving effectiveness of internal auditingPECB
 
Devry acct 555 entire course
Devry acct 555 entire courseDevry acct 555 entire course
Devry acct 555 entire coursejody zoll
 
Hazop leaders manual final
Hazop leaders manual finalHazop leaders manual final
Hazop leaders manual finalumar farooq
 
Devry acct 555 entire course
Devry acct 555 entire courseDevry acct 555 entire course
Devry acct 555 entire coursealbyalcot91
 
Process Area Site Assessments techniques for the Management
Process Area Site Assessments techniques for the ManagementProcess Area Site Assessments techniques for the Management
Process Area Site Assessments techniques for the ManagementNimonik
 
Continuous Auditing D.French
Continuous Auditing D.FrenchContinuous Auditing D.French
Continuous Auditing D.FrenchDan French
 

Tendances (16)

Ten tips on hazop quality control
Ten tips on hazop quality controlTen tips on hazop quality control
Ten tips on hazop quality control
 
Safety Score Card
Safety Score CardSafety Score Card
Safety Score Card
 
Practical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal AuditPractical approach to Risk Based Internal Audit
Practical approach to Risk Based Internal Audit
 
Building continuous auditing capabilities
Building continuous auditing capabilitiesBuilding continuous auditing capabilities
Building continuous auditing capabilities
 
Continuous Auditing
Continuous AuditingContinuous Auditing
Continuous Auditing
 
Audit planning and risk assessment
Audit planning and risk assessmentAudit planning and risk assessment
Audit planning and risk assessment
 
Risk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approachRisk assessment managment and risk based audit approach
Risk assessment managment and risk based audit approach
 
2018 ValAct - Session 22 - Material Weakness
2018 ValAct - Session 22 - Material Weakness2018 ValAct - Session 22 - Material Weakness
2018 ValAct - Session 22 - Material Weakness
 
Risk Based Audit Approach
Risk Based Audit ApproachRisk Based Audit Approach
Risk Based Audit Approach
 
Improving effectiveness of internal auditing
Improving effectiveness of internal auditingImproving effectiveness of internal auditing
Improving effectiveness of internal auditing
 
SFC Plan of engagement
SFC Plan of engagementSFC Plan of engagement
SFC Plan of engagement
 
Devry acct 555 entire course
Devry acct 555 entire courseDevry acct 555 entire course
Devry acct 555 entire course
 
Hazop leaders manual final
Hazop leaders manual finalHazop leaders manual final
Hazop leaders manual final
 
Devry acct 555 entire course
Devry acct 555 entire courseDevry acct 555 entire course
Devry acct 555 entire course
 
Process Area Site Assessments techniques for the Management
Process Area Site Assessments techniques for the ManagementProcess Area Site Assessments techniques for the Management
Process Area Site Assessments techniques for the Management
 
Continuous Auditing D.French
Continuous Auditing D.FrenchContinuous Auditing D.French
Continuous Auditing D.French
 

En vedette

Maahanmuuttajien työurat ja eläketurva rekisteriaineistojen valossa
Maahanmuuttajien työurat ja eläketurva rekisteriaineistojen valossaMaahanmuuttajien työurat ja eläketurva rekisteriaineistojen valossa
Maahanmuuttajien työurat ja eläketurva rekisteriaineistojen valossaEläketurvakeskus
 
Searchlove London 2016 - The Changing Landscape of Mobile Search - Bridget Ra...
Searchlove London 2016 - The Changing Landscape of Mobile Search - Bridget Ra...Searchlove London 2016 - The Changing Landscape of Mobile Search - Bridget Ra...
Searchlove London 2016 - The Changing Landscape of Mobile Search - Bridget Ra...Bridget Randolph
 
Keyword Research in a Mobile World #PubconAustin
Keyword Research in a Mobile World #PubconAustinKeyword Research in a Mobile World #PubconAustin
Keyword Research in a Mobile World #PubconAustinAleyda Solís
 
El Exito SEO en un Entorno Multicanal en #DigitalCongrezz @futurizz
El Exito SEO en un Entorno Multicanal en #DigitalCongrezz @futurizz El Exito SEO en un Entorno Multicanal en #DigitalCongrezz @futurizz
El Exito SEO en un Entorno Multicanal en #DigitalCongrezz @futurizz Aleyda Solís
 
Técnicas de comunicación creativa en el aula materiales
Técnicas de comunicación creativa en el aula materialesTécnicas de comunicación creativa en el aula materiales
Técnicas de comunicación creativa en el aula materialesCarlos Hoyos
 
Mann-India_SAP-Offering_Extended-WM
Mann-India_SAP-Offering_Extended-WMMann-India_SAP-Offering_Extended-WM
Mann-India_SAP-Offering_Extended-WMMann-India
 
Henkilöstö mukaan strategian muokkaamiseen
Henkilöstö mukaan strategian muokkaamiseenHenkilöstö mukaan strategian muokkaamiseen
Henkilöstö mukaan strategian muokkaamiseenEläketurvakeskus
 
McCain.Reply Brief.Brief Sent to Court
McCain.Reply Brief.Brief Sent to CourtMcCain.Reply Brief.Brief Sent to Court
McCain.Reply Brief.Brief Sent to CourtGustav Skurdal
 
#PRlife: The Inside Scoop
#PRlife: The Inside Scoop#PRlife: The Inside Scoop
#PRlife: The Inside ScoopCatherine Jones
 
Gca shell group 2
Gca shell group 2Gca shell group 2
Gca shell group 2seeday
 
Copywriting, Conversion, and Your Customer's Comfort Zone
Copywriting, Conversion, and Your Customer's Comfort ZoneCopywriting, Conversion, and Your Customer's Comfort Zone
Copywriting, Conversion, and Your Customer's Comfort ZoneKissmetrics on SlideShare
 
Cross-Functional SEO at #SearchFest
Cross-Functional SEO at #SearchFestCross-Functional SEO at #SearchFest
Cross-Functional SEO at #SearchFestAleyda Solís
 
How SMBs can win in Competitive SEO Sectors at #SAScon #SAScon2015
How SMBs can win in Competitive SEO Sectors at #SAScon #SAScon2015How SMBs can win in Competitive SEO Sectors at #SAScon #SAScon2015
How SMBs can win in Competitive SEO Sectors at #SAScon #SAScon2015Aleyda Solís
 
SEO para Contenido #ChileDigital
SEO para Contenido #ChileDigital SEO para Contenido #ChileDigital
SEO para Contenido #ChileDigital Aleyda Solís
 
SEO en Estrategia UX en #UXFighters #EXF #SEOUX
SEO en Estrategia UX en #UXFighters #EXF #SEOUXSEO en Estrategia UX en #UXFighters #EXF #SEOUX
SEO en Estrategia UX en #UXFighters #EXF #SEOUXAleyda Solís
 
Las Claves del SEO en 2015 en #PlatziConf
Las Claves del SEO en 2015  en #PlatziConfLas Claves del SEO en 2015  en #PlatziConf
Las Claves del SEO en 2015 en #PlatziConfAleyda Solís
 
Strategical SEO Audits that Drive Growth at #DigitalOlympus
Strategical SEO Audits that Drive Growth at #DigitalOlympusStrategical SEO Audits that Drive Growth at #DigitalOlympus
Strategical SEO Audits that Drive Growth at #DigitalOlympusAleyda Solís
 
Competitions for Bloggers - Case Study. Marketing Festival 2015 #mktfest
Competitions for Bloggers - Case Study. Marketing Festival 2015 #mktfestCompetitions for Bloggers - Case Study. Marketing Festival 2015 #mktfest
Competitions for Bloggers - Case Study. Marketing Festival 2015 #mktfestWojtek Mazur
 
Optimising YouTube, Facebook and On-site Video
Optimising YouTube, Facebook and On-site Video Optimising YouTube, Facebook and On-site Video
Optimising YouTube, Facebook and On-site Video Phil Nottingham
 
Cross Functional SEO at #UKMarketingDay
Cross Functional SEO at #UKMarketingDay Cross Functional SEO at #UKMarketingDay
Cross Functional SEO at #UKMarketingDay Aleyda Solís
 

En vedette (20)

Maahanmuuttajien työurat ja eläketurva rekisteriaineistojen valossa
Maahanmuuttajien työurat ja eläketurva rekisteriaineistojen valossaMaahanmuuttajien työurat ja eläketurva rekisteriaineistojen valossa
Maahanmuuttajien työurat ja eläketurva rekisteriaineistojen valossa
 
Searchlove London 2016 - The Changing Landscape of Mobile Search - Bridget Ra...
Searchlove London 2016 - The Changing Landscape of Mobile Search - Bridget Ra...Searchlove London 2016 - The Changing Landscape of Mobile Search - Bridget Ra...
Searchlove London 2016 - The Changing Landscape of Mobile Search - Bridget Ra...
 
