COSO Internal Control & Enterprise Risk Management Framework
Category: Audit & Assurance, Posted on: 30/12/2025 , Posted By: Dr (CA) Joydeep Mookerjee
Visitor Count:20

COSO Internal Control & Enterprise Risk Management Framework

A Comprehensive Guide for Boards, Audit Committees, and Senior Management

Executive Summary

The Committee of Sponsoring Organisations of the Treadway Commission (COSO) Framework represents the globally recognised standard for designing, implementing, and evaluating internal control systems.

This Technical Advisory provides an exhaustive analysis of the COSO Internal Control - Integrated Framework (2013) and the Enterprise Risk Management - Integrating with Strategy and Performance (2017), with particular emphasis on practical implementation, quantitative assessment methodologies, and alignment with Indian regulatory requirements including the Companies Act, 2013, and Standards on Auditing issued by the Institute of Chartered Accountants of India (ICAI).

This advisory is structured to enable Chief Financial Officers, Audit Committee Chairpersons, Internal Auditors, and Board-level stakeholders to undertake informed decisions regarding internal control design, risk assessment, and governance enhancement.

The numerical illustrations and case studies presented herein demonstrate practical application across diverse industry sectors and organisational scales.

Key Highlights

  • Five integrated components and seventeen principles form the foundational architecture
  • Risk assessment quantification methodologies with probability-impact matrices
  • Control effectiveness scoring models aligned with SA 315 (Revised 2019)
  • Cost-benefit analysis frameworks for control implementation decisions
  • Integration with ERM 2017 framework for strategic risk alignment

 

1. Introduction to the COSO Framework

1.1 Historical Context and Evolution

The COSO framework emerged from the National Commission on Fraudulent Financial Reporting (the Treadway Commission), established in 1985 in response to widespread corporate scandals. The Committee of Sponsoring Organisations comprises five prestigious professional bodies: the American Accounting Association (AAA), the American Institute of Certified Public Accountants (AICPA), Financial Executives International (FEI), the Institute of Internal Auditors (IIA), and the Institute of Management Accountants (IMA).

The framework has undergone significant evolution, with the original 1992 Internal Control - Integrated Framework being superseded by the 2013 version, and the Enterprise Risk Management framework updated in 2017 to emphasise strategic integration.

Table 1: Evolution of the COSO Framework

Year

Framework

Key Developments

1992

Internal Control - Integrated Framework (Original)

First comprehensive framework establishing five components of internal control; became a global benchmark for control design

2004

Enterprise Risk Management - Integrated Framework

Expanded internal control concepts to enterprise-wide risk management; introduced eight components and four objective categories

2013

Internal Control - Integrated Framework (Updated)

Introduced 17 principles supporting five components; enhanced focus on technology, governance, and fraud risk; superseded the 1992 framework

2017

ERM - Integrating with Strategy and Performance

Restructured to five components and 20 principles; emphasised strategic alignment and value creation; introduced risk appetite framework

1.2 Regulatory Relevance in the Indian Context

The COSO framework holds significant relevance for Indian enterprises owing to its integration with multiple regulatory and professional pronouncements. Section 134(5)(e) of the Companies Act, 2013 mandates directors to state that proper internal financial controls are in place and are operating effectively. The COSO framework provides the structured methodology for designing and evaluating such controls.

Table 2: COSO Framework Alignment with Indian Regulatory Requirements

Indian Regulatory Requirement

COSO Component Alignment

Reporting Implication

Companies Act, 2013 - Section 134(5)(e)

All five components: Control Environment, Risk Assessment, Control Activities, Information & Communication, Monitoring

Directors' Responsibility Statement in Board's Report

Companies Act, 2013 - Section 143(3)(i)

Control Activities, Monitoring Activities

Auditor's Report on Internal Financial Controls

SEBI LODR Regulation 17(8)

Control Environment, Risk Assessment, Control Activities

CEO/CFO Certification

SA 315 (Revised 2019)

All five components with emphasis on entity-level controls

Audit Documentation and Risk Assessment

Guidance Note on Audit of IFCOFR (ICAI)

All five components and 17 principles

Internal Financial Controls over Financial Reporting

 

2. The Five Components of Internal Control

The COSO 2013 framework articulates internal control through five interrelated components that collectively provide reasonable assurance regarding the achievement of organisational objectives. These components operate across all levels of the organisation and must function together in an integrated manner.

