Risk Control
Risk Control
In last week's blog, I discussed the basic but often confused issue, of describing operational risks
in a logical and understandable way. This week, I turn to controls, which are often as equally
poorly defined and understood.
The ISO 31000 standard defines control as a “measure that is modifying risk”. While not
incorrect, this definition is broad, and I am not sure overly meaningful or engaging with the
employee at the coal face.
Another aspect of risk that a control can modify is the risk’s velocity (a risk aspect that is not
talked about much but which will be the subject of a later blog). This is the speed at which a risk
passes through the phases of its life from initial cause to final impact. A bilge pump on a sinking
ship reduces velocity to allow more chance for passengers to evacuate the ship.
The ISO 31000 definition specifically does not say “measure that is reducing risk” but rather
“measure that is modifying risk”. This recognises that the risk aspect may be either increased or
decreased by the control. The general assumption with most controls is that they will reduce risk
which is usually valid. However, some controls may reduce one aspect of the risk while
increasing another.
Taking out mobile phone insurance for loss of phone for your staff will reduce the net impact of
a financial loss but will most likely increase the likelihood of it being lost as the employee will
care less as the net impact to them is zero or negligible.
We need to understand the way that controls modify all aspects of the risk in order to understand
whether overall the control reduces or increases the risk.
3. What is a “measure”?
There is a range of treatment methods we can apply to risk that will modify it. The main
treatment methods we have available are:
Not all of the above would be considered “controls”. Controls are only involved in points 3,4 and
6.
“Measures” that are controls are therefore usually considered to be either a procedure/action or a
device that is aimed at modifying a risk(s).
A definition of control in risk management: the ISO 31000 standard says “Controls include any
process, policy, device, practice, or other actions that modify risk.” In reviewing many risk
registers, “controls” are identified as many things, including:
The above are not controls. They may have controls embedded in them but this is what should
be called out. “HR policy” or “Pricing Committee” as a control is too vague. Parts of the
inherent risk environment are not controls.
I often find it useful to differentiate between controls and “Part of the Furniture”. An item that is
part of the furniture is expected to be there in a normal operating environment and will have
multiple purposes, not just the modification of a single risk.
An example is the fixed window pane in a building. The window reduces the risk of
unauthorised access but we a) would expect it to be present in a typical building and b) it also
keeps out the weather, keeps us warm and allows us to get natural light.
In contrast a security guard would be identified as a control because not all buildings have them
and their primary role is security.
Controls are usually categorised as either Preventive, Detective or Reactive. This is based
primarily on where in a risk’s life do they apply and as a result, do they modify the likelihood
and or the impact of the risk.
Preventive controls apply at the beginning of a risk’s life, at or near the root causes(s). As a
device, they often act as a barrier to “nip it (the risk) in the bud”. They primarily reduce the
likelihood of the risk occurring. Examples are system passwords, locked doors, machinery
maintenance etc.
Detective controls usually apply somewhere in the middle of the risk’s life. Detective controls
rely on the analysis of information in order to detect that a risk is “in motion”. Detective
controls that are “early” in the risk’s life usually modify likelihood and those that are “late” in
the life, usually modify impact. Examples are data reconciliations, smoke detectors, exception
reports, etc.
Reactive controls (sometimes also called Responsive or Corrective), apply towards the end of a
risk’s life when the impact is imminent or being felt. They are focused on modifying impact.
Examples are DRP, Insurance, media management etc.
Controls should be recorded in the risk register against the related risk. The issue is which
controls should be recorded. I usually consider that “measures” can be divided into 4 main
types:
Only the key and medium controls should be recorded. This should limit the number of controls
for each risk to between 2 and 4.
The quality for risk data in your risk system and the level of staff engagement with risk is highly
dependent on the level of understanding that staff have of the basic components of risk and
controls. The issues above should be addressed in your guidance and training of staff as without
clarity much confusion will exist.
Internal controls are policies, procedures, and technical safeguards that protect an organization’s
assets by preventing fraud, errors, and other inappropriate actions. These controls fall into three
categories: detective, preventative, and corrective.
Several internal control frameworks exist to help organizations implement internal controls as
necessary, so those organizations can fulfill any regulatory compliance obligations they have or
meet risk management guidelines handed down by their board of directors.
A system of internal controls weaves together various processes and rules to assure an effective
internal control process. Some examples of internal controls are internal audits, firewall
deployment, training, and employee disciplinary procedures.