Keyword Research in a Mobile World #PubconAustin
Keyword Research in a Mobile World #PubconAustinKeyword Research in a Mobile World #PubconAustin
Keyword Research in a Mobile World #PubconAustin
 
El Exito SEO en un Entorno Multicanal en #DigitalCongrezz @futurizz
El Exito SEO en un Entorno Multicanal en #DigitalCongrezz @futurizz El Exito SEO en un Entorno Multicanal en #DigitalCongrezz @futurizz
El Exito SEO en un Entorno Multicanal en #DigitalCongrezz @futurizz
 
Técnicas de comunicación creativa en el aula materiales
Técnicas de comunicación creativa en el aula materialesTécnicas de comunicación creativa en el aula materiales
Técnicas de comunicación creativa en el aula materiales
 
Mann-India_SAP-Offering_Extended-WM
Mann-India_SAP-Offering_Extended-WMMann-India_SAP-Offering_Extended-WM
Mann-India_SAP-Offering_Extended-WM
 
Henkilöstö mukaan strategian muokkaamiseen
Henkilöstö mukaan strategian muokkaamiseenHenkilöstö mukaan strategian muokkaamiseen
Henkilöstö mukaan strategian muokkaamiseen
 
McCain.Reply Brief.Brief Sent to Court
McCain.Reply Brief.Brief Sent to CourtMcCain.Reply Brief.Brief Sent to Court
McCain.Reply Brief.Brief Sent to Court
 
#PRlife: The Inside Scoop
#PRlife: The Inside Scoop#PRlife: The Inside Scoop
#PRlife: The Inside Scoop
 
Gca shell group 2
Gca shell group 2Gca shell group 2
Gca shell group 2
 
Copywriting, Conversion, and Your Customer's Comfort Zone
Copywriting, Conversion, and Your Customer's Comfort ZoneCopywriting, Conversion, and Your Customer's Comfort Zone
Copywriting, Conversion, and Your Customer's Comfort Zone
 
Cross-Functional SEO at #SearchFest
Cross-Functional SEO at #SearchFestCross-Functional SEO at #SearchFest
Cross-Functional SEO at #SearchFest
 
How SMBs can win in Competitive SEO Sectors at #SAScon #SAScon2015
How SMBs can win in Competitive SEO Sectors at #SAScon #SAScon2015How SMBs can win in Competitive SEO Sectors at #SAScon #SAScon2015
How SMBs can win in Competitive SEO Sectors at #SAScon #SAScon2015
 
SEO para Contenido #ChileDigital
SEO para Contenido #ChileDigital SEO para Contenido #ChileDigital
SEO para Contenido #ChileDigital
 
SEO en Estrategia UX en #UXFighters #EXF #SEOUX
SEO en Estrategia UX en #UXFighters #EXF #SEOUXSEO en Estrategia UX en #UXFighters #EXF #SEOUX
SEO en Estrategia UX en #UXFighters #EXF #SEOUX
 
Las Claves del SEO en 2015 en #PlatziConf
Las Claves del SEO en 2015  en #PlatziConfLas Claves del SEO en 2015  en #PlatziConf
Las Claves del SEO en 2015 en #PlatziConf
 
Strategical SEO Audits that Drive Growth at #DigitalOlympus
Strategical SEO Audits that Drive Growth at #DigitalOlympusStrategical SEO Audits that Drive Growth at #DigitalOlympus
Strategical SEO Audits that Drive Growth at #DigitalOlympus
 
Competitions for Bloggers - Case Study. Marketing Festival 2015 #mktfest
Competitions for Bloggers - Case Study. Marketing Festival 2015 #mktfestCompetitions for Bloggers - Case Study. Marketing Festival 2015 #mktfest
Competitions for Bloggers - Case Study. Marketing Festival 2015 #mktfest
 
Optimising YouTube, Facebook and On-site Video
Optimising YouTube, Facebook and On-site Video Optimising YouTube, Facebook and On-site Video
Optimising YouTube, Facebook and On-site Video
 
Cross Functional SEO at #UKMarketingDay
Cross Functional SEO at #UKMarketingDay Cross Functional SEO at #UKMarketingDay
Cross Functional SEO at #UKMarketingDay
 

Similaire à Grc sap next evaluation of internal audit

Continous auditing and risk monitoring 9 23-09
Continous auditing and risk monitoring  9 23-09Continous auditing and risk monitoring  9 23-09
Continous auditing and risk monitoring 9 23-09Gaiani (CarnCorpAudit)
 
Designing Effective Financial Controls
Designing Effective Financial ControlsDesigning Effective Financial Controls
Designing Effective Financial ControlsStephen G. Lynch
 
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Mohammed J. Khan
 
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...PYA, P.C.
 
Internal control system
Internal control systemInternal control system
Internal control systemMadiha Hassan
 
Internal control system
Internal control systemInternal control system
Internal control systemMadiha Hassan
 
UNCCInternalControls.pptx
UNCCInternalControls.pptxUNCCInternalControls.pptx
UNCCInternalControls.pptxAral20101
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk ConsultingPrashant Jain
 
CaseStudy_CCRC_July2015
CaseStudy_CCRC_July2015CaseStudy_CCRC_July2015
CaseStudy_CCRC_July2015Richard Wilson
 
El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007Danial Khan
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work CultureCase IQ
 
Stress Testing Conference - FinRep 6.23.15
Stress Testing Conference - FinRep 6.23.15Stress Testing Conference - FinRep 6.23.15
Stress Testing Conference - FinRep 6.23.15Robert Fournier
 
Significance of Internal Controls
Significance of Internal ControlsSignificance of Internal Controls
Significance of Internal ControlsSonuBhojwani1
 
Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100Net at Work
 
PSD OpRisk Forum presentation 2016
PSD OpRisk Forum presentation 2016PSD OpRisk Forum presentation 2016
PSD OpRisk Forum presentation 2016PSD Group Ltd
 
Information system control and audit
Information system control and auditInformation system control and audit
Information system control and auditAstri Stiawaty
 

Similaire à Grc sap next evaluation of internal audit (20)

Continous auditing and risk monitoring 9 23-09
Continous auditing and risk monitoring  9 23-09Continous auditing and risk monitoring  9 23-09
Continous auditing and risk monitoring 9 23-09
 
Designing Effective Financial Controls
Designing Effective Financial ControlsDesigning Effective Financial Controls
Designing Effective Financial Controls
 
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
Managing-Data-Protection-and-Cybersecurity-Audit-s-Role_joa_Eng_0116
 
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
The Hidden Dangers of Trying to ‘Do the Right Thing:’ A Practical Look at Aud...
 
Internal control system
Internal control systemInternal control system
Internal control system
 
Internal control system
Internal control systemInternal control system
Internal control system
 
Operational Auditing
Operational AuditingOperational Auditing
Operational Auditing
 
UNCCInternalControls.pptx
UNCCInternalControls.pptxUNCCInternalControls.pptx
UNCCInternalControls.pptx
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
 
CaseStudy_CCRC_July2015
CaseStudy_CCRC_July2015CaseStudy_CCRC_July2015
CaseStudy_CCRC_July2015
 
El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007
 
5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture5 Steps to Creating an Ethical Work Culture
5 Steps to Creating an Ethical Work Culture
 
Stress Testing Conference - FinRep 6.23.15
Stress Testing Conference - FinRep 6.23.15Stress Testing Conference - FinRep 6.23.15
Stress Testing Conference - FinRep 6.23.15
 
Nick Brown resume
Nick Brown resumeNick Brown resume
Nick Brown resume
 
Significance of Internal Controls
Significance of Internal ControlsSignificance of Internal Controls
Significance of Internal Controls
 
N6.pdf
N6.pdfN6.pdf
N6.pdf
 
Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100Sage Fixed Assets Accounting for Sage 100
Sage Fixed Assets Accounting for Sage 100
 
PSD OpRisk Forum presentation 2016
PSD OpRisk Forum presentation 2016PSD OpRisk Forum presentation 2016
PSD OpRisk Forum presentation 2016
 
Information system control and audit
Information system control and auditInformation system control and audit
Information system control and audit
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 

Plus de SARVJEET KAUSHAL

Compliance hand book fy17 18-sensysindia_good
Compliance hand book fy17 18-sensysindia_goodCompliance hand book fy17 18-sensysindia_good
Compliance hand book fy17 18-sensysindia_goodSARVJEET KAUSHAL
 
Pwc ind as pocket-guide-2016
Pwc ind as pocket-guide-2016Pwc ind as pocket-guide-2016
Pwc ind as pocket-guide-2016SARVJEET KAUSHAL
 
Ey diploma in ifrs brochure
Ey diploma in ifrs brochureEy diploma in ifrs brochure
Ey diploma in ifrs brochureSARVJEET KAUSHAL
 
IA around-the-world-v10-protiviti
IA around-the-world-v10-protivitiIA around-the-world-v10-protiviti
IA around-the-world-v10-protivitiSARVJEET KAUSHAL
 
Financial controls management protiviti governance portal
Financial controls management protiviti governance portalFinancial controls management protiviti governance portal
Financial controls management protiviti governance portalSARVJEET KAUSHAL
 
Coso guidance on_monitoring_intro_online1_002
Coso guidance on_monitoring_intro_online1_002Coso guidance on_monitoring_intro_online1_002
Coso guidance on_monitoring_intro_online1_002SARVJEET KAUSHAL
 