Table 3: Overview of Five COSO Components

Component

Definition

Key Focus Areas

Control Environment

The set of standards, processes, and structures providing the foundation for internal control across the organisation

Integrity, ethical values, board oversight, management philosophy, organisational structure, accountability

Risk Assessment

A dynamic and iterative process for identifying and assessing risks to the achievement of objectives

Risk identification, risk analysis, fraud risk assessment, and change management

Control Activities

Actions established through policies and procedures that help ensure management directives are carried out

Authorisation, verification, reconciliation, segregation of duties, IT controls

Information & Communication

The information necessary to carry out internal control responsibilities and the communication of objectives

Information quality, internal communication, external communication, and reporting lines

Monitoring Activities

Ongoing evaluations, separate evaluations, or a combination thereof to ascertain control functioning

Ongoing monitoring, separate evaluations, deficiency reporting, and remediation

2.1 Control Environment (Principles 1-5)

The control environment represents the tone at the top and encompasses the integrity, ethical values, and competence of the entity's personnel. It is the foundation upon which all other components rest. A weak control environment will invariably undermine even the most robust control activities.

Table 4: Control Environment - Principles and Points of Focus

No.

Principle

Points of Focus

1

Demonstrates commitment to integrity and ethical values

Code of conduct; tone at the top; ethical standards in personnel actions; deviation consequences; whistleblower mechanism

2

The board demonstrates independence and exercises oversight

Board composition (independent directors); oversight of management; periodic review of control system; audit committee effectiveness

3

Management establishes structures, reporting lines, and authorities

Organisation chart; defined responsibilities; delegation of authority matrix; reporting hierarchy clarity

4

Demonstrates commitment to competence

Job descriptions with competency requirements; recruitment policies; training programmes; performance evaluation linked to competence

5

Enforces accountability

Performance measures; incentive structures; balanced scorecards; consequence management; responsibility assignment

Illustration 1: Control Environment Maturity Assessment Model

The following quantitative model enables organisations to assess the maturity of their control environment across the five principles. Each principle is scored on a scale of 1 to 5, with weightings applied based on relative importance.

Control Environment Attribute

Weight (%)

Score (1-5)

Weighted Score

Max Score

Maturity %

Integrity and Ethical Values

25%

4

1.00

1.25

80%

Board Independence and Oversight

20%

3

0.60

1.00

60%

Organisational Structure

20%

4

0.80

1.00

80%

Commitment to Competence

15%

3

0.45

0.75

60%

Accountability Enforcement

20%

4

0.80

1.00

80%

TOTAL

100%

-

3.65

5.00

73%

Interpretation: A weighted score of 3.65 out of 5.00 (73%) indicates a 'Developing' maturity level. The organisation should prioritise the enhancement of Board oversight mechanisms and competence development programmes.

 2.2 Risk Assessment (Principles 6-9)

Risk assessment involves a dynamic and iterative process for identifying and analysing risks to the achievement of objectives. It forms the basis for determining how risks should be managed and controlled. The 2013 framework places enhanced emphasis on fraud risk assessment in accordance with SA 240.

Table 5: Risk Assessment - Principles and Points of Focus

No.

Principle

Points of Focus

6

Specifies objectives with sufficient clarity

Operations objectives aligned with mission; financial reporting objectives per applicable framework; compliance objectives per laws and regulations; external reporting objectives

7

Identifies and analyses risks

Entity-level and activity-level risk identification; involvement of appropriate levels of management; risk analysis considering likelihood and impact; risk register maintenance

8

Assesses fraud risk

Fraud risk factors per fraud triangle: fraudulent financial reporting; misappropriation of assets, management override of controls; corruption risks

9

Identifies and assesses significant changes

Changes in external environment; changes in business model; changes in leadership; acquisitions and disposals; technology changes; regulatory changes

 Illustration 2: Quantitative Risk Assessment Matrix

The following probability-impact matrix demonstrates the quantitative approach to risk assessment. Risks are scored based on likelihood of occurrence (1-5) and potential impact (1-5), yielding a composite risk score.

