COSO Framework
COSO Framework
COSO Framework
SAS 109 requires that auditors obtain sufficient knowledge to assess the
attitude and awareness of the organizations management, board of
directors, and owners regarding internal control. The following paragraphs
provide examples of techniques that may be used to obtain an
understanding of the control environment.
1) Auditors should assess the integrity of the organizations management
and may use investigative agencies to report on the backgrounds of
key managers. Some of the Big Four public accounting firms employ
former FBI agents whose primary responsibility is to perform
background checks on existing and prospective clients. If cause for
serious reservations comes to light about the integrity of the client, the
auditor should withdraw from the audit. The reputation and integrity of
Risk Assessment
Organizations must perform a risk assessment to identify, analyze, and
manage risks relevant to financial reporting. Risks can arise or change from
circumstances such as:
Changes in the operating environment that impose new or changed
competitive pressures on the firm.
New personnel who have a different or inadequate understanding of
internal control.
New or reengineered information systems that affect transaction
processing.
knowledge
of
the
The accounting records and accounts that are used in the processing of
material transactions.
The transaction processing steps involved from the initiation of a
transaction to its inclusion in the financial statements.
The financial reporting process used to prepare financial statements,
disclosures, and accounting estimates.
Monitoring
Management must determine that internal controls are functioning as
intended. Monitoringis the process by which the quality of internal control
design and operation can be assessed. This may be accomplished by
separate procedures or by ongoing activities.
An organizations internal auditors may monitor the entitys activities in
separate procedures. They gather evidence of control adequacy by testing
controls and then communicate control strengths and weaknesses to
management. As part of this process, internal auditors make specific
recommendations for improvements to controls.
Ongoing monitoring may be achieved by integrating special computer
modules into the information system that capture key data and/or permit
tests of controls to be conducted as part of routine operations. Embedded
modules thus allow management and auditors to maintain constant
surveillance over the functioning of internal controls. In Chapter 7, we
examine a number of embedded module techniques and related audit tools.
Another technique for achieving ongoing monitoring is the judicious use of
management reports. Timely reports allow managers in functional areas such
as sales, purchasing, production, and cash disbursements to oversee and
control their operations. By summarizing activities, highlighting trends, and
identifying exceptions from normal performance, well-designed management
reports provide evidence of internal control function or malfunction.
Control Activities
Control activities are the policies and procedures used to ensure that
appropriate actions are taken to deal with the organizations identified risks.
Control activities can be grouped into two distinct categories: physical
controls and information technology (IT)