Icfr guide to internal control over financial reporting good
Icfr guide to internal control over financial reporting goodIcfr guide to internal control over financial reporting good
Icfr guide to internal control over financial reporting goodSARVJEET KAUSHAL
 
Coso internal control frameword executive summary_2013
Coso internal control frameword executive summary_2013Coso internal control frameword executive summary_2013
Coso internal control frameword executive summary_2013SARVJEET KAUSHAL
 
Updated coso internal control framework fa qs second edition-protiviti-2013_good
Updated coso internal control framework fa qs second edition-protiviti-2013_goodUpdated coso internal control framework fa qs second edition-protiviti-2013_good
Updated coso internal control framework fa qs second edition-protiviti-2013_goodSARVJEET KAUSHAL
 
Product list of insurance policies nia
Product list of insurance policies niaProduct list of insurance policies nia
Product list of insurance policies niaSARVJEET KAUSHAL
 
Applicability of internal audit capsule on ia program good
Applicability of internal audit capsule on ia program goodApplicability of internal audit capsule on ia program good
Applicability of internal audit capsule on ia program goodSARVJEET KAUSHAL
 

Plus de SARVJEET KAUSHAL (17)

Compliance hand book fy17 18-sensysindia_good
Compliance hand book fy17 18-sensysindia_goodCompliance hand book fy17 18-sensysindia_good
Compliance hand book fy17 18-sensysindia_good
 
Bpm 4 automobile
Bpm 4 automobileBpm 4 automobile
Bpm 4 automobile
 
Pwc ind as pocket-guide-2016
Pwc ind as pocket-guide-2016Pwc ind as pocket-guide-2016
Pwc ind as pocket-guide-2016
 
Ey diploma in ifrs brochure
Ey diploma in ifrs brochureEy diploma in ifrs brochure
Ey diploma in ifrs brochure
 
IA around-the-world-v10-protiviti
IA around-the-world-v10-protivitiIA around-the-world-v10-protiviti
IA around-the-world-v10-protiviti
 
Ifc deloitte
Ifc deloitteIfc deloitte
Ifc deloitte
 
Financial controls management protiviti governance portal
Financial controls management protiviti governance portalFinancial controls management protiviti governance portal
Financial controls management protiviti governance portal
 
Coso illustrative tool
Coso illustrative toolCoso illustrative tool
Coso illustrative tool
 
Coso guidance on_monitoring_intro_online1_002
Coso guidance on_monitoring_intro_online1_002Coso guidance on_monitoring_intro_online1_002
Coso guidance on_monitoring_intro_online1_002
 
Ifc deloitte
Ifc deloitteIfc deloitte
Ifc deloitte
 
Icfr guide to internal control over financial reporting good
Icfr guide to internal control over financial reporting goodIcfr guide to internal control over financial reporting good
Icfr guide to internal control over financial reporting good
 
Coso internal control frameword executive summary_2013
Coso internal control frameword executive summary_2013Coso internal control frameword executive summary_2013
Coso internal control frameword executive summary_2013
 
Updated coso internal control framework fa qs second edition-protiviti-2013_good
Updated coso internal control framework fa qs second edition-protiviti-2013_goodUpdated coso internal control framework fa qs second edition-protiviti-2013_good
Updated coso internal control framework fa qs second edition-protiviti-2013_good
 
Product list of insurance policies nia
Product list of insurance policies niaProduct list of insurance policies nia
Product list of insurance policies nia
 
Mis of herohonda
Mis of herohondaMis of herohonda
Mis of herohonda
 
Applicability of internal audit capsule on ia program good
Applicability of internal audit capsule on ia program goodApplicability of internal audit capsule on ia program good
Applicability of internal audit capsule on ia program good
 
Sap modules standard
Sap modules standardSap modules standard
Sap modules standard
 

Dernier

Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 

Dernier (20)

Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 

Grc sap next evaluation of internal audit

  • 1. Governance, Risk, and Compliance A Look into the Future: The Next Evolution of Internal Audit Continuous Risk and Control Assurance
  • 2.
  • 3. Content 3 About the Author 4 Executive Summary 5 The Vision 7 The Journey from Traditional Auditing 10 The Next Evolution of Internal Audit 11 Model Overview 12 Continuous Risk Monitoring 13 Continuous Controls and Data Auditing 16 Continuous Fraud Detection 16 On-Demand Data Mining 16 The Monitoring of Key Performance Indicators 17 Continuous Reporting 18 Additional Considerations 20 Other Resources 21 Notes About the Author Before joining the governance, risk, and compliance (GRC) solutions team at SAP, Norman Marks was the leader of internal audit functions at major U.S. and global corporations for more than 15 years, also serving at times as chief ethics and compliance officer and chief risk officer. He is a recognized international leader in the theory and practice of internal auditing and was profiled by the magazines of the American Institute of Certified Public Accountants and the Institute of Internal Auditors (IIA) for his innovative practices. He is the author of some of the IIA’s most downloaded publications, including Sarbanes-Oxley §404: A Guide for Management by Internal Controls Practitioners.
  • 4. 4 The not-too-distant future for internal auditing includes a technology-driven revolution that will enable a dramatic and necessary change in the way internal auditors operate. The internal auditing function will be able to provide almost continuous assurance that risks of significance are effec­ tively managed and that related controls are performing as desired across the organization. Traditional assurance projects will largely be replaced by a combination of continuous auditing and monitoring and rapid-response audits of risk hot spots. Resources will be freed up for process improvement and other con­sulting opportunities. Many of the seeds of that change have already borne fruit that is ready to be reaped today. Our vision is illustrated through the telling of a story, set a few years from now, by the fictional Charles Andrew Edgar, senior vice president of internal audit for Tap Toes Inc., a global shoe-manufacturing com­pany based in San Francisco. Executive Summary
  • 5. 5 “This morning my quiet breakfast was interrupted by a loud chirp from my smart phone. I answered immediately, as it was the special tone I had set for alerts from our continuous risk and control assurance system. “The alert told me that one of our con­ tinuous audit and monitoring routines had detected an unusually large physical- inventory variance in our Blackpool, England, location. Clearly, my normal morning routine was going to change. “The message included a detailed description of the alert, but even with today’s technology, the screen on the smart phone was too small for me to read comfortably. I took a cup of coffee into my home office and, after going through the normal security protocols, opened the alert on my laptop. “Apparently, a routine monthly physical- inventory check in the Blackpool location had identified a large discrepancy in the finished goods inventory of ballroom dancing shoes. The Blackpool finance director had posted a journal entry writing off the shoes, which our moni­ tor­ing had detected. The shoes are expensive, so the write-off was above the thresholds (dollar and percentage) we had set our software to monitor. “I used a hyperlink in the message to enter the corporate risk and control system (CRCS), which drives our con­ tinuous assurance program. CRCS monitors the health of the more signifi­ cant risks (in this case, those related to the safeguarding and accurate report­ ing of inventory) and related controls. “First, I checked out the general level of risk at the Blackpool location, as that would give me an idea whether there was any indication of employee dis­satis­faction or other situation that could lead to theft. I found that: • General risk levels related to the Blackpool location were recently raised due to UK press reports that the Blackpool plant might be closed. (We have standard feeds from com­ mercial news agencies and supple­ment them with our own search engine. The data is both structured, such as government employment reports, and unstructured, such as articles in the local press. The results are collected and analyzed in the corporate data warehouse and links added to the risk management system.) • The latest human resources depart­ ment employee surveys did not iden­ tify any elevated employee concerns. In general, it appeared employee morale was good, in line with the rest of the organization. • There had not been any significant change in personnel turnover, includ­ ing in management. • The most recent external audit had not identified any issues. In addition, there were no open remediation items – from external audit, internal audit, or other assurance functions. (By the way, all our assurance func­ tions – such as the corporate compli­­ ance and cor­porate quality teams, as well as internal auditing – use CRCS and its multicompliance framework for risk identification and assess­ment, audit planning, tracking of audit results, and the monitoring of remediation items.) • The internal audit team had been to Blackpool 18 months ago. As with most of our on-site audits, the latest was an operational audit. This par­ ticular audit was of the lean finance operation (several of the internal audit team are Lean Six Sigma Black Belts) and the resulting assessment was positive. There were no deficien­ cies of significance. “I moved from the top-level Blackpool risks to a view that focused on inven­ tory risks. I first checked out the risk of inventory theft. Our continuous assur­ ance program is driven by a top-down, risk-based process for identifying the key controls relied upon to achieve the company’s strategic objectives. For each of the objectives, we worked collaboratively with management and the risk officer to identify the risks to achieving the objectives. Then we deter­­ mined the strategy or response to be followed to manage each risk (transfer or share, avoid, reduce or mitigate, or accept) and the controls required to ensure that the strategy is effective. Finally, we implemented con­tinuous testing for each of the controls.1 The Vision Continuous Risk and Control Assurance
  • 6. 6 “The dashboard for the controls showed green lights across the board. Notably: • There were no other unusual inven­ tory transactions such as physical- inventory variances in prior months, write-offs for quality, transfers between locations, inventory reclassi­fications, or transactions posted directly by IT. • The individuals accessing the inven­ tory records did not have incompat­ ible functions. (Ours is a real-time test, rather than the after-the-fact analysis and reporting that was popular five years ago.) • All new access rights granted to the inventory records were approved by appropriate senior management, and no new inventory access rights had been granted in the last quarter. • Prior monthly physical inventories had been performed as scheduled without significant variances, and the results were approved by appropriate senior management. • Related application controls were reliable. These included, for example, controls to ensure that inventory records agree with the general ledger, opening inventory plus purchases less sales and adjustments equals closing inventory, shipments cannot be made in excess of sales orders, and so forth. This was based on con­ tinuous testing of IT general controls, such as approval for configuration or code changes, and reperformance of selected key application controls. • Access to the physical inventory was limited to employees with appropriate business needs. This was achieved through an automated test. We extract­ed from the security system, on a weekly basis, a list of employ­ ees who had access to the inventory and verified their business need (based on a lookup of HR system records). • The risk management system had more details on assessments by the other assurance providers, including a copy of the last quarterly inspection by corporate security.2 The corporate security team had assessed the risk from inventory theft to be low. All the cameras were in place and working properly, management and employ­ ees demonstrated the appropriate level of attention to security, and the inventory was properly secured. The Blackpool security team was at full strength, and only current employees had access to the finished goods inventory. “To add perspective, I reviewed the latest financial performance results: • The Blackpool location has been con­sistently profitable, although the results in the last quarter were 5% below forecast.3 • The inventory write-off was substan­ tial but less than 5% of total inven­tory, causing the plant to have a small loss for the quarter.4 • Sales were quite seasonal, with the highest volumes in the fall. Inventory balances were consistent, with sales at their highest just before the sales peak and at their lowest in the following quarter. “The auditor assigned to monitor Blackpool operations and risks was Fred Eagle. (Each member of our team is assigned to work with the manage­ ment of selected locations or functions
  • 7. 7 signs might be electronically monitored, but every so often a nurse needs to check in to make a physical observa­tion. The situation in Blackpool was the same: all the monitors indicated that the con­ trols were working fine, but sometimes you need that in-person contact. “In this case, Fred and the local con­ troller convened a meeting with the inventory, operations, and finance staff. Fred walked them through the process­ es they had followed to perform the inventory and found a problem with their cutoff procedures. They had not checked to ensure that all the inventory movements were in the system. In response to Fred’s questions, they realized that one of the shipping clerks had taken ill the day before the inven­ tory count. The controller made a call and confirmed that a couple of pickups by the carrier had not been processed. The amounts involved were almost exactly the inventory shortage. “The problem was solved, and Blackpool management agreed to im­ prove pro­cesses for future inventory counts. In the meantime, Fred and I talked about whether we should add automated risk-monitoring procedures for inventory counts and then start con­­ tinuous audit­ing for related controls. We decided that the current inventory risk monitors were sufficient. That is con­sis­tent with our whole approach to contin­uous assurance: focus on the more sig­nifi­cant risks and improve the pro­gram over time as we learn from experience.” The Journey from Traditional Auditing Edgar describes how his company devel­oped the continuous risk and control assurance program. “For years before we started our pro­ gram, the internal audit community had been very interested in continuous audit­ing and monitoring.5 (There is no fundamental difference between the two. The distinction lies not in the work being performed but in who is perform­ing it: ‘auditing’ by internal audit and ‘moni­ toring’ by management.6) The value was seen in: • Automating certain control tests where there was a need to test every year – for the annual Sarbanes-Oxley assessment of internal control over financial reporting, for instance • Testing data and gaining insight into related controls in more sensitive busi­ ness processes such as accounts payable and payroll, particularly where there was a risk of fraud “The focus was on using automation to test controls and examine data, but there was no linkage to or focus on risk. In addition, a number of internal audit leaders had been talking for a long time about the fact that our role in internal audit is not to perform audits. In fact, our role is to provide the board and exe­ cutive management with assurance that the organization’s risks are under­stood and managed within board-established risk tolerances, and that the system of internal control is operating as intended. to understand the business and its more significant risks. In the old days, we updated the risk-based audit plan for­mally once a year and informally every quarter. Now, I expect it to be updated weekly in CRCS by the audit team.) Fred had confirmed the internal audit risk assessment as low just last week. “I called Fred and we talked about what to do. We agreed the first step was to check that the other Blackpool inven­ tory risks were all green lights and that the updates were current. We were interrupted by a call from the logistics manager. I put him on hold while I asked Fred to check out the other controls and call the Blackpool controller to get a status report. In particular, Fred was to confirm that the physical inventory count had followed the correct procedures. “The logistics manager told me that he had also received an alert. He was con­ cerned that we did not have sufficient inventory on hand in Blackpool to fill a large order from an important custom­­ er. He was glad to know that we were already looking into the situation and asked that we let him know as soon as possible what the resolution was, so he could work something out with the customer. “About an hour later, Fred called back. He said that automated continuous assurance only goes so far. It’s like having a patient in the intensive care unit of the hospital: the patient’s vital
