Control Frameworks: Reynabelle Morente
Control Frameworks: Reynabelle Morente
Reynabelle Morente
OVERVIEW
Control Framework 1
The COSO Frameworks: ICF and Control Environment
ERM
2 Risk Assessment
Control Activities
• COSO’s goal was to improve the quality of financial reporting through a focus on
corporate governance, ethical practices, and internal control.
• The 2013 COSO IC-IF contains 17 principles representing the fundamental
concepts associated with each component. COSO states that an entity can
achieve effective internal control by applying all principles, which apply to
operations, reporting, and compliance objectives.
The COSO cube
is a diagram that shows the
relationship among all parts of an
internal control system. Aside
from showing how these parts are
connected, it also identifies a
number of principles an
organization should follow to
meet their internal control
objectives.
17 Principles
10. Select and develop control activities 13. Use relevant information
11. Select and develop IT GCCs 14. Communicate internally
12. Mobilize through policies and 15. Communicate externally
procedures
17 Principles
• Monitoring Activities
This is the risk that the organization’s processes are not effectively obtaining,
managing, and disposing their assets, that the organization is not performing
effectively and efficiently in meeting customer needs, is not creating value or is
diluting value by suffering the degradation of financial, physical, and information
assets.
Business and Process Risk
These risks relate to conditions where IT is not operating as intended, the integrity
and reliability of data is compromised, and significant assets are exposed to
potential loss or misuse. It also relates to the inability to maintain critical systems
and processes. It includes
◾ Data and system availability risk
◾ Data integrity risk
◾ Infrastructure risk
◾ System capacity risk
◾ Commerce risk
◾ Data integrity
◾ Access risk
Personnel Risks
Personnel risks relate to conditions that limit the organization’s ability to obtain,
deploy, and retain sufficient numbers of suitably qualified and motivated workers.
◾ Availability risk
◾ Competence risk
◾ Judgment risk
◾ Malfeasance risk
◾ Motivation risk
Financial Risks
Financial risks can result in poor cash flows, currency and interest rate fluctuations,
and an inability to move funds quickly and without loss of value to where they are
needed. Examples include
◾ Resources risk
◾ Commodity prices risk
◾ Foreign currency risk
◾ Liquidity risk
◾ Market
Environmental Risks
Environmental risk relates to the actual or potential threat of negative effects on
the environment by emissions,wastes, and resource depletion. This can be caused
by an organization’s activities and it influences living organisms, land, air, and water.
Examples include
◾ Energy and other resources risk
◾ Natural disaster risk
◾ Pollution risk
◾ Transportation risk
◾ Pandemic risk
Political
This is a type of risk faced by organizations, investors, and governments. It refers to
the effects that political decisions, events, or conditions can cause when they affect
the profitability of a business, or the ability to operate freely. It has to do with the
complications organizations may encounter as a result of political decisions.
Examples include
◾ Regulations and legislation risk
◾ Public policy risk
◾ Instability risk
Social Risk
Social risk relates to dynamics where an issue affects stakeholders who can form
negative perceptions that can cause some form of damage to the organization.
Social risk can be influenced by strategic and operational decisions management
makes that affect issues stakeholders care about.
◾ Demographics risk
◾ Privacy risk
◾ CSR
◾ Mobility
“In planning the engagement, internal auditors must
consider:
◾ The objectives of the activity being reviewed and the means by which the activity
controls its performance.
◾ The significant risks to the activity, its objectives, resources, and operations and
the means by which the potential impact of risk is kept to an acceptable level”
(Standard 2201).
Specific
By being specific, goals become clearer and they avoid the ambiguity that can often impair
goalsetting. Managers and employees know what they are expected to do and can focus
their energy, resources, and priorities accordingly to accomplish them.
When goals are measurable it is easier to link their completion to the performance
monitoring and rewards mechanism.
◾ What must be done to demonstrate progress?
◾ What is the quantitative and qualitative evidence that will show we achieved the
goal?