All organizations are subject to threats that might harm the organization and could result in asset
loss. From inadvertent mistakes to fraud to cyber-attacks, risks are present in every business.
The importance of internal controls lies in their ability to protect your organization from risks
and consequences. For example, IT security controls reduce the risk of data breaches or malware
infection. They help you find weak spots in your information systems and then shore up those
weak spots. Internal controls limit what they can accomplish; hence it’s essential to have
ongoing reviews and monitoring of your system.
See also
Some common terms and definitions that are key to understand compliance
Control Environment. These are the controls that set the overall tone and culture within the
organization. They include the organization’s commitment to integrity, ethical values, and the
establishment of appropriate oversight responsibilities.
Risk Assessment. These controls identify and evaluate risks that could potentially hinder
organizational objectives. By conducting comprehensive risk assessment, you can determine
where internal controls are needed and how to implement them.
Control Activities. These are the specific policies and procedures implemented to address
identified risks. Control activities can include:
Information and Communication. These controls establish reporting mechanisms to assure the
effective flow of relevant information, both vertically and horizontally.
Monitoring. Continuous monitoring and periodic evaluations of internal controls are vital to
identify deficiencies, assess their effect, and take corrective actions. This can be achieved
through management reviews, internal audits, self-assessments, and feedback mechanisms.
With the growing reliance on technology, internal controls must also address risks associated
with information systems. IT controls include measures to secure data, manage access, establish
backup and recovery procedures, and implement IT governance frameworks.
Now let’s review the three types of internal control, regardless of their component: preventive,
detective, and corrective.
Preventive controls are the best kind because they lessen the need to detect mistakes after the
fact. Automated preventative controls are even better because they remove the need for human
intervention and streamline auditing.
Training programs, drug testing, firewalls, computer and server backups are all preventive
internal controls that block undesirable events from occurring. So are the following.
Segregation of Duties
Separation of duties is designed to reduce the incidence of mistakes or fraud by assuring that no
single employee has the potential to both perpetrate and hide errors or fraud in the course of their
activities. Assigning one person to write checks and another employee to authorize the payments
is one example of segregation of duties.
Performing transactions
Authorization or acceptance
Reconciliations
Custody of assets
Access Controls
Access controls govern who or what has access to corporate assets, including IT systems. These
controls are a crucial security concept that reduces risk to the company or organization.
Physical access control limits access to campuses, buildings, rooms, and physical IT assets.
Security guards verifying ID credentials or access key cards may be employed to enforce
physical access control.
Logical access controls restrict connections to computer networks, system files, and data. The
principle of the least privilege (PoLP) is an information security standard that says users should
only access system functions and data that are necessary for the user to do their job.
Pre-Employment Screening
See also
Some common terms and definitions that are key to understand compliance
Some examples of detective controls are internal audits, reconciliations, financial reporting,
financial statements, and physical inventories.
Internal Audits
An internal audit evaluates compliance with company procedures, applicable laws, and
international standards. Data and reports are reviewed to assure consistency and compliance.
Internal audits provide a value-added service to management and the board of directors by
detecting and correcting weaknesses in a process before external audits discover them. This can
protect the organization from loss of certification and regulatory fines (not to mention painfully
high external audit fees).
Reconciliations are performed to verify financial reporting among various sources. For example,
comparing (or reconciling) a bank statement to a company’s internal records is one form of
reconciliation.
Financial reporting documents the company’s revenues, spending, cash flow, and financial
health. It allows executives and investors to make more informed judgments on performance and
opportunities for improvement. Unusual or unexpected figures in financial reporting and
financial statements help detect inadvertent errors and inappropriate actions.
Physical inventory counts are performed periodically to assure actual inventories match what is
recorded in business systems and financial statements. Physical inventory values directly affect
the balance sheet, so it’s imperative they are reflected accurately. Inventory discrepancy
investigations can reveal system issues, inadvertent errors, and theft.
Corrective internal controls, by nature, are specific to the typical flaws and risks of your
company, previously evaluated through comprehensive risk assessments or detective controls
such as audits.
Patch Management
Patch management is the delivery and installation of software updates. These patches are
frequently required to remedy flaws (also known as “vulnerabilities” or “bugs”) in software.