  • 8. 8 (The Institute of Internal Auditors’ Standards defines internal auditing as an activity that ‘provides independent, objective assurance and consulting services.’ Emphasis is added.) We recognized that providing this peace of mind – the ability to ‘sleep during the storm’ – could best be done through continuous risk and control assurance. We define this activity as follows: ‘The ability to provide stakeholders with assurance on a continuing basis that the more significant risks are managed and related controls are operating effectively.’7 “We worked with management, espe­ cially the risk management team, to identify the areas of greatest risk to the company’s objectives. The risk man­ age­ment team agreed to implement a continuous risk-monitoring program to measure and report the status of those risks. Next, we identified the key con­ trols required to manage those risks. For each, a strategy was developed: how would we monitor the performance of the controls? Where possible, we automated the testing of the controls (which often included auditing of related transactions or activities). The results of the monitoring activities were used to maintain, in part, the risk status. “The continuous risk and control assu­r­ ance program provides management in all areas with reports and dash­boards showing the status of all the key risks. Where there are adverse incidents, potential control breakdowns or frauds, or risks appearing to spike upward, internal audit and responsible manage­ ment receive immediate alerts, such as the one I received during breakfast. “Our program enables us to give man­ agement and the board the continuous assurance they value so highly. It also enables us to move to more of a ‘monitor and respond’ approach in the assurance area and focus our project time on issues and opportunities to drive process efficiencies and other improvements in the operation of the company. “The success of our continuous assur­ ance program has been significantly enhanced by the GRC convergence program we conducted at about the same time. All the functions involved in GRC work together to avoid duplication of effort, rely on each others’ work, and use the same systems and processes where possible. In our case, that involves internal audit, risk manage­ment, supply and logistics, physical security, IT governance, legal compliance, and financial compliance (Sarbanes-Oxley, tax and statutory reporting, and so on). “As internal auditors, we are obliged to provide independent and objective assurance to our stakeholders. Where we have decided to rely on other assur­ ance providers’ work, we make sure we have performed procedures our­ selves to give us reasonable assurance of the quality and consistency of that work. So we perform periodic audits of the risk management office, corporate security, IT security, and the like. “Convergence involved process and tools. While we considered integrating some of the GRC functions, in the end we decided to keep them independent but cooperating. From a process point of view, we all decided to take a risk- based approach, especially around com­pliance topics. Legal compliance might identify a high-level risk related to compliance with U.S. technology export laws, for example. That would be identified as a risk in our risk man­ agement system, where we would also identify the controls in place to manage the risks. The level of risk, the number and severity of any adverse incidents, the controls in place to manage the risks, and corrective actions (where issues are identified) are all monitored and tracked in the same system. This approach provides the legal compliance and risk management leaders with a single source of truth about the risk level and how well it is managed. It also enables all the operational managers responsible for any of the processes involved, such as supply and logistics, to include monitoring of this risk in their daily, weekly, and monthly dashboards. “The tools are also shared; we use a number of products from SAP, includ­ ing SAP® BusinessObjects™ GRC solutions for risk management, access control, process control, and global trade services. We also use SAP BusinessObjects business intelligence solutions to drive our corporate and internal audit data warehouses, and SAP BusinessObjects Text Analysis software for Web-based searches of unstructured data.
  • 9. 9 “The internal audit department had received overtures from a number of vendors offering excellent point solu­ tions designed for internal audit func­ tions or specifically for internal control or data auditing. However, we placed a high value on avoiding software pro­ lifera­tion in favor of using common enterprise applications. “We perform a large number of audit projects that focus on operational effec­ tiveness and efficiency. We can do this because the continuous assur­ance pro­ gram is highly effective. A com­paratively small portion of our time is spent on assurance, freeing up the audit staff for value-added consulting projects. The audit committee and executive management have confidence in our risk manage­ment and internal control processes and have made it a priority for internal audit to perform these projects. “The results of our consulting projects sometimes indicate an opportunity to improve business processes or opera­ tions, which we capture in our risk management system. After all, efficiency is a corporate objective, and we can identify and monitor related risks. “In the old days, when we performed traditional assurance projects, we had an audit management system. It was a software product where we maintained our work papers, tracked the history of our audits, followed up on audit findings and management actions, and generally managed the audit team – project plan­ ning, skills inventory, and the like. The continuous assurance program has eliminated most of that, as follows: • The results of any audit work, includ­ ing risk and control assessments, are captured in the risk management system. The history is automatically captured. • We also track corrective actions in the risk management system. • Project planning, where needed, is done using specialized project man­ agement software. • The skills inventory, which is very important to our ability to staff proj­ ects like lean finance or inventory management, is maintained in our SAP ERP Human Capital Manage­ ment solution.”
  • 10. 10 The Next Evolution of Internal Audit The Continuous Risk and Control Assurance Model Edgar’s story is typical of the internal audit executive of the future. In its break­ through paper, Internal Audit 2012,8 PricewaterhouseCoopers discussed a “consensus projection of the trends likely to shape the world of internal audit by the year 2012.” Of particular note are the following observations (emphasis added): “Throughout the next five years, the value of the controls-focused approach that has dominated internal audit is expected to diminish. As this occurs, internal audit leaders must adopt risk-centric mind-sets if they want to remain key players in assurance and risk management.” “Some internal audit functions have begun to rethink their fundamental value propositions by shifting from an internal audit model focused on controls assur­ ance to a risk-centric model where risk and control assurance are based on the effectiveness of risk management processes developed by management.” “One of the five key trends that will drive this reshaping of internal audit by 2012 is technological advancement.” Deloitte & Touche has a similar perspec­ tive, according to Patty Miller (a partner and chairman of the Institute of Internal Auditors for 2008–2009). She uses the following table to illustrate the major changes happening in internal auditing. There are multiple points of interest in the Deloitte vision: • The focus is on risk, with a forward- looking and proactive style9 and dynamic reporting. • The mandate is business assurance, similar to risk and control assurance. • The technology application of greatest importance will be automated testing and continuous monitoring. While there is a need for risk and control assurance, we believe that the optimal model for the future is one of continuous assurance of risk and con­ trol. This is consistent with guidance from the Institute of Internal Auditors, which focuses on the provision of assur­ance rather than the performance of audits.10 Internal audit will provide its customers, the board11 of directors, and executive management with assurance that the organization’s risks are subject to appropriate and effective processes, including related systems of internal control. The assurance will be enabled primarily through continuous risk and control monitoring and auditing, with a much reduced set of traditional audit projects. Table 1: Changes Taking Place in Internal Auditing Historic Mainstream Cutting-Edge Focus Audit entities based on rotational plan Prioritize audit entities based on risk Focus on strategic, busi­ ness, and pro­cess risk Perspective Historic Historic Future Style Corporate police “Father knows best” Consultant and advisor Mandate Compliance with poli­ cies and procedures Assurance on financial control; compliance Business assurance Risk Focus Financial Financial plus Enterprise risks Tool Kit Compliance work programs Audit work programs for key processes; controls Risk frameworks, self-assessments Technology None Automated work papers Automated testing and continuous monitoring
  • 11. 11 Model Overview Figure 1 illustrates the continuous risk and control assurance model. It is far more than an application of continuous auditing or monitoring. Rather, it is a top-down model that starts with under­ standing enterprise goals and objec­ tives, moves on to determine the poten­ tial risks to those objectives, and then moves to the assessment and testing of the con­trols required to manage the risks. The overall effort usually encom­ passes the mining of data that can provide indica­tors of the health of risk management and related controls. The model’s foundation is built upon the more significant strategic and opera­ tional goals of the enterprise. Achieve­ ment of the goals and objectives is measured through key performance indicators (KPIs). The model includes the monitoring of KPIs, as the failure to achieve organizational objectives is often the result of poor risk manage­ ment or control performance. Risks to the achievement of those goals and objectives are then identified.12 Continuous risk monitoring, generally by a risk management function and not by internal audit, ensures that the pro­gram is focused on the more signifi­cant risks to the enterprise, which may change rapidly. Internal audit is a con­sumer of the monitoring but not respon­sible for its performance. Management of those risks – risk responses – is enabled by controls.13 The model includes the continuous auditing of the key controls required to manage risks within organizational tolerances, usually performed by inter­ nal audit and other assurance provid­ers, sometimes by operating management. Some controls are difficult to test direct­ ly through automated routines, and the continuous examination or testing of data may provide a reason­able level of assurance. The data mining may be directly against information with­in the organization’s applications or indirectly after extraction to a data warehouse (either an existing corporate data ware­ house or one developed specifically for this purpose). Fraud management is built into the program: • Fraud risks are identified together with other enterprise risks. • The controls over fraud risks are assessed and tested together with other key controls. • Data mining techniques can be used to test data and identify potential fraud situations. Key performance indicators Continuous assurance dashboard Alerts Key risk indicators Continuous risk monitoring Continuous control auditing Continuous data mining/auditing and fraud detection On-demand data mining Figure 1: The Continuous Risk and Control Assurance Model Organizational goals and objectives Risks Controls Enterprise data Data warehouse