Achievable
Impossible goals do not motivate workers; they demotivate them. When the
workers’ viewpoint is that goals are unrealistic and unachievable, they feel
impotent because the goal cannot be reached. Unachievable goals may also lead
employees to fabricate financial and operational results in their attempts to appear
to achieve their goals.
◾ Does the goal carry specific parameters so it is tangible?
◾ Are there adequate resources available to work on the necessary task?
◾ Is there a strategy and/or plan to get this goal accomplished?
◾ Is there enough motivation propelling this endeavor?
Relevant
Goals should also be aligned with the mission and strategy of the organization, the
process, and the individual.
◾ How does this activity help to meet the needs of the customer?
◾ Is this activity essential?
◾ Is this the best way to perform this activity in terms of time, effort, and related
tools (e.g., forms and data input)?
◾ What is the significance of this goal to my career and those of my team?
Time-Bound
Goals must be evaluated to determine if they meet the SMARTER elements, but
also to determine if they meet ethical and ecological considerations.
◾ Are the metrics associated with this goal evaluated? How frequently?
◾ Does the goal infringe on my values, the organization’s, and society’s?
◾ Will there be negative environmental impacts while pursuing this goal?
◾ Who has to evaluate the appropriateness, timeliness, and other attributes of the
goal?
Rewarding
The rewards received should be commensurate with the effort exerted and the
outcome achieved. If the amount of effort is greater than the reward, chances are
that workers will eventually lower the amount of sacrifice made.
What are the benefits to my customers for achieving this goal?
What are the benefits to the organization for achieving this goal?
What emotional, financial, and professional benefit will I enjoy?
Effects of Risk
• Loss of assets
• Negative publicity
• Erroneous decisions
• Customer dissatisfaction
◾ What activities are regulated and where is the greatest legal exposure?
Assessing risk on a formal and informal basis is essential for organizational success, and
internal auditors can help to raise awareness merely by highlighting some exposures
Control Activities
Done once, done
right
Control Activities
Controls are actions established through policies and procedures that mitigate the
likelihood and/or impact of risks. Controls are performed at all levels of the
organization, at various stages within processes and over the technological
infrastructure of the organization.
Controls can be manual, which means they are performed by individuals and often
using “hard, tangible” items, such as paper and locks. Whereas automated controls
are performed by computer and electronic systems often without direct or
exclusive human interaction.
Some controls are a combination of manual and automated, requiring both a
system component and human follow-through.
Control activities can be categorized as:
Preventive: Preventive controls are those activities that act before the error or
omission can occur and reduce the likelihood and/or impact of the event.
Detective: Detective controls identify errors or anomalies after they have occurred
and alert the need for corrective action.
Directive: Directive controls are temporary controls that are implemented to
redirect employee actions.
Compensating: Compensating or mitigating controls are those that are put in place
when a control is not where it is expected as proper design would stipulate
Internal auditors are generally tasked with verifying that processes, programs, and
their related controls have been designed appropriately, and that those controls
are operating as intended. When confronted with nonperforming controls, the
natural question to ask is “why?” Reasons vary, but the following are some of the
most common answers to that question:
◾ Inadequate knowledge: Organizational effectiveness is the result of realistic
goals, sound process design, sufficient resource allocation, and effective planning
and execution.
◾ Sabotage: Disgruntled employees can act in ways that are very negative to their
organizations.
◾ Emotional and physical reasons: Apathy, depression, inability to pay attention to
detail, or fatigue can hamper an individual’s ability to perform the duties assigned
to him.
The Result of Excessive Risks and Controls
Excessive Risks Excessive Controls
Excessive Controls Bureaucracy
Loss of assets Reduced productivity
Loss of grants Increased complexity
Poor business decisions Increased cycle time
Noncompliance Increase in no-value activities
Increased regulations
Public scandals
Inability to achieve objectives
Information and Communication
Information and Communication
The fourth component in the COSO IC/IF model refers to the flow of information in
an organization. Ideally, there are clear, consistent, timely, and purposeful
directions emanating from the top of the organization providing direction and
establishing the criteria to measure performance results.