Table 6: Risk Scoring Criteria

Score

Likelihood

Impact (Financial)

Impact (Operational)

1 - Very Low

< 5% probability

< INR 10 Lakhs

Minimal disruption; easily absorbed

2 - Low

5-20% probability

INR 10-50 Lakhs

Minor disruption; recoverable within days

3 - Medium

20-50% probability

INR 50 Lakhs - 2 Crores

Moderate disruption; recoverable within weeks

4 - High

50-80% probability

INR 2-10 Crores

Significant disruption; recovery over months

5 - Very High

> 80% probability

> INR 10 Crores

Severe disruption; potential business continuity threat

Table 7: Sample Risk Register with Quantified Assessment

Risk Description

Likelihood (L)

Impact (I)

Risk Score (L x I)

Risk Rating

Control Response

Revenue recognition errors - cut-off

4

4

16

High

Enhanced period-end controls

Inventory valuation misstatement

3

4

12

High

Physical verification; NRV analysis

Accounts payable - duplicate payments

3

3

9

Medium

Three-way matching; duplicate check

Payroll - ghost employees

2

4

8

Medium

HR master data controls; biometric

Treasury - unauthorised transactions

2

5

10

High

Dual authorisation; treasury limits

Fixed assets - capitalisation errors

3

2

6

Low

Capitalisation policy; review

GST compliance - input credit errors

4

3

12

High

ITC reconciliation; vendor validation

 Table 8: Risk Score Classification

Risk Score Range

Risk Rating

Management Response Required

1-4

Low

Accept and monitor; routine controls sufficient; periodic review

5-9

Medium

Reduce through additional controls; assign responsibility; quarterly monitoring

10-16

High

Mitigate urgently; senior management attention; implement compensating controls; monthly monitoring

17-25

Critical

Immediate executive action; board-level reporting; consider avoiding activity; continuous monitoring

2.3 Control Activities (Principles 10-12)

Control activities are the actions established through policies and procedures that help ensure management directives to mitigate risks are carried out. These activities occur at all levels of the entity, at various stages within business processes, and across the technology environment.

 

Table 9: Control Activities - Principles and Points of Focus

No.

Principle

Points of Focus

10

Selects and develops control activities that mitigate risks

Integration with risk assessment; consideration of entity-specific factors; determination of relevant business processes; mix of control types; segregation of duties

11

Selects and develops general controls over technology

IT general controls; access security; program change management; computer operations; infrastructure management; application controls dependency

12

Deploys through policies and procedures

Documented policies; established responsibility and accountability; timely performance; corrective action; competent personnel; reassessment of policies

 Table 10: Classification of Control Activities

Control Type

Description

Examples

Preventive

Controls designed to prevent errors or irregularities from occurring in the first instance

Segregation of duties; authorisation limits; input validation; access restrictions

Detective

Controls designed to identify errors or irregularities after they have occurred

Reconciliations; exception reports; variance analysis; physical counts

Corrective

Controls designed to correct errors or irregularities once detected

Error correction procedures; adjusting entries; remediation protocols

Manual

Controls performed by personnel without automation

Supervisory reviews, approvals, physical inspections, and manual reconciliations

Automated

Controls embedded within IT systems operate without human intervention

System-enforced tolerances; automated three-way match; workflow approvals

IT Dependent Manual

Manual controls that rely on information produced by IT systems

Review of system-generated exception reports; analysis of ageing reports

  Illustration 3: Control Effectiveness Quantification Model

The following model quantifies control effectiveness across multiple dimensions. Each control is assessed on design effectiveness (whether the control is appropriately designed to mitigate the risk) and operating effectiveness (whether the control is operating as designed consistently).

 

Control

Design Score (1-5)

Operating Score (1-5)

Frequency Factor

Weighted Score

Effectiveness

Bank Reconciliation - Monthly

5

4

0.85

17.00

Effective

Invoice Approval - Per Transaction

4

3

1.00

12.00

Partially Effective

Inventory Count - Annual

4

4

0.60

9.60

Partially Effective

Access Review - Quarterly

3

2

0.75

4.50

Ineffective

Journal Entry Review - Daily

5

5

1.00

25.00

Effective

Scoring Legend: Weighted Score = Design Score x Operating Score x Frequency Factor. Effectiveness: > 15 = Effective; 8-15 = Partially Effective; < 8 = Ineffective

 

Illustration 4: Segregation of Duties Matrix - Procure to Pay Cycle

The following matrix illustrates the segregation of duties requirements across the Procure to Pay (P2P) cycle. Functions marked with 'X' should not be combined in a single role to maintain effective internal controls.