  • 12. 12 When assurance is continuous, infor­ma­ tion on the health of risk manage­ment and related key controls needs to be continuously available to stakeholders. The model encompasses continuous reporting through dashboards or similar tools. It also includes more immediate alerts signaling the need for a response to a spike in risk levels, an adverse incident, a potential controls failure, or a data anomaly. On-demand data mining enables an intelligent response and investigation of data anomalies, control failures, and so on. The same tools that provide continuous control and data auditing will generally also support additional data analytics that provide further insight into the problem. Each of the major elements of the model is discussed in more detail below. Continuous Risk Monitoring The continuous risk and control assur­ ance program relies on the quality of the enterprise risk management pro­cess established by company management. This process identifies and assesses the risks to enterprise objectives to be covered by the assurance program. Although internal auditors may have an independent assessment of risks (based on their experience, for example), the auditors’ rating should be integrated with, or at least be a revision to, the assessment of the management team, rather than the result of a separate and potentially redundant risk assessment process.14 Internal auditors can (and should, accord­ing to IIA standards15) gain com­ fort in the risk management process through periodic audits. These audits should address the adequacy of the process established by management to identify and assess risks to achieving organizational objectives. Importantly, the audits should evaluate whether the risk assessment considers all factors that internal auditors believe relevant to the risk assessment, such as the results of prior internal audits and the status of open action items. Most organizational objectives remain relatively constant; typically, organiza­ tions only review them annually unless there are major changes in business conditions. But risks to the organization change constantly. New risks emerge while old ones fade in importance, and existing risks rise and fall as business conditions change. Continuous risk monitoring is required to: • Ensure that assurance is provided on today’s more significant risks • Identify new or growing risks that require additional risk and control monitoring • Identify sudden rises in risk levels that may merit immediate attention by management or internal auditors. The large inventory write-off described earlier led to an increase in inventory- related risk levels. The internal audit team responded because this might signal a breakdown in related controls and the potential for additional inventory losses. Management is typically responsible for monitoring risks, while the internal audit department is a consumer of risk information. The ability to monitor risks will become more effective when tech­ nology is used to: • Link enterprise information (such as financial results, account balances, and health and safety information) with the risk management process. For example, if Tap Toes Inc. sub­ stantially increases sales to China, that should result in an increase in related accounts receivable risks. • Link external information to risk assessment processes. Many enter­ prise risks relate to external events, and geopolitical or economic changes may indicate a need to change risk levels. For example, civil unrest in an emerging nation may indicate the need for Tap Toes to change risk levels if the company relies on manu­facturing operations in the area. These technologies are available today, and their ease of use and integration into solutions should improve over the next few years. The results of risk mon­ i­toring (including key risk indicators) would typically be shown in dashboards and other reports to the board and to execu­tive and operating management.
  • 13. 13 Those dashboards enable the monitor­ ing of risk levels and taking of action where needed. In addition, alerts should be provided to appropriate management and internal audit teams when there are sudden changes in risk levels warranting more immediate action. Typically, the internal audit team will review the alert to deter­ mine whether there has been a break­ down in either risk management or the related internal controls. In some cases, audit projects and even investigations may be required to assess the situation and identify remedial actions. Continuous Controls and Data Auditing The continuous assurance program should focus only on the more signifi­ cant risks and related controls. Once the risks to be included in the program have been identified, the controls and data to be tested can be defined. The selection process for risks to be included should consider: • The highest-rated risks • Risks that may not be likely but where an adverse incident could be a threat to the entire enterprise • Areas where key stakeholders (such as the board or executive manage­ ment) place a high value on assurance Once the business risks are determined, the next step is to identify the key con­ trols required to manage those risks within organizational tolerances.16 In almost all cases, organizations rely on a combination of controls to manage a business risk.17 Most risks will depend on controls at the entity level (a code of conduct, a corporate policy, and so on), in business processes (accounts payable, for example), and within IT pro­cesses (such as application change control or security). It is critical to understand all the key controls, since an assurance strategy has to include measures to obtain assurance for them all. Table 2 lists some of the key controls to manage the risk of theft of finished goods inventory at a hypothetical company. Table 2: Example of a Combination of Key Controls Controls Type of Control The organization has a code of business conduct. Entity-level New employees are required to confirm their understanding of the code of conduct. Records are maintained in the HR system. Entity-level All employees sign a code of conduct certification annually and records are maintained in the HR system. Entity-level Hiring procedures include background checks, with records maintained in the HR system. Entity-level Physical access to finished goods inventories is restricted based on business need. Business process Finished goods inventories are physically secured by doors and monitored by guards; cameras are in place. Business process After inventory counts are entered, the inventory module provides reports showing inventory variances. Each report shows the inventory per the system, the inventory counted, and the calculated variances. Business process Only the inventory manager can approve the posting of inventory adjustments (for example, write-offs following the inventory count). Business process All inventory program changes are approved by the inventory manager in the change control system. IT general control
  • 14. 14 Some of these controls are difficult to test directly on a continuous basis, and it may be better to test the underlying data. For example, the second control above is “New employees are required to confirm their understanding of the code of conduct. Records are main­ tained in the HR system.” In a traditional assurance project, the auditor would review the employee records and con­ firm, through examination of a sample of documents, that the employee had signed to confirm understanding. In a continuous assurance program, exami­ nation of signatures is unlikely to be an option. Instead, the HR system records might be tested to identify new employ­ ees where there was no record of a confirmation (a data auditing or data mining technique). The level of assur­ ance is not as strong as if the actual signatures were tested, but the auditor may decide that a reasonable level of assurance is obtained that can be upgraded by adding an annual exami­ nation of signatures (if the auditor deter­ mines the risk so merits). The auditor may assess as low the risk of noncompliance with a control or the risk presented if the control was ineffec­tive. In these cases, the auditor may decide that sufficient assurance is achieved by a less-frequent test strate­ gy. An example would be the first con­ trol above: “The organization has a code of business conduct.” Because the second control is tested, there is a high degree of assurance that the code of business conduct exists and is avail­ able to employees. The auditor may decide not to test the control directly or to test it only annually. It is generally best to test data as it is being processed by the application sys­ tem; if there are questionable results, they can be investigated promptly and adverse consequences can be prevent­ ed or at least minimized. However, there are times when it may be better to use data that has been extracted to a data ware­house for testing. (This data may be in an existing data warehouse or in one developed for this particular pur­ pose – perhaps owned by the internal audit department.) An example is where the auditor wants to test trends over a period of time. The use of a data ware­ house may also be valuable when data is being compared to information in other systems. For example, access to an inventory warehouse should be limited to individuals with warehouse responsi­ bilities, which can be identified through information in each person’s HR records. The key is that the auditor will consider each of the key controls relied on for the risk to be addressed and determine the appropriate assurance strategy and the specific assurance technique. (For example, the strategy might be to test the control, test the data, or rely on the work of other assurance providers.) Table 3 takes each of the controls in Table 2 and assigns a strategy and continuous assurance technique. Key points from the example include: • Assurance is obtained using a combi­ nation of techniques, including auto­ mated and nonautomated testing (such as the annual review of the code of ethics), the testing of controls and data, and reliance on other assurance activities (such as SOX testing and corporate security audits). • Not all the techniques are continuous in nature (for example, the periodic testing of HR record keeping). This particular example brings out a limitation in most audits of internal con­ trol, whether using continuous assur­ ance techniques or traditional auditing methods: the difficulty in auditing behavioral aspects of internal control. Do the people who have signed a certi­ fication of the code of conduct actually understand and intend to follow the code of conduct? The latter, which involves the integrity of individual employees, is hard if not impossible to test; instead, controls that provide reasonable assur­ ance, such as background checks, are assessed. However, it is possible to test with reasonable effectiveness whether individuals understand the code of con­ duct: through interviews during tradi­ tional audits or through online testing. Employees might be asked to answer questions about the content or the loca­ tion of the policy included in contin­uous audit assurance programs.
  • 15. 15 Table 3: Example of Key Controls and Assurance Techniques Controls Assurance Strategy Assurance Procedure The organization has a code of business conduct. Annual test by examination Review the code of conduct and ensure it is current New employees are required to confirm their understanding of the code of conduct. Records are maintained in the HR system. Continuous data auditing of HR records Identify any employees who have not con­firmed the code of conduct within 3 months of hire, according to HR records Periodic auditing of HR system mainte­nance procedures On a periodic basis, validate that HR records are updated accurately and on a timely basis All employees sign a code of conduct certification annually and records are maintained in the HR system. Continuous data auditing of HR records Identify any employees who have not certified the code of conduct as required Periodic auditing of HR system mainte­nance procedures On a periodic basis, validate that HR records are updated accurately and on a timely basis Hiring procedures include background checks, with records maintained in the HR system. Continuous data auditing of HR records Identify any employees where a clean back­ground check is not recorded in the HR system Periodic auditing of HR system mainte­nance procedures On a periodic basis, validate that HR records are updated accurately and on a timely basis Physical access to finished goods inventories is restricted based on business need. Continuous data auditing Identify any individual whose badge grants access to finished goods inventory but who does not have a business need based on job function (per HR system) Finished goods inventories are physi­cally secured by doors and monitored by guards; cameras are in place. Reliance on physical security audits by corporate security, together with moni­toring of security audits Obtain an alert whenever a security audit report is filed by exceptions Continuous data auditing Identify any delays in filing the results of security audits (required at least quarterly) After inventory counts are entered, the inven­ tory module provides reports showing inventory vari­ances. Each report shows the inventory per the system, the inven­tory counted, and the calculated variances. Reliance on annual Sarbanes- Oxley (SOX) reperformance of application controls Include reperformance of the inventory variance calculation in SOX testing Only the inventory manager can approve the posting of inventory adjustments (for example, write-offs following the inven­tory count). Continuous control and data auditing Continuously test access control procedures, including that no changes are made to authority to approve inventory adjustments (an exception report is sent to IT security and internal audit if there are changes) All inventory program changes are approved by the inventory manager in the change control system. Reliance on annual SOX testing of IT general controls Include continuous data testing in SOX testing: only the inventory manager approves program changes
