Chapter 5
Chapter 5
was formed .
in 1985 to sponsor the commission.
CONTROLENVIRONMENT
The control environment includes activities
The workplace environment refers to the related to the competence and development of
structure, leadership style, and ethical practices personnel, the assignment of authority and
of an organization. It includes the tone at the top, responsibility, and the organizational structure.
which is set and promoted by the board of Employee reporting lines and accountability
directors and senior management. requirements are also shaped by reporting lines,
and these play an important role in the
This tone drives ethical conduct within the effectiveness of internal controls.
organization and helps prevent unethical
Management establishes a risk management
philosophy and the entity's risk appetite, forms a
risk culture, and integrates ERM with related
initiatives. Many managers have come to realize Internal audits can be beneficial by
that the control environment is critical to the partnering with Human Resources, Legal, IT, and
overall corporate image. Loss Prevention to teach employees about
internal audits in other settings.
Talking about and acting ethically carries The control environment is crucial for an
financial benefits. organization's success, ensuring integrity, ethical
values, independence from management, and a
commitment to attracting, developing, and
retaining competent individuals.
,
as inconsistencies can lead to employees
viewing management as hypocritical. A code of
ethics, code of conduct, and conflict of interest Key areas of
statement are essential for establishing ethical focus include controls over management override,
conduct. These documents guide employees in risk assessment methodology, centralized
ethical decision-making, motivating them to processing, monitoring results of operations, and
conduct themselves ethically. Training should be financial and operational reporting. Internal
provided upon hire and annually to reinforce the auditors and business leaders can identify
importance of these topics. strengths and weaknesses in their entity level
controls by examining factors such as the
organization's code of conduct, disciplinary Larry Rittenberg, COSO's Chair Emeritus,
action, organizational structure, documentation, emphasizes the importance of understanding the
compliance requirements, data and information link between objectives, risks, and controls.
availability, and coordination within the
organization's second and third lines of defense. If objectives are not articulated, a deficiency in
the control environment should be brought to the
Internal auditors must understand that behavior attention of senior management and the board.
is influenced by their environment and competing Focusing more on control activities cannot
forces, and must work with management to compensate for a breakdown between senior
establish clear performance standards, management and board oversight. Once
communicate rewards and sanctions, and ensure identified, risks should be linked throughout the
effective employee management. Organizations organization, providing a chaining mechanism to
should create a positive environment through trace risks up and down the organization.
socialization, education, formal/informal systems,
and reinforcement, but should not tolerate Risk assessment is a crucial process for
unethical behavior. organizations to identify, analyze, and respond to
potential risks related to their objectives.
Tone in the Middle
The "tone in the middle" dictates workplace Reporting considerations are arranged in four
conditions, leading to satisfaction, turnover, broad categories: internal/external and
profits, and goal achievement. financial/nonfinancial.
Examples include an
employee's objectives focused on cost reduction, personnel that threatens the ability to achieve
a sales department's performance measured on business objectives.
sales volume, and a manufacturing manager's
goals weighted heavily on lowering unit costs. Product or service failure risk involves the failure
of products or services to meet customer
Lack of alignment with established laws, rules, expectations, leading to customer complaints,
regulations, and standards can lead to trouble warranty claims, returns, field repairs, product
and long-term consequences. Large-scale liability claims, litigation, lost revenues, lower
problems often invite regulator involvement and market share, and damage to the business's
media attention, which can become distracting reputation.
and expensive over time. Any discussion about
risk must consider that every entity faces a Product development risk involves ineffective
variety of risks from internal to external sources. product development that threatens the
organization's ability to meet or exceed customer
expectations consistently over the long term.
Business and Process Risk Cycle time risk is the unnecessary activities that
threaten the organization's capacity to develop,
The risk management process of an organization produce, market, and deliver goods and services
involves various risks, including capacity, in a timely manner.
execution, supply chain, business interruption,
human resources, product or service failure, Health and safety risk involves the failure to
product development risk, cycle time risk, health provide a safe working environment for workers
and safety risk, leadership risk, outsourcing risk,
competitor risk, catastrophic loss risk, industry Outsourcing risk involves outsourcing activities
risk, planning risk, organization structure risk, that do not align with the organization's
integrity and fraud risk, reputation risk, data strategies, objectives, values, and behavioral
integrity, infrastructure risk, commerce risk, standards and expectations.
access risk, and availability risk.
Technological and Information Technology
Supply chain risk refers to the inability to These risks include data and system availability
maintain a steady stream of supplies when risk, data integrity risk, system capacity risk, data
needed. integrity, infrastructure risk, commerce risk,
access risk, and availability risk.
Business interruption risk stems from the
unavailability of raw materials, IT, skilled labor, Data and system availability risk involves the
facilities, or other resources that threaten the uptime of systems and tools to support the needs
organization's ability to continue operations. of workers, customers, suppliers, and
stakeholders.