Patches are commonly required for operating systems, applications, and embedded devices (such
as network equipment). When a vulnerability is discovered after a piece of software has been
released, a patch can remedy it. Proper patch management protects information security by
preventing data breaches and leaks.
Policies and procedures may be updated when an audit or other detective control identifies a
process gap. For example, root cause analysis on a physical inventory discrepancy may reveal
that employees are inadequately trained on how to decommission parts that fail quality checks.
Corrective controls would include updated work instructions and training.
Disciplinary Actions
Disciplinary actions are corrective actions taken in response to employee misbehavior, rule
violations, or poor performance. Discipline can take several forms depending on the seriousness
of the situation, including a verbal warning, formal warning, an unfavorable performance
evaluation, or even termination.
See also
Some common terms and definitions that are key to understand compliance
Management is ultimately responsible for the control environment and the success of internal
controls. The benefits of internal controls depend upon correct implementation and ongoing
monitoring.
Early-Warning System
Internal controls serve as an early-warning system to identify issues before they become big
problems. Quality checks prevent faulty products from being shipped to customers. The
investigation into a decline in on-time delivery metrics may reveal a more significant problem on
the horizon. Problems are easier to fix when you catch them early.
Prevent Fraud
Robust internal controls deter employees from engaging in misconduct. When employees can see
process gaps, they may be tempted to perform minor inappropriate actions that eventually lead to
major ones. With multiple checks and balances, however, fraud is much more difficult. Solid
policies assure that employees understand the consequences of committing misconduct.
Performing investigations and corrective actions on external audit findings can be arduous. If an
external audit identifies a significant gap in processes or material misstatements, you could be
exposed to losing industry certifications or substantial fines. Finding and fixing a problem before
an external entity discovers it is always best.
If you still experience a data breach, robust internal controls can also protect you from hefty
fines. If an investigation reveals that your organization acted with due diligence and had
adequate controls, a regulatory agency may reduce penalties.
Despite the benefits, internal controls have some limitations. It’s crucial to be aware of the gaps
left by internal controls to ensure that those risks are understood.
Collusion
Segregation of duties is one of the most prevalent internal controls businesses use. It separates
tasks so that no one employee has the power to commit fraud. Still, a group of employees can get
past this by collaborating in an elaborate process to disguise their fraud.
Human Error
Human error can be another disadvantage of internal controls, especially when relying on manual
processes and judgment calls. Mistakes can be made during manual inventory counts, and poor
judgment could degrade internal audit results. Automated systems should be employed to drive
consistency and reduce human error wherever possible.
For example, scales can be used in stockrooms to verify inventory counts. Automated systems
can help perform reconciliations among accounting and financial records. Solid auditing
processes and management oversight will support rigorous internal auditing standards.
Unforeseen Circumstances
Internal controls rely on management anticipating all potential hazards and implementing
mechanisms to prevent or mitigate them. Still, management cannot anticipate all potential
challenges or events. Random variables or occurrences are prone to render internal controls
ineffective.
Moreover, attempting to control unusual conditions can be costly, and a management team may
instead decide to accept the risk. As a result, internal controls may be limited in their use under
unexpected or extraordinary scenarios.
Small companies may begin by managing their controls with spreadsheets, but internal and
external stakeholders increase as their business grows. As a result, preparing ahead of time for a
more streamlined solution can save time and money in the long run.
Instead of using spreadsheets to manage your compliance requirements, use the RiskOptics
ROAR Platform to streamline evidence and audit management for all of your compliance
frameworks.
A single source of truth assures your organization is always audit-ready, thanks to its advanced
features that enable straightforward risk assessment, analysis, and mitigation. You can also easily
map controls across various compliance frameworks and monitor them to see which ones impact
risk the most.
Copy Link
Modern organizations don’t operate in a perfect world where everything always goes according
to plan. Mishaps can (and do) happen all the time because all companies operate in a risky
business environment. Adverse events are a fact of life.
While at least some adverse events are unavoidable, organizations can evade many such events
and reduce the threat of others. This is where internal controls – actions organizations can take to
reduce risk – enter the picture.
So what are internal controls, exactly? What is an internal control system? What are the five key
components of an internal control framework?
And how can your organization monitor these controls to ensure they work as expected?
Let’s explore.
An internal control (also sometimes known as an internal safeguard) can be any mechanism that
helps a company to run its processes efficiently and effectively: a rule, a policy, a procedure, a
statement from management, and more.