Communication is one of the most important activities in organizations. At the most
basic level, relationships grow out of communication, and the effective functioning
and even survival of organizations is based on having effective relationships.
Bruce Berger states that internal communication occurs
on multiple levels.
Operational risks: Often manifested as slippages of time, cost, and quality, usually
due to breakdowns in the transfer of work processes or repetitive processes likely
to succumb to human error.
Strategic risks: Generally caused by deliberate and opportunistic behavior by
service providers or their employees.
Composite risks: This occurs when the client loses its ability to implement the
process for itself because it has outsourced the process for a long time.
Three types of SOC reports:
SOC 1—Report on Controls at a Service Organization Relevant to User Entities’
Internal Control over Financial Reporting (ICFR): These reports are intended to
meet the needs of the managements of user entities and the user entities’
auditors.
SOC 2—Report on Controls at a Service Organization Relevant to Security,
Availability, Processing Integrity, Confdentiality, or Privacy: Tese reports are
intended to meet the needs of a broad range of users that need to understand
internal control at a service organization as it relates to security, availability,
processing integrity, confdentiality, and privacy.
Three types of SOC reports:
For SOC 1 and 2 reports, there are two types of report for each: Type 1 is a
report on management’s description of a service organization’s system and the
suitability of the design of controls. Type 2 is a report on management’s
description of a service organization’s system and the suitability of the design
and operating efectiveness of controls.
SOC 3—Trust Services Report for Service Organizations: SOC 3 reports are
designed to meet the needs of users who want assurance on the controls at a
service organization related to security, availability, processing integrity,
confdentiality, or privacy but do not have the need for or the knowledge
necessary to make efective use of a SOC 2 report.
Monitoring Activities
Monitoring Activities
-refers directly to IT General Computer Controls (GCCs) in Principle 11. Tis principle
states that the organization selects and develops general control activities over
technology to support the achievement of objectives.
Critical managerial and accounting/financial activities
such as:
Purchases: While project management often refers to the conversion of ideas into
deliverables over a period of time, these activities often require the purchase of
hardware, software, and the payment for technical know how.
Training end users: Since IT projects often have a hefty price tag, take a substantial
amount of time to develop and implement, and their scope is often critical to the
long-term success of the organization, it is essential for the organization to make
sure that end users are trained thoroughly, promptly, and cost-effectively.
ISO (International Organization for Standardization)
If we turn our attention to risk management, we see a similar pattern. In general, risks
affect organizations in many ways and can cause damage in terms of business
performance, reputation, environmental impact, and stakeholder safety, among
others. As a result, it is imperative to identify, assess, and manage risks effectively.
ISO 31000 is comprised of:
ISO 31000:2009—Principles and guidelines
ISO 31000:2009—Risk assessment technique
ISO 17799 provides guidelines and general principles for identifying, initiating,
deploying, and maintaining an organization’s information security infrastructure.
ITIL (Information Technology Infrastructure Library)
THANK YOU
Enter title
1 2 3
Enter your text here, Enter your text here, Enter your text here,
or paste your text or paste your text or paste your text
here. here. here.
Enter title
Enter your text Enter your text Enter your text Enter your text
here, or paste your here, or paste your here, or paste your here, or paste your
text here. text here. text here. text here.
Enter title
Title
Enter your text here, or Enter your text here, or Enter your text here, or Enter your text here, or
paste your text here. paste your text here. paste your text here. paste your text here.
Enter title
80% 70%
60%
Enter your text here, Enter your text here, Enter your text here,
or paste your text or paste your text or paste your text
here. here. here.
CONTENTS
Enter title
Control Frameworks
100
750
500
250
Enter your text here, Enter your text here, Enter your text here, Enter your text here,
or paste your text or paste your text or paste your text or paste your text
here. here. here. here.
Enter title
Enter title
Enter your text here, or paste your
text here.
LOREM IPSUM DOLOR
Enter title
Enter your text here,
or paste your text
here. Enter title