Human resources risk refers to the lack of
knowledge, skills, and experiences among key
Data integrity risk involves the accuracy and Political risks involve the effects that political
consistency of data stored, processed, retrieved, decisions, events, or conditions can cause when
and destroyed. they affect the profitability of a business or the
ability to operate freely. Examples include
System capacity risk involves optimizing storage regulations and legislation risk, public policy risk,
and computing capabilities. and instability risk.
Infrastructure risk refers to the outdated or lack Social risks involve dynamics where an issue
of IT infrastructure needed to support information affects stakeholders who can form negative
requirements. perceptions that can cause damage to the
organization. Examples of social risks include
Commerce risk involves events that compromise
demographics risk, privacy risk, CSR
financial and data flows.
requirements, and mobility.
Access risk involves unauthorized use of
Risk assessment requires management to
confidential information or limited personnel
consider the impact of possible changes in the
performance.
external environment and within their own
Availability risk threatens the continuity of business model that could make internal control
operations and processes. ineffective. This includes clearly articulating
objectives relating to operations, reporting, and
compliance so any risks to those objectives can
be identified and assessed.
are conditions that limit an
organization's ability to obtain, deploy, and retain Effectiveness relates to the achievement of
suitable numbers of qualified and motivated objectives and the degree to which these are
workers. achieved.
These risks include availability risk, competence Identifying business goals is essential for internal
risk, judgment risk, malfeasance risk, motivation auditors, as it involves obtaining these from
risk, financial risks, environmental risks, political process owners during the planning phase.
risks, social risks, and political risks.
The IIA Standards state that internal auditors
These risks can result in poor cash flows, must consider the objectives of the activity being
currency and interest rate fluctuations, and an reviewed, the means by which the activity
inability to move funds quickly and without loss controls its performance, and the significant risks
of value. Examples of financial risks include to the activity, its objectives, resources, and
resources risk, commodity prices risk, foreign operations. If goals have been defined but are
currency risk, liquidity risk, market risk, and inadequate, internal auditors should engage
political risks. management to develop improvements.
Compensating controls are put in place when a Organizations face increasing risks and
control is not where it is expected as proper modifications to their internal control systems
design would stipulate.
due to changing business dynamics. Outsourced Monitoring activities are ongoing evaluations
service providers, financial institutions, and used to assess the functioning of internal control
intermediaries provide diverse and complex components. These evaluations can be cyclical
information sources, which can disrupt or ongoing, depending on the risk assessment
operations and reduce revenues. Social media and previous evaluations. The criteria used
has become an essential part of organizations' during these reviews are based on internal
communications infrastructure, connecting requirements and external criteria. Monitoring
employees, customers, vendors, supporters, and should be viewed holistically, considering other
detractors. As data flows expand beyond pairs components such as the control environment,
and involve intermediaries, organizations must risk assessment, and information and
ensure the compatibility, quality, speed, and communication. Employee surveys can help
reliability of all information. assess the state of ethics, risk assessment, and
information and communication. Monitoring
Outsourcing can create operational risks, helps management understand how all
strategic risks, and composite risks. Outsourcing components of internal control are being applied
organizations must manage these risks and and enhances organizational effectiveness.
ensure clients are protected and financial
statements are correct. To ensure acceptable risk IT plays a crucial role in organizational success,
levels, organizations can have their own internal and organizations should consider IT as a
or external auditor review the service provider or business service partner rather than just a
provide reports to clients. Organizations also back-end support unit. The Information Systems
have numerous third-party intermediaries that Audit and Control Association (ISACA) has
play a crucial role in their business operations addressed the gap in IT considerations through
and interactions with governments. Companies the COBIT framework, which includes strategic
must conduct due diligence and investigate their direction, project management, purchases, and
third parties before contracting them, training end users. The COBIT framework
understanding their roles, responsibilities, and addresses more than technical subjects and
potential risks. includes critical managerial and
accounting/financial activities.
The hiring organization must manage third-party
monitoring and use technology to assist in this ISO, an independent nongovernmental
process. Service providers can provide organization, provides world-class specifications
standardized audit reports for customers to use for products, services, and systems to ensure
in risk assessment. The Statement on Standards quality, safety, and efficiency. It has published
for Attestation Engagements (SSAE) No. 16, over 19,000 international standards and related
Reporting on Controls at a Service Organization, documents, covering various industries. ISO 9000
replaced SAS 70 in 2010. There are three types of and ISO 31000 are popular standards for quality
SOC reports: SOC 1 (Report on Controls at a management and risk management, providing
Service Organization Relevant to User Entities' guidance and tools for organizations to ensure
Internal Control over Financial Reporting), SOC 2 consistent meeting of customer requirements
(Report on Controls at a Service Organization and continuous improvement.
Relevant to Security, Availability, Processing
Integrity, Confidentiality, or Privacy), and SOC 3 ISO also facilitates communication and the
(Trust Services Report for Service Organizations). setting of expectations between organizations,
complementing COSO's components and helping
Monitoring Activities internal auditors supplement their audit programs.
By understanding and implementing these
standards, organizations can ensure their IT
operations align with their business needs and CHAPTER 6
achieve long-term success.
Histograms