 

Function

Requisition

Purchase Order

Goods Receipt

Invoice Processing

Payment

Vendor Master

Requisition

-

X

 

X

X

X

Purchase Order

X

-

X

X

X

X

Goods Receipt

 

X

-

X

X

 

Invoice Processing

X

X

X

-

X

X

Payment

X

X

X

X

-

X

Vendor Master

X

X

 

X

X

-

Legend: 'X' indicates functions that must be segregated. Combining these functions in a single role creates unacceptable fraud or error risk. Where segregation is not feasible due to organisational constraints, compensating controls must be implemented.

 2.4 Information and Communication (Principles 13-15)

Information is necessary for the entity to carry out internal control responsibilities in support of the achievement of objectives. Communication is the continual, iterative process of providing, sharing, and obtaining necessary information.

 

Table 11: Information and Communication - Principles and Points of Focus

No.

Principle

Points of Focus

13

Uses relevant, quality information

Identification of information requirements; data capture from internal and external sources; processing of information; quality maintenance (accurate, complete, timely)

14

Communicates internally

Communication with board; communication channels; method selection based on audience; whistleblower channels; separate channels for sensitive matters

15

Communicates externally

Communication with external parties; enabling inbound communications; communication with regulators; method and timing; results of external assessments

 
2.5 Monitoring Activities (Principles 16-17)

Monitoring activities assess whether each of the five components is present and functioning. Monitoring may be accomplished through ongoing activities, separate evaluations, or a combination of both.

 

Table 12: Monitoring Activities - Principles and Points of Focus

No.

Principle

Points of Focus

16

Conducts ongoing and/or separate evaluations

Mix of ongoing and separate evaluations; rate of change consideration; baseline understanding; use of knowledgeable personnel; integration with business processes; scope and frequency adjustment; objective evaluation

17

Evaluates and communicates deficiencies

Assessment of results; communication of deficiencies to appropriate parties; remediation monitoring; root cause analysis; corrective action tracking

 Illustration 5: Control Deficiency Classification Framework

The following framework provides guidance on the classification of control deficiencies based on magnitude and reporting requirements, aligned with SA 265 and Guidance Note on Audit of IFCOFR.

 

Deficiency Type

Definition

Financial Impact Threshold

Reporting Requirement

Material Weakness

Deficiency, or combination, such that there is a reasonable possibility of a material misstatement not being prevented or detected

> Materiality threshold (typically 1-3% of PBT or 0.5-1% of Revenue)

Audit Report; Board Report; CEO/CFO Certification; Immediate remediation required

Significant Deficiency

Deficiency, or combination, less severe than material weakness but important enough to merit the attention of those charged with governance

Between clearly trivial and the materiality threshold

Audit Committee; Management Letter; Remediation plan with timelines

Control Deficiency

Control is not designed or operating effectively, but not rising to a significant deficiency level

Below the significant deficiency threshold but above clearly trivial

Management; Internal Audit Report; Normal remediation process

Illustration 6: Quantitative Deficiency Impact Assessment

The following example demonstrates the quantitative assessment of control deficiencies for a manufacturing company with Revenue of INR 500 Crores and Profit Before Tax of INR 40 Crores.

 

Control Deficiency

Potential Misstatement (INR)

% of PBT

% of Revenue

Classification

No review of revenue cut-off entries

5.50 Cr

13.75%

1.10%

Material Weakness

Inadequate inventory obsolescence review

1.80 Cr

4.50%

0.36%

Significant Deficiency

Missing approval on expense reports

0.45 Cr

1.13%

0.09%

Control Deficiency

Incomplete vendor reconciliations

0.85 Cr

2.13%

0.17%

Significant Deficiency

Materiality Basis: Performance Materiality set at 3% of PBT = INR 1.20 Crores. Overall Materiality at 5% of PBT = INR 2.00 Crores.


 3. Comprehensive Analysis: The Seventeen Principles

The COSO 2013 framework articulates seventeen principles that represent the fundamental concepts associated with each of the five components. For an internal control system to be effective, all seventeen principles must be present and functioning, and the five components must operate together in an integrated manner.