  • 16. 16 Continuous Fraud Detection Fraud is one risk that needs to be ad­dressed by every organization. In gen­eral, the level of effort should be commensurate with the level of risk and the risk tolerance of the organization. Fraud detection is one element of an effective fraud management program,18 and it is more efficient when integrated with the continuous risk and fraud assur­ance program. For example: • Fraud risks are monitored with other organizational risks to ensure that fraud detection activities address current risks. • Controls to prevent or detect fraud are assessed, as with controls related to other risks. • Continuous fraud detection is primar­ ily performed using the same contin­ uous data mining and other testing techniques. The level of frauds detected by the nor­ mal operation of controls or traditional internal audits (including forensic or fraud audits) is low: 42% according to a 2008 study by the Association of Certified Fraud Examiners. A contin­uous risk and control assurance program that includes monitoring risks, assessing and testing controls, and testing data should increase significantly the likeli­ hood that fraud is prevented or detected on a timely basis. On-Demand Data Mining When potential control issues are identified or risk levels rise for unclear reasons, the auditor is likely to need additional information to determine the appropriate actions (which can range from inquiries of management to an on-site audit or even a formal investiga­ tion). The information may be obtained through “on-demand data mining” of application data or after extracting the relevant information to a data ware­ house. As with continuous data mining, the data warehouse could be an exist­ ing corporate data warehouse or one developed for the continuous assurance program. The Monitoring of Key Performance Indicators KPIs are established so that manage­ ment at each level can monitor the business. They provide the information necessary to understand the success or failure of initiatives and programs and to take action as appropriate. KPIs are important sources of infor­ma­ tion for auditors as well. A failure to achieve goals and objectives, or finan­ cial and operation targets, is often a strong indicator that related risks are not effectively managed or related internal controls are ineffective. The monitoring of KPIs should be a key component of the continuous risk and control assurance program, and its results considered together with those of the continuous risk-monitoring pro­ gram. The internal audit team should give strong consideration to periodic reviews or audits of the KPI processes to ensure that the KPIs can be relied upon by management and used for the continuous assurance program.
  • 17. 17 Continuous Reporting Continuous assurance is not provided without communication to the key stake­ holders. They will have peace of mind and “sleep through the storm” only if they have received assurance that the more significant risks are man­aged and related controls are operating effectively. In the traditional world of internal audit­ ing, reports are provided at the conclu­ sion of each audit project. In addition, many leading internal audit depart­ments provide annual assessments of the overall condition of the organization’s risk management processes and sys­ tems of internal controls. When internal audit functions evolve and provide con­ tinuous risk and control assurance, these periodic communications have to be replaced by more current, continuous communications. Each stakeholder’s needs must be con­ sidered when developing and providing continuous risk and control assurance information. Some may be satisfied with occasional updates that focus on exceptions – members of the board of directors, for example. Others will prefer more detailed information, with an emphasis on risks and controls relevant to their specific areas of responsibility. If the organization has a risk manage­ ment organization in place, separate from internal auditing, then both organi­ zations should work together to present a single source of truth about the health of risk management and related con­ trols. There is no value when the two organizations provide different assess­ ments or assessments in different forms that serve only to confuse. Each organization will develop the com­ munication vehicles that best suit their culture, their mode of operation, and the needs of each stakeholder. Some may decide to use dashboards for each high- level risk area, with drill-down features allowing them to see the under­lying health of risk management and related controls in detail. Others may want much more detailed reports or have totally separate reporting for each consumer of the information – for example, sepa­ rate reports for the board, CEO, CFO, chief risk officer, head of environmental compliance, head of logis­tics, and so on. However, it is criti­cal that all the information be consistent at all times.
  • 18. 18 Additional Considerations Continuous Monitoring Versus Continuous Auditing The continuous risk and control assur­ ance model will enable the internal audit function at any organization to provide more valuable, effective assurance ser­ vices to their stakeholders at board and management levels. Traditional, peri­odic assurance engagements of relatively narrow and shallow focus will be re- placed by a continuous assurance pro­ gram with broader and deeper insight into the health of risk manage­ment and related controls. One question each organization will need to address is which monitoring and auditing activities will be performed by management and which will be per­ formed by the internal audit team.19 In fact, writers on the topic of contin­uous auditing have differentiated continuous auditing and continuous monitoring only by the function responsible for the activities: continuous monitoring is per­ formed by management and continuous auditing by internal audit departments.20 There may be little or no difference in the tools and techniques used. We do not take a position in this docu­ ment on where the division of duties should be. That should depend on the following: • The culture and organizational struc­ ture of each entity (factors to con­sider include whether there are multiple compliance or internal control func­ tions and whether management, the internal audit team, or a combination of the two is expected to monitor controls) • The maturity of the risk management process (such as whether there is a separate risk function with resources to monitor risks and report on the health of risk management and related controls) • The efficiency of the entity’s applica­ tions (such as the ease with which monitoring can be built into the daily process of each line of business)
  • 19. 19 When management performs contin­ uous assurance activities, internal auditors will have to determine what procedures they will follow to obtain a reasonable level of assurance that the monitoring performed by management is consistent and effective. The audi­ tors will not be able to provide objective and independent assurance on risk and controls unless they are comfortable with management’s continuous moni­ toring activities. There will certainly be an initial invest­ ment required of time and resources, and maintenance will be essential to ensure that the continuous assurance program continues to be effective in addressing current risks and related controls. But the continuous assurance program should be more efficient and consume fewer resources than a tradi­ tional, comprehensive assurance pro­ gram. This represents further opportu­ nities for the leading-edge internal audit department, as follows: • Resources can be assigned to monitor and respond to changes in the health of risk management and related controls, ensuring prompt action by management to mitigate any adverse effects. • Internal auditors can turn their atten­ tion to emerging risk areas, where the business is changing. For example, internal audit will have the resources to participate proactively to ensure that risk management and control aspects of new processes and sys­ tems are part of the initial design and implementation, rather than after­ thoughts. The same approach can be taken to internal audit involvement in merger and acquisition activities, changes in business plans, develop­ ment of new products, and so forth. Each time, the internal audit team assumes an advisory role. It ensures that risks associated with the busi­ ness change are considered and responses are developed, that appro­ pri­ate risk monitoring will be in place, and that all required key controls are identified early and implemented effectively. • Additional resources are likely to be available for value-added consulting activities that focus not only on whether governance, risk manage­ ment, and internal control processes are effective but also on whether they are efficient. • In the traditional internal audit model, significant resources may be spent developing audit programs and build­ ing working papers. When technology is used to enable continuous testing, it generally includes the ability to maintain a record of the tests per­ formed and results obtained – including workflow for managing and resolving exceptions. For example, if an automated data mining routine identifies an anomaly, where an indi­ vidual has been granted access to finished goods inventory but his or her job description (according to the HR system) does not indicate that there is a business need for the access, then an alert is sent to the auditor. Workflow associated with that alert can capture the auditor’s resolution of the issue. If manage­ment action is required to address a prob­ lem (such as to remove the access), then that is recorded in the system, routed to management for action, reported as open until completed, and the resolution is captured and retained. The level and type of day-to-day work performed by internal auditors will change, and it will involve more and deeper discussions with management about the business, its risks, and controls. Auditors will be recognized as value-adding contributors, so that both the work will be more interesting and the recognition for their efforts will be much greater.
  • 20. 20 Other Resources Material referenced in this document includes: • Institute of Internal Auditors: – Global Technology Audit Guide: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment – International Standards for the Professional Practice of Internal Auditing – GAIT for IT and Business Risk • Institute of Internal Auditors, Association of Certified Fraud Examiners, and the American Institute of Certified Public Accountants: – Managing the Business Risk of Fraud • KPMG: – Continuous Auditing/Continuous Monitoring: Using Technology to Drive Value by Managing Risk and Improving Performance • The Committee of Sponsoring Organizations of the Treadway Commission (COSO): – Enterprise Risk Management Framework – Guidance on Monitoring Internal Control Systems • The Institute of Internal Auditors – Australia and Standards Australia: – Delivering assurance based on AS/NZS 4360:2004 Risk Management • Standards Australia and Standards New Zealand: – AS/NZS 4360:2004 Risk Management • PricewaterhouseCoopers: – Internal Audit 2012, A study examining the future of internal auditing and the potential decline of a controls-centric approach
  • 21. 21 1. The continuous testing has several forms, depending on what is most efficient and effective, considering the level of risk. It includes: • Automated tests of every trans­ac­ tion, where exceptions are reported through alerts (for instance, invoices approved for payment by individuals without that authority, or with con­flict­ ing responsibilities) • Semiautomated testing, where spe­­ cific types of activity are reported periodically for review to determine whether there are reasonable expla­ nations or they are exceptions (for example, changes to the configura­ tion of an SAP automated control) • In a few cases, reliance on manage­ ment’s continuous monitoring of the controls – Generally, an automated request is sent to management asking that it con­firm that the control is operating properly. On a periodic basis, depend­ing on the level of risk, we will per­form audit pro­ce­ dures to confirm manage­ment’s self-assessment. 2. This is another result and benefit from the GRC convergence program (discussed in “The Journey from Tradi­ tional Auditing” section of this docu­ ment). The risk level for inven­tory theft is changed if there is a poor security inspection. Internal audit may respond with unannounced attendance at the next routine physical inventory. 3. Edgar explains: “One of our strate­ gies for continuous assurance is that we monitor the business results for indicators of a change in risk levels. In addition to attending management operational and financial review meetings with the major subsidiaries, we download the detailed financial results each month into our internal audit data warehouse. Our business intelligence software provides us with regular reports of unusual vari­ances and trends. For example: • An increase in sales in an emerg­ing nation might indicate increased risks to revenue recognition and ethics compliance. This information is fed into the risk assessment and the underlying analysis retained in the data warehouse. • A concentration of purchases through a single vendor might be a fraud indicator. • A large number of credit memos at the beginning of the quarter could indicate ‘channel stuffing’ and increased revenue recognition risk. • An increase in key inventory met­rics (especially the number of days’ sales we held in any inventory cate­gory) might indicate an efficiency issue: in procurement, manufact­ur­ing, or logistics.” 4. “Although it did not come up during our work on this incident, we found out later that the CFO’s daily dash­board reflected the potential loss situation and he had called the local controller and the corporate risk manager. Because we were working together to resolve the issue and take any necessary actions, all he did was make a note and follow up at the end of the month. He told me in our next meeting how pleased he was with the added value our continuous assurance program, coupled with our problem-solving approach, provided him and the rest of the executive team. The CFO made a point of informing the audit committee.” 5. Protiviti Inc., a firm specializing in internal audit, risk, and business con­ sulting, published the 2009 edi­tion of its Internal Audit Capabilities and Needs Survey summarizing responses from more than 1,000 internal auditors. These auditors cited continuous audit­ing, com­puter-assisted audits tech­niques (CAATS), data analysis tools (statistical analy­sis), and data analysis tools (data manipulation) as the areas where they needed the greatest improve­ment, regardless of their level of competency in those areas. Further, chief audit exe­ cutives participating in the survey agreed that they too most wanted to improve in those areas, compared to more than 40 other topical choices covering inter­ nal audit process knowledge. Notes
