Sarbanes-Oxley Compliance for Nonaccelerated Filers

Solving the Internal Control Puzzle

By Sid M. Edelstein

E-mail Story
Print Story
No business legislation in recent history has elicited a broader range of reaction among financial professionals than the Sarbanes-Oxley Act of 2002 (SOA). While SOA clearly presents compliance challenges for public companies of all sizes, for many smaller, nonaccelerated filers these challenges can seem all but insurmountable. For some, this perception can lead to willful denial that compliance requirements extend to them. For others, it typically yields token efforts at compliance that often fall short. Neither is a good response. Unfortunately, many smaller companies lack the internal resources and specialized expertise necessary to successfully address all of the complexities associated with comprehensive SOA compliance.

Much of the standard professional auditing literature and available guidelines focuses almost exclusively on the objective analysis of accounting system control activities that support the financial reporting process. As a result, many auditors may find themselves ill equipped to address some of the more subjective and technically unfamiliar internal control aspects of SOA compliance audits: internal control framework development methodologies, the risk assessment activities on which they depend, and the information technology (IT) and business process automation systems that facilitate them.

Because business technology plays a major role in most companies’ internal control activities, IT-related aspects of SOA compliance are not commonly addressed in typical accounting literature. Such IT aspects include the COBIT IT internal control and governance framework, as well as IT general controls than can potentially impact the accuracy and timeliness of a company’s financial reporting processes. The historical development of COSO’s Internal Control–Integrated Framework and an overview of its key elements form the conceptual underpinnings of corporate internal control systems.

A Short History of Decay

Sarbanes-Oxley is not the first time that government has tried to protect the public from corporate malfeasance. A similar spate of high-profile corporate scandals in the 1980s prompted the establishment of the Treadway Commission, which laid the foundation for a variety of meaningful accounting and financial reporting reforms. Today’s SOA provisions are the direct descendants of these reforms. They are also only the first round in what is likely to become an ongoing legislative effort to improve corporate governance and accountability.

The Treadway Commission’s charter recognized the need to improve corporate internal control over financial recordkeeping and accounting practices. The task of addressing this issue fell to a group of private organizations known as the Committee of Sponsoring Organizations (COSO). COSO’s primary contribution to the Treadway Commission’s efforts was the development of an open, integrated framework for analyzing and improving the effectiveness of internal controls. Officially published in 1992, COSO’s Internal Control–Integrated Framework has become the de facto standard for internal control analysis and reporting. While leaving the door open to other potential internal control development frameworks, both the SEC and the PCAOB have specifically sanctioned the COSO framework as an appropriate guideline for SOA-compliant internal control analysis, development, and documentation.

Overview of the COSO Integrated Framework

The conceptual underpinnings of the COSO framework are quite simple and based upon the following observations:

  • Every business has numerous operational objectives that it must accomplish in order to be successful.
  • Every operational objective contains various inherent quantitative and qualitative risks to its achievement.
  • The potential consequences of these risks should be reduced, wherever possible and practical, by instituting “integrated” internal controls.

COSO defines five key elements of an integrated, or comprehensive, framework of internal control as follows:

  • Control environment. Executive management and corporate governance bodies must ensure that appropriate corporate ethics and values are established and enforced at the executive level and effectively instilled throughout the entire organization. If this “tone at the top” is not successfully established, the entire system of internal control can be easily undermined and susceptible to fraud and inaccurate financial reporting.
  • Risk assessment. Efforts must be made to analyze, define, and document the qualitative and quantitative risks for all key business units and processes involved in achieving the organization’s business objectives. Accurate risk assessment is perhaps the most critical element in establishing an effective framework of internal control. It serves to highlight and isolate those specific business units and processes which present the greatest risk to the organization’s operational goals, and thereby helps focus and prioritize the creation of the organization’s overall internal control framework.
  • Control activities. Once all internal control objectives have been established and their risks have been accurately assessed, specific safeguards, processes, and procedures must be developed and implemented to reduce or mitigate the defined risks to all critical internal control objectives. Many internal control analysis, testing, and reporting functions tend to focus almost exclusively upon control activities, because they lend themselves to objective analytical criteria. The danger, however, is that effective control activities in and of themselves do not ensure that the organization has implemented an effective system of internal controls. All five COSO components must be present to ensure that these control activities function correctly and consistently over time.
  • Information and communication. Information and communication channels that support internal control objectives must be available and understood by all members of the organization as well as all necessary external entities (e.g., boards of directors, audit committees). Open internal and external communications are vital to internal control because they support the checks and balances that ensure the integrity of the control environment as well as the effectiveness and consistent application of control activities.
  • Monitoring. The organization must ensure that all internal control objectives are continuously monitored, regularly tested, and revised as necessary to support changing business conditions. An effective internal control system must be dynamic and adaptable. As business technology continues to evolve, the pace of business grows exponentially faster and becomes more difficult to control. If the organization does not have a methodology in place for accurately measuring and benchmarking the effectiveness of its internal control procedures over time, these controls can quickly become outdated and ineffectual.

COSO affirms that an integrated internal control framework must take all of these elements into account and include control objectives that effectively address each of them. In other words, the effectiveness of a company’s overall system of internal controls could be severely compromised if any one of these five key components is lacking in its design or execution.

COSO also requires that the development of control objectives incorporate a scope that encompasses the following three functional considerations:

  • Operations: Improved operational efficiencies.
  • Financial reporting: Accuracy and timeliness of the financial reporting process.
  • Compliance: Adherence to all corporate legal and regulatory responsibilities.

Finally, COSO requires that control objectives based upon the guidelines detailed above be developed for all business units as well as all key business processes conducted within these units. This ensures that the control framework is designed to encompass both company-wide and process-specific operational control objectives. (Exhibit 1 and Exhibit 2 present a graphical representation of the COSO framework and an example of typical COSO internal control documentation.)

IT Support

While most IT departments are actively engaged in supporting their organization’s internal controls over financial reporting, and many do so effectively, few are well versed in the disciplines and procedures necessary to adequately substantiate or document these activities in accordance with COSO or SOA requirements. This presents a significant dilemma because, in most public companies, IT departments bear a great deal of responsibility for ensuring the accuracy, integrity, and availability of the transactional data used in financial statements.

The PCAOB has recommended that in making a determination regarding which controls should be tested for Sarbanes-