Table 13: Complete Framework - 17 Principles Across 5 Components

Component

No.

Principle

Control Environment

1

The organisation demonstrates a commitment to integrity and ethical values

2

The board of directors demonstrates independence from management and exercises oversight of the development and performance of internal control

3

Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives

4

The organisation demonstrates a commitment to attract, develop, and retain competent individuals in alignment with its objectives

5

The organisation holds individuals accountable for their internal control responsibilities in the pursuit of objectives

Risk Assessment

6

The organisation specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives

7

The organisation identifies risks to the achievement of its objectives across the entity and analyses risks as a basis for determining how the risks should be managed

8

The organisation considers the potential for fraud in assessing risks to the achievement of objectives

9

The organisation identifies and assesses changes that could significantly impact the system of internal control

Control Activities

10

The organisation selects and develops control activities that contribute to the mitigation of risks to the achievement of objectives to acceptable levels

11

The organisation selects and develops general control activities over technology to support the achievement of objectives

12

The organisation deploys control activities through policies that establish what is expected and procedures that put policies into action

Information & Communication

13

The organisation obtains or generates and uses relevant, quality information to support the functioning of internal control

14

The organisation internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control

15

The organisation communicates with external parties regarding matters affecting the functioning of internal control

Monitoring Activities

16

The organisation selects, develops, and performs ongoing and/or separate evaluations to ascertain whether the components of internal control are present and functioning

17

The organisation evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action, including senior management and the board of directors, as appropriate


 4. COSO ERM Framework 2017: Integrating with Strategy and Performance

The 2017 Enterprise Risk Management framework represents a significant evolution from the 2004 version, emphasising the integration of risk management with strategy-setting and performance management. The updated framework comprises five interrelated components supported by twenty principles.

Table 14: ERM 2017 Framework - Components and Principles

ERM Component

No.

Principle

Governance & Culture

1

Exercises Board Risk Oversight

2

Establishes Operating Structures

3

Defines Desired Culture

4

Demonstrates Commitment to Core Values

5

Attracts, Develops, and Retains Capable Individuals

Strategy & Objective-Setting

6

Analyses Business Context

7

Defines Risk Appetite

8

Evaluates Alternative Strategies

9

Formulates Business Objectives

Performance

10

Identifies Risk

11

Assesses Severity of Risk

12

Prioritises Risks

13

Implements Risk Responses

14

Develops Portfolio View

Review & Revision

15

Assesses Substantial Change

16

Reviews Risk and Performance

17

Pursues Improvement in Enterprise Risk Management

Information, Communication & Reporting

18

Leverages Information and Technology

19

Communicates Risk Information

20

Reports on Risk, Culture, and Performance


 4.1 Risk Appetite Framework

Risk appetite represents the types and amount of risk, on a broad level, that an organisation is willing to accept in pursuit of value. Risk tolerance represents the boundaries of acceptable variation in performance related to achieving business objectives.