The right controls can help to assure business continuity; prevent costly errors, irregularities, and
fraud; and maintain the integrity of financial statements and accounting records. They can also
help:
Ultimately, well-designed controls can empower your company to achieve its established
objectives. Conversely, missing or poorly designed controls can result in inefficient processes,
low productivity, costly errors, and fraud. These issues may increase customer churn, harm the
company’s reputation, and result in financial losses, regulatory fines, and legal damages.
Preventive Controls
As the name implies, preventive controls prevent issues including accounting errors, material
misstatements, fraud, or cyberattacks before they have a chance to happen. Such controls are
essential because they help to lower the costs of errors or malicious actions.
Detective Controls
Detective controls find errors and irregularities that have already occurred. They are essential
because they show whether preventive controls are operating as intended and because they help
improve process quality and prevent the recurrence of errors.
Corrective Controls
Corrective controls resolve existing issues that may lead to or exacerbate fraud, financial losses,
or reputational damage. They include:
The best way to implement and integrate these controls into business processes is to use an
established internal control framework such as the framework developed by COSO. Let’s look at
the five interrelated components of internal control systems as recommended by COSO.
See also
1. Control Environment
The control environment provides a structure and discipline for internal controls. It aligns
business processes with applicable laws, compliance requirements, and industry-standard
practices. It also assures that the company operates responsibly, ethically, and reliably
while reducing its legal exposure.
The environment sets the stage for the other elements of your internal control system. It
describes the organization’s culture and ethics, the management’s philosophy and
commitment to internal control policies, and the direction provided by the board of
directors. It also incorporates all these elements:
Regular risk assessments (say, once a year) allow the organization to identify risks and
implement plans for risk elimination or mitigation. This step involves assessing each
risk’s possible impact and likelihood to minimize the potential for damage or losses. Such
evaluations can help you understand how risks relate to business objectives and
implement appropriate controls against them.
3. Control Activities
Control activities are the policies and procedures to carry out proper risk responses and
management directives. These controls help the organization achieve its business
objectives while keeping risks low. They can occur at all levels and in all functions.
o Segregation of duties
o Transaction verifications and reviews
o Reviews of operating performance
o Inventory counts
o Employee training sessions
o Physical and digital security
o Data backups
4. Information and Communication
5. Monitoring
Internal or external auditors must regularly monitor all internal controls to evaluate the
control system’s performance and effectiveness and to assure that controls are followed
throughout the organization. Regular spot checks can help you identify control gaps and
fix them before they can harm the organization.
Fraud often resembles lightning: It strikes you suddenly, when you are least
expecting it, and often when you are comfortable. Experienced risk managers
understand that fraudsters don’t fit the popular media stereotype of slimy
connivers. Rather, they are often regular people, even trusted long-time
employees.
The key to preventing fraud is situational awareness. Know the yellow and red
flags such as a rapid and unusual increase in an employee’s living standards, an
employee who unnecessarily works long or odd hours and refuses to take
vacations (for fear that another person covering the role for a few days could
discover the misdeeds), or an employee who noticeably faces financial
pressures. Also, be aware of the “fraud triangle”:
For example, ideally the same person should not have access to company funds
(e.g., to be a signer on the bank account), the ability to authorize spending those
funds, the authority to record the transaction, and the responsibility to reconcile
the bank statement at the end of the month. Some or all of these duties should
be segregated among several employees so that any fraud would require
collusion. Even if one employee had the pressure and rationalization to commit
fraud, in an environment with segregation of duties, he would have to take the
risk of recruiting another employee to cover for him.
The warehouse manager who has physical access to inventory should not have
the ability to make inventory adjustments in the accounting system, as this
segregation between custody and recording prevents the manager from stealing
product and recording adjustments to make the system data match the physical
inventory. Rather, inventory shrinkage should show up on reports monitored by
inventory accountants who do not have access and authorization to remove
product from the warehouse; by segregating these duties, discrepancies should
be detected, monitored, and accounted for by the appropriate authorities.