  • 22. 22 Robert Hirth, executive vice president and global leader of Protiviti’s internal audit practice stated, “Continuous auditing, CAATS, and automated data analysis are all just the kind of ‘looking through the front windshield rather than the rearview mirror’ techniques internal auditors need in order to be relevant and add value in the eyes of their stake­­ holders as well as to stay up with the business itself and effectively help their organizations manage risk, which by its very definition is future oriented.” 6. The IIA, in its global technology audit guide, Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment, defines contin­ uous auditing as “a method used to perform control and risk assessments automatically [we disagree with the “automatically” limitation, as noted in this document] on a more frequent basis.” It describes continuous moni­tor­ ing as “the processes that manage­ment puts in place to ensure that the policies, procedures, and business processes are operating effec­tively.” KPMG LLP’s 2008 publication Continuous Auditing/ Continuous Monitoring: Using Technol­ ogy to Drive Value by Managing Risk and Improving Performance describes continuous auditing as “the collec­tion of audit evidence and indicators by an internal auditor on information tech­ nol­ogy (IT) systems, processes, trans­ ac­tions, and controls on a fre­quent or continuous basis through­out a period.” KPMG defines con­tinuous monitoring as “a feedback mechanism used by management to ensure that controls operate as designed and transactions are processed as prescribed.” These definitions are expanded later in the document: “CA [continuous auditing]/ CM [continuous monitoring] needs to monitor the risks that would prevent the organi­zation from achieving its objectives.” 7. The 2008 publication Continuous Auditing/Continuous Monitoring: Using Technology to Drive Value by Managing Risk and Improving Performance by KPMG notes that “while the definitions of CA and CM may vary across orga­ nizations and industries, the goal in pursuing these disciplines is to provide greater transparency, effectively man­ age risk and perfor­mance, and provide continuous assurance. Depending on an indi­vidual’s role within the organi­za­ tion, he or she can think of CA or CM as a lens to assess and/or monitor the effectiveness of the organization’s governance, risk, and compliance (GRC) program.” 8. Published in 2007. 9. KPMG’s 2008 publication Contin­ uous Auditing/Continuous Monitoring: Using Technology to Drive Value by Managing Risk and Improving Perfor­ mance comments that: “As business risks of all kinds con­tinue to proliferate, management and internal audit departments are actively seeking
  • 23. 23 new ways to quickly gain access to valu­­ able information to manage risk and improve perfor­mance. Such efforts increasingly include continuous auditing and con­tinuous monitoring of organiza­ tional processes, systems, and controls.” It continues: “What’s more, management and inter­ nal audit efforts to adapt inno­vative ways of assessing and man­aging risk and enhancing perfor­mance are now more critical than ever. Providing senior management with a ‘post mortem’ after a prob­lem has occurred is no longer accept­able. . . . As a result, manage­ment and internal audit teams are embrac­ing CA and CM as important efforts that can provide efficient and contin­uous discipline to monitor issues on a frequent or real-time basis, result­ing in risk events being addressed before issues arise.” 10. The definition of internal auditing, according to the Institute of Internal Auditors, is as follows: “Internal auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization’s opera­tions. It helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk man­ agement, control, and governance processes.” Standard 2120 provides further detail: “The internal audit activity must evalu­ ate the effective­ness and contribute to the improvement of risk management processes.” Interpretation: “Determining whether risk management processes are effective is a judgment resulting from the internal auditor’s assessment that: • Organizational objectives support and align with the organization’s mission; • Significant risks are identified and assessed; • Appropriate risk responses are selected that align risks with the organization’s risk appetite; and • Relevant risk information is captured and communicated in a timely manner across the organization, enabling staff, management, and the board to carry out their responsibilities. “Risk management processes are mon­ itored through ongoing manage­ment activities, separate evalua­tions, or both.” Standard 2130.A1 is important, as it indicates that the evaluation of controls should be as they relate to enterprise risks: “The internal audit activity must eval­u­ ate the adequacy and effec­tive­ness of controls in responding to risks within the organization’s governance, opera­tions, and information systems regarding the: • Reliability and integrity of financial and operational information; • Effectiveness and efficiency of operations; • Safeguarding of assets; and • Compliance with laws, regulations, and contracts.” The handbook developed by IIA- Australia and Standards Australia, Delivering assurance based on AS/ NZS 4360:2004 Risk Management, comments on the need to “focus audit and assurance activities on those risks which, if the controls were absent or had failed, would expose us to high and unacceptable conse­quences. In those cases assur­ance activity is there to provide ‘assurance’ that key controls are both adequate and effective.” 11. References to the “board” include the board itself and/or one or more of its committees, such as the audit com­ mittee, governance committee, risk committee, or similar. 12. The Committee of Sponsoring Orga­nizations of the Treadway Commission’s (COSO’s) Enterprise Risk Management Framework (ERM), published in Sep­tember 2004, defined enterprise risk management as follows:
  • 24. 24 “Enterprise risk management is a pro­ cess, effected by an entity’s board of directors, management, and other per­ sonnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity and manage risks to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives.” 13. COSO ERM defines control activi­ ties as “the policies and procedures that help ensure risk responses are properly executed. Control activities occur throughout the organization, at all levels and in all functions. Control activities are part of the process by which an enterprise strives to achieve its business objectives.” 14. Internal auditors use factors such as the results of prior audits, the status of open audit findings, and the time since the last audit in addition to opera­tional factors typically included in man­age­ ment’s assessment of risk (such as the volume of business and related trends). We believe these factors should be included in management’s risk assess­ ment process as well. 15. See note 10. 16. The IIA standards define control processes as “the policies, proce­dures, and activi­ties that are part of a control framework, designed to ensure that risks are con­tained within the risk toler­ ances estab­lished by the risk manage­ ment process.” The concept of key controls has been described in other IIA documents. For example: • The IIA-Australia and Standards Australia Handbook, Delivering assur­ ance based on AS/NZS 4360:2004 Risk Management, defines key control as “controls or groups of con­ trols that are believed to be main­tain­ ing an otherwise intolerable risk at a tolerable level.” The hand­book con­ tinues to discuss control adequacy: “Adequacy of risk management, con­ trol, and governance processes is present if management has planned and designed them in a manner that provides reasonable assurance that the organization’s objectives and goals will be achieved efficiently and economically.” • Similarly, the IIA’s GAIT-R publication, GAIT for Business and IT Risk, says key controls “relied on to ensure fail­ ures in achieving business objectives will be either prevented or detected on a timely basis.” 17. This document does not include details on how to identify all the key controls required to address a business risk. There are other publications that provide such guidance, including the IIA’s GAIT for IT and Business Risk,
  • 25. 25 available from the technology section of its Web site at www.theiia.org. 18. An excellent reference is the joint publication of the Institute of Internal Auditors, Association of Certified Fraud Examiners, and the American Institute of Certified Public Accountants: Managing the Business Risk of Fraud. Principle 2 in that document states: “Fraud risk exposure should be assessed periodically by the organiza­tion to identify specific potential schemes and events that the organization needs to mitigate.” Principle 4 addresses fraud detection: “Detection techniques should be estab­ lished to uncover fraud events when preventive measures fail or unmitigated risks are realized.” 19. While management as a whole is responsible for the system of internal control, when it comes to monitoring the system of internal control, the board and management may rely on a combination of management and internal audit-monitoring procedures. COSO’s 2009 publication Guidance on Monitoring Internal Control Systems explains: “Organizations may select from a wide variety of monitoring procedures, including but not limited to: • Periodic evaluation and testing of controls by internal audit, • Continuous monitoring programs built into information systems, • Analysis of, and appropriate follow-up on, operating reports or metrics that might identify anomalies indicative of a control failure, • Supervisory reviews of controls, such as reconciliation reviews as a normal part of processing, • Self-assessments by boards and management regarding the tone they set in the organization and the effec­ tiveness of their oversight functions, • Audit committee inquiries of internal and external auditors, and • Quality assurance reviews of the internal audit department.” 20. The IIA’s Global Technology Audit Guide (GTAG) on Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment defines contin­ uous auditing and continuous monitor­ ing as follows: “Continuous auditing is a method used [by auditors] to perform control and risk assessments automatically on a more frequent basis. “Continuous monitoring encompasses the processes that management puts in place to ensure that the policies, procedures, and business processes are operating effectively.” The GTAG continues: “Many of the techniques of continuous monitoring of controls by management are similar to those that may be per­ formed in continuous auditing by internal auditors. “Management’s use of continuous monitoring procedures, in conjunction with continuous auditing performed by internal auditors, will satisfy the demands for assurance that control procedures are effective and that the information produced for decision making is both relevant and reliable.”
  • 26. 26 We at SAP would like to express our appreciation to the following individuals (and to those who prefer to remain ano­ny­ mous), who contributed with their ideas and con­structive criticism as the continuous risk and control assurance model was being developed: Professor Andrew Chambers, Management Audit LLP David Coderre, CAATS Mark Gosling, PricewaterhouseCoopers LLP Roger Herd, Western Refining Inc. Ed Hill, Protiviti Robert Hirth, Protiviti Suzana Keller, Coca-Cola Enterprises Inc. Marty Patton, Cypress Semiconductor Michael Rasmussen, Corporate Integrity James Roth, Audit Trends Dr. Sri Ramamoorti, Grant Thornton LLP Miklos A. Vasarhelyi, Rutgers University Louis Vaurs, Institut de l’Audit Interne Curt Verschoor, DePaul University Don Warren, DePaul University Manfred Wolf, SAP AG David Zechnich, Deloitte Touche LLP
  • 27. 27
  • 28. www.sap.com/contactsap 50 094 751 (09/04) ©2009 by SAP AG. All rights reserved. SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects S.A. in the United States and in other countries. Business Objects is an SAP company. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies (“SAP Group”) for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with ­respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty ­statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.