Illustration 7: Risk Appetite Statement - Quantified Framework

Risk Category

Risk Appetite

Risk Tolerance Range

Key Metrics

Strategic Risk

Moderate to High

Willing to accept up to 15% variance in strategic KPIs

Market share, Revenue growth, ROCE

Financial Risk

Low to Moderate

Maximum 10% adverse movement in key financial metrics

Debt-Equity ratio < 1.5; ICR > 3x; Current ratio > 1.5

Operational Risk

Low

Zero tolerance for safety incidents; <2% process failures

LTI rate; Production downtime; Quality defects ppm

Compliance Risk

Very Low

Zero tolerance for material non-compliance

Regulatory findings; Penalty amounts; Audit qualifications

Reputational Risk

Very Low

Zero tolerance for brand-damaging incidents

NPS score; Media mentions; Customer complaints

Cyber Risk

Low

Near-zero tolerance for data breaches; <1hr acceptable downtime

Incident count, Recovery time, Vulnerability score

 Table 15: Risk Response Strategies with Cost-Benefit Analysis

Response

Description

When Appropriate

Typical Cost

Risk Reduction

Accept

Take no action; absorb risk within normal operations

Low impact risks within tolerance

Nil

0%

Avoid

Eliminate risk by removing the exposure source

Unacceptable risks outside appetite

Variable

100%

Reduce

Implement controls to reduce the likelihood or impact

Risks above tolerance but manageable

Moderate

40-80%

Share

Transfer portion of risk through insurance, contracts, or partnerships

High-impact risks with transfer options

Premium cost

50-90%


 5. Implementation Case Studies and Numerical Illustrations

5.1 Case Study: Manufacturing Entity - Control Effectiveness Assessment

Background: Bharath Manufacturing Limited is a listed company with annual revenue of INR 1,200 Crores and operations across five manufacturing locations. The company is required to report on Internal Financial Controls over Financial Reporting (IFCOFR) under Section 143(3)(i) of the Companies Act, 2013.

Table 16: IFCOFR Assessment - Process-Level Controls

Business Process

Total Controls

Tested

Exceptions

Exception %

Conclusion

Revenue & Receivables

48

48

3

6.25%

Effective

Procurement & Payables

42

42

5

11.90%

Effective*

Inventory Management

35

35

2

5.71%

Effective

Fixed Assets

28

28

1

3.57%

Effective

Payroll & HR

32

32

4

12.50%

Effective*

Treasury & Banking

25

25

0

0.00%

Effective

Financial Close

38

38

2

5.26%

Effective

IT General Controls

45

45

6

13.33%

Effective*

TOTAL

293

293

23

7.85%

Effective

Note: * indicates processes with exceptions requiring remediation. Exception threshold for 'Effective' conclusion: <15% with no material weaknesses.

Illustration 8: Materiality Calculation for IFCOFR Testing

Benchmark

Amount (INR Cr)

Percentage Applied

Computed Materiality

Profit Before Tax

96.00

5%

4.80

Total Revenue

1,200.00

0.5%

6.00

Total Assets

850.00

1%

8.50

Net Worth

420.00

2%

8.40

Overall Materiality Selected

-

-

5.00

Performance Materiality (75%)

-

-

3.75

Clearly Trivial Threshold (5%)

-

-

0.25


 5.2 Case Study: Cost-Benefit Analysis of Control Implementation

Scenario: A financial services company is evaluating the implementation of automated three-way matching control versus continuing with the manual verification process.

Table 17: Cost-Benefit Analysis - Automated Three-Way Matching

Cost/Benefit Category

Manual Process (INR)

Automated Process (INR)

Variance

Annual Operating Costs

Personnel Costs (AP Team)

45,00,000

18,00,000

27,00,000

Software License & Maintenance

0

8,50,000

(8,50,000)

Training & Change Management

1,00,000

2,50,000

(1,50,000)

Error Correction & Rework

8,00,000

1,20,000

6,80,000

Total Operating Costs

54,00,000

30,20,000

23,80,000

Risk-Related Benefits

Duplicate Payment Prevention (Est.)

0

12,00,000

12,00,000

Fraud Risk Reduction (Est.)

0

5,00,000

5,00,000

Early Payment Discount Capture

2,00,000

8,00,000

6,00,000

Total Quantified Benefits

-

-

46,80,000

One-Time Implementation Costs

Software Implementation

-

25,00,000

-

Data Migration & Testing

-

8,00,000

-

Total Implementation Cost

-

33,00,000

-

 

Illustration 9: Return on Investment Calculation

Metric

Value

Annual Net Benefit (Cost Savings + Risk Benefits)

INR 46,80,000

One-Time Implementation Cost

INR 33,00,000

Payback Period

8.5 months

3-Year ROI

325%

NPV (10% discount rate, 5 years)

INR 1.44 Crores


 

6. IT General Controls (ITGC) Framework

IT General Controls represent the foundation upon which automated application controls depend. Principle 11 of the COSO framework specifically addresses the selection and development of general controls over technology. The ITGC framework typically encompasses four domains.