A final word for business owners and CEOs: Especially in this era of automated
and integrated accounting systems that allow a small finance staff to handle
high transaction volume, many companies do not have adequate staff to properly
segregate all duties among finance staff. This means that the business owner or
CEO should be involved and situationally aware of risks. Although hiring
trustworthy staff members who can be relied upon is one essential component, if
there are limited numbers of staff in the finance group (i.e., one or two people),
the owner needs to take some time to monitor the activities of this important
department. At the very least, take time to check the bank statement each
month, look at reconciliations for asset accounts such as inventory, and
consider engaging an outside professional for a year-end audit. (As a bonus, an
experienced auditor with industry expertise can provide input on enhancing
operational and financial effectiveness.) However, do be aware of the limitations
of assurance that auditors provide regarding detecting fraud (this is spelled out
clearly in auditor engagement letters). If you have a suspicion that fraud might
be taking place, consider engaging a fraud examiner or forensic accountant to
investigate.
these threats.
This method uses the risk assessment process’s findings, which involves identifying the
potential risk factors within a company’s operational setup. These risks can be related to
technical & non-technical aspects of the business, fiscal policies, or anything that can
competition, and any other potential risks. Businesses use a methodical approach to
identify, assess, and prepare for any such dangers, which can be either physical or
symbolic and may affect the firm’s operations and objectives. In this way, the firm can
return.
Timely analyze the current business activities to identify any potential risks.
measures.
Examples
Let us take the example of two companies, company 1 and Company 2, having similar
production units in which they manufacture shoes. Company 1 has a proper team for
assessing risks and controlling their impact, whereas Company 2 doesn’t have any such
of raw material in the near term that may disrupt production for a month resulting in a
loss of $30 million if not acted upon. On the other hand, company 2 is unaware of this
risk. Based on the risk assessment, company 1 created a sufficient stock of raw materials
and sailed through the shortage period, while Company 2 incurred losses of up to $25
million. Company 2 wouldn’t have booked such losses without a proper control team,
just like Company 1. This example shows the importance of risk control.
There are three major types. They are detective, preventative, and corrective.
Detective Risk Control: This control measure is implemented only after the
potential risk event from happening. For instance, all financial models have a
built-in check for the balance sheet to avoid a mismatch of total assets and total
liabilities.
Corrective Risk Control: These control measures are implemented after the
discovery of a problem by detective risk control. The aim is to avoid repeating the
same mistake again in the future. Examples of corrective risk control include
Techniques
Six main techniques can be used. They are avoidance, loss prevention, reduction,
Loss Prevention: This control technique doesn’t eliminate the risk but prevents
expected losses. In other words, this technique accepts the risk instead of
avoiding it completely and then attempts to prevent the losses because of it.
Loss Reduction: This technique accepts both the risk and the loss that might
occur because of it. It simply attempts to minimize the losses in case the risk
event occurs.
Separation: This control technique involves the spreading of key assets. This
ensures that not all assets will impact simultaneously if a catastrophic event
event in one of the business segments doesn’t impact the entire firm’s operation.
can easily sail through any adverse situation that may take place in the future. In effect,
by controlling the risks, the firm can limit the losses to a minimum, maximizing returns
for the company’s shareholders and adding value to the market share of the firm.
Importance
Every business operates in an environment that comprises various types of risks. Some
risks may avoid, while others have to accept and control to abate their impact on the
mitigate such risks can help an organization achieve its business objectives and goals,
which provides the ability to sustain in the event of any such risk and indirectly add to
its market value. As such, most big and reputed organizations across the globe have an
Conclusion
Risk control measures play a vital role in the success of a business firm, enabling it to
achieve its business objectives and goals while effectively managing its business
activities according to plan. In other words, it can be stated that proper management of
potential business risks is required by businesses at any level in order to attain their
objectives.
As a result, COSO formed and created the COSO framework which was
released in 1992. In 2013 COSO updated the Internal Control-Integrated
Framework to incorporate new business practices and needs. In 2017 COSO
updated the Enterprise Risk Management-Integrated Framework.
The internal control components are necessary to achieve the objectives. The
organizational structure determines which components and objectives belong
where in the company.
Internal Control—
Integrated Framework (Framework), © [2013] Committee of Sponsoring
Organizations of the Treadway Commission (COSO). All rights reserved.
Used with permission.
Objectives of Internal Control
Displayed on the top portion of the cube are three categories of objectives.
There are five essential components to the COSO internal control framework:
Control Environment sets the tone at the top and company policies.
Risk Assessment identifies areas that expose the company to higher risks
both internally and externally.
Control Activities are the policies and procedures that a company implements.
Information and Communication are utilized from internal and external
sources to stay up on internal and external changes.
Monitoring is the evaluation that processes, policies, and procedures are
occurring as expected.