Coso and Acl 302
Coso and Acl 302
Coso and Acl 302
By Kate Head
Audit and Investigations Manager, University of South Florida
©2002
Traditional auditing was based on the principal that we should identify key
controls and then select a representative sample of transactions to verify their
existence. If our sample indicates that these key controls are functioning, we can
make certain representations regarding the financial function being reviewed.
There was little testing or evaluation of soft controls. In 1995, COCO even
further refined the concept presented in COSO and provided us a series of
twenty objectives of an effective internal control system.
COSO (and COCO) told us the most important component of internal control was
the control environment. But auditors continue to struggle on how to evaluate
"tone from the top." Soft controls such as management integrity, philosophy, and
ethics have been hard to quantify. Yet we know that employee compliance with
controls is integrally tied to these factors.
The other three components of internal control (risk assessment, information and
communication, and monitoring) can be rated as equally important. Testing of
these principals also did not seem to fit with our traditional model of spending
minimal time on risk assessment and the majority of audit time on testing
controls. Often only 10 percent of our audit time was spent in risk assessment
(see exhibit A).
Risk assessment was often limited to performing a few simple analytical review
procedures and documenting control processes through narratives and
flowcharts. Risk assessment tools were limited to deciding what functions to test.
The use of automated CAATS easily permits a shift to COSO (exhibit C). Using
CAATS has forced auditors to learn more about the financial system to be
reviewed. The auditor naturally obtains a more detailed overview of the
information and communication processes in place. Often the same information
used to train users is used to train auditors. Meetings with managers and users
on operational risks not only allows management to share their knowledge of the
operational risks but allows the auditor to get a glimpse of the control
environment through these interactions. In addition, monitoring systems are
carefully reviewed by auditors who are gaining information about available data
sources. Often these monitoring reports are useful in CAAT testing; therefore,
they are more carefully analyzed. As a result significantly more time is spent in
understanding the control environment, information and communication systems,
and monitoring activities.
Even before true CAAT testing has begun, the auditor is well on the way to
evaluating four attributes of control: control environment, information and
communication processes, monitoring systems, and control activities.
The last criteria for the establishment of an adequate internal control system is
the assessment of risk. Often these risk are not purely financial and may be
operational in nature. The assessment of risk is one area in which CAAT tools
really shine. The data mining activities used in CAATS allow for a more
comprehensive assessment of risk. Data mining is based on the ability to review
large data files and drill down into the data to obtain more and more detailed
information.
Functions such as analyze, classify, and stratify allow the auditor to assess the
data quickly and to determine the degree of risk associated with various
categories of transactions. Once these high-risk areas are identified, an
anomaly-based testing approach can be utilized.
Transactions that do not meet the normally expected range can either be natural
anomalies in the environment, unintentional errors not identified by the control
activities, or fraudulent transactions.
In all of these situations, there is a good potential that the control activities failed.
As a result, you are testing the control environment without having to evaluate all
of the key controls. You are also meeting the audit standards for looking for “red
flags” of fraud and are not placing undue emphasis on the hard controls. Once
you have located unidentified errors or irregularities, a review of the processes
surrounding these transactions will help identify the hard and soft controls that
were missing or were not being implemented properly.
In addition, the same audit procedures you develop to identify anomalies can
later be used as continuous monitoring tools by management. This will allow
management to perform an on-going evaluation of the control environment and
provide a value-added audit service.
Since ACL can be used to test 100% of transactions, the audit report also can be
a more balanced report of risks and mitigating controls. In the example above
we were able to report that 100% of the calls were properly rated.
The implementation of CAAT tools will allow you to shift your efforts to be more in
line with the COSO pyramid, provide more information and tools for managers,
and will increase the efficiency and effectiveness of the audit department’s
operations.
70-80%
Testing
Reporting 10-20%
Exhibit B
COSO Auditing
Comprehensive
Risk Assessment, 40-50%
Including IT Risks
Testing
40-50%
Reporting 10%
Exhibit C
Exhibit D
Effect on Process
Old Model New Model
Preliminary Checklist Driven Process Driven
Testing
Audit Planning Based on Past Audit, Interactive Assessment
Standard Plans Process
Scope Set at Beginning: Established after Risk
Establishment Inflexible Assessed: Flexible
Basis of Scope Auditor Judgment Auditor/Manager
Assessment of Risk
Report Timing At End of Testing Continuous
Findings Control Flaws, Noted Ways to Reduce Risk
Inefficiencies Risk/Incr. Efficiency