 Table 18: ITGC Domains and Control Objectives

ITGC Domain

Control Objectives

Key Controls

Access to Programs and Data

Ensure access is appropriately restricted to authorised users based on job responsibilities

User provisioning/deprovisioning; password policies; privileged access management; periodic access reviews; segregation of duties

Program Change Management

Ensure changes to programs are authorised, tested, and appropriately implemented

Change request approval; testing documentation; segregation of development and production; emergency change procedures; version control

Computer Operations

Ensure system processing is complete, accurate, and authorised

Job scheduling; batch processing monitoring; error handling; backup and recovery; incident management

Program Development

Ensure new systems are developed with appropriate controls and authorisation

SDLC methodology; requirements approval; user acceptance testing; security review; go-live authorisation

 

Illustration 10: ITGC Maturity Assessment Model

ITGC Domain

Design (1-5)

Operating (1-5)

Documentation (1-5)

Average

Maturity Level

Access to Programs & Data

4

3

4

3.67

Defined

Program Change Management

4

4

3

3.67

Defined

Computer Operations

5

4

4

4.33

Managed

Program Development

3

3

2

2.67

Repeatable

Overall ITGC Maturity

-

-

-

3.59

Defined

Maturity Scale: 1-Initial; 2-Repeatable; 3-Defined; 4-Managed; 5-Optimised


 7. Fraud Risk Assessment (Principle 8)

The 2013 COSO framework places enhanced emphasis on fraud risk assessment, recognising that fraud represents a significant threat to organisational objectives. Principle 8 mandates consideration of the potential for fraud in assessing risks, encompassing fraudulent financial reporting, misappropriation of assets, and corruption.

 

7.1 The Fraud Triangle and Fraud Risk Factors

Table 19: Fraud Triangle - Risk Factors and Assessment

Fraud Triangle Element

Description

Risk Indicators

Incentive/Pressure

The motivation or pressure that provides a reason for committing fraud

Aggressive financial targets; management compensation tied to results; financial difficulties; personal financial pressures

Opportunity

The circumstances that allow fraud to be committed, often due to weak controls

Inadequate segregation of duties; poor oversight; complex transactions; related party transactions; ineffective internal audit

Rationalisation

The attitude or justification that permits the fraudster to believe the behaviour is acceptable

Management override precedents; weak ethical culture; 'everyone does it' mentality; entitlement beliefs

Illustration 11: Fraud Risk Assessment Matrix

Fraud Scheme

Likelihood (1-5)

Impact (1-5)

Inherent Risk

Control Rating

Residual Risk

Revenue Recognition Manipulation

3

5

15

Strong

Medium (6)

Expense Reimbursement Fraud

4

2

8

Moderate

Medium (5)

Inventory Theft

3

3

9

Strong

Low (4)

Vendor Kickbacks

3

4

12

Weak

High (10)

Ghost Employee

2

3

6

Strong

Low (2)

Management Override

3

5

15

Moderate

High (9)

Cyber Fraud

4

4

16

Moderate

High (10)

Control Rating Impact: Strong reduces inherent risk by 60%; Moderate reduces by 40%; Weak reduces by 20%

8. Implementation Roadmap and Governance Structure

8.1 Phased Implementation Approach

Table 20: COSO Implementation Roadmap

Phase

Activities

Key Deliverables

Duration

Effort %

Phase 1: Assessment

Current state assessment; gap analysis; risk profiling

Gap assessment report; risk register; materiality analysis; control environment assessment

6-8 weeks

20%

Phase 2: Design

Control design; process documentation; RACI development

Risk and control matrices; process narratives; control design documentation; policy framework

8-10 weeks

30%

Phase 3: Implementation

Control deployment, training, and system configuration

Implemented controls; trained personnel; updated systems; monitoring mechanisms

12-16 weeks

35%

Phase 4: Testing

Control testing; deficiency evaluation; remediation

Test results, deficiency report, remediation plans, and updated documentation

6-8 weeks

10%

Phase 5: Sustain

Continuous monitoring; periodic assessment; improvement

Monitoring reports, annual assessment, improvement initiatives, updated framework

Ongoing

5%

 

8.2 Three Lines of Defence Model

Table 21: Three Lines Model - Roles and Responsibilities

Line

Function

Primary Responsibilities

COSO Alignment

First Line

Operational Management; Business Units

Own and manage risks; implement controls; execute processes; report on control performance

Control Activities; Information & Communication

Second Line

Risk Management; Compliance; Finance Control

Develop policies and frameworks; provide guidance; monitor compliance; challenge first line

Risk Assessment; Monitoring Activities

Third Line

Internal Audit

Independent assurance; evaluate effectiveness; report to Audit Committee; recommend improvements

Monitoring Activities (Separate Evaluations)

Oversight

Board; Audit Committee

Overall governance: set risk appetite, approve policies, oversee effectiveness, receive assurance reports

Control Environment (Board Oversight)


 9. Comprehensive COSO Assessment Framework

Table 22: Enterprise-Wide COSO Assessment Scorecard

Component / Principle

Weight

Score (1-5)

Weighted

Status

CONTROL ENVIRONMENT

25%

-

-

-

P1: Integrity & Ethical Values

6%

4

0.24

Present

P2: Board Independence

5%

4

0.20

Present

P3: Structures & Authorities

5%

3

0.15

Present*

P4: Commitment to Competence

5%

4

0.20

Present

P5: Accountability

4%

3

0.12

Present*

RISK ASSESSMENT

20%

-

-

-

P6: Specifies Objectives

5%

4

0.20

Present

P7: Identifies & Analyses Risks

6%

4

0.24

Present

P8: Assesses Fraud Risk

5%

3

0.15

Present*

P9: Identifies Changes

4%

3

0.12

Present*

CONTROL ACTIVITIES

25%

-

-

-

P10: Selects & Develops Controls

10%

4

0.40

Present

P11: Technology Controls

8%

3

0.24

Present*

P12: Policies & Procedures

7%

4

0.28

Present

INFORMATION & COMMUNICATION

15%

-

-

-

P13: Uses Quality Information

6%

4

0.24

Present

P14: Internal Communication

5%

4

0.20

Present

P15: External Communication

4%

3

0.12

Present*

MONITORING ACTIVITIES

15%

-

-

-

P16: Ongoing & Separate Evaluations

8%

4

0.32

Present

P17: Evaluates & Communicates Deficiencies

7%

4

0.28

Present

OVERALL SCORE

100%

-

3.70

Effective

Conclusion: All 17 principles are 'Present and Functioning'. A weighted score of 3.70 indicates an effective internal control system. Items marked with '*' require improvement but do not represent significant deficiencies.

10. Recommendations and Action Items

Based on the comprehensive analysis of the COSO framework and its application, the following recommendations are presented for consideration by the Board, Audit Committee, and Senior Management.

Table 23: Prioritised Recommendations

No.

Recommendation

Priority

Timeline

Responsible

1

Enhance fraud risk assessment procedures with a specific focus on management override and cyber fraud schemes

High

Q1 2026

Internal Audit; CFO

2

Implement automated continuous monitoring tools for key financial controls with real-time exception reporting

High

Q2 2026

IT; Finance

3

Strengthen the ITGC framework, particularly in the program development lifecycle and access management

High

Q1-Q2 2026

CIO; IT Security

4

Develop a formal risk appetite framework with quantified tolerance levels for each risk category

Medium

Q2 2026

CRO; Board

5

Enhance the whistleblower mechanism with anonymous reporting channels and investigation protocols

Medium

Q1 2026

Compliance; HR

6

Conduct periodic control self-assessment exercises at the business unit level with central consolidation

Medium

Q3 2026

Business Units; Internal Audit

7

Update policies and procedures documentation to reflect current processes and regulatory requirements

Low

Q4 2026

Process Owners

8

Integrate ERM 2017 framework with the strategic planning process for enhanced risk-informed decision making

Medium

FY 2026-27

CEO; CFO; CRO

11. Conclusion

The COSO Internal Control - Integrated Framework (2013) and Enterprise Risk Management Framework (2017) provide comprehensive, globally recognised standards for designing, implementing, and evaluating internal control systems. Effective implementation of these frameworks enables organisations to achieve their strategic objectives whilst managing risks within defined appetites.

For Indian enterprises, alignment with the COSO framework ensures compliance with the Directors' Responsibility Statement requirements under Section 134(5)(e) of the Companies Act, 2013, the auditor's reporting obligations under Section 143(3)(i), and the Standards on Auditing issued by the ICAI.

The quantitative assessment methodologies, risk scoring matrices, and control effectiveness models presented in this advisory provide practical tools for Audit Committees, Chief Financial Officers, and Internal Audit functions to evaluate and enhance their internal control environments continuously.




To Activate comments you need to provide details for google authentication and facebook authentication
 
     
147368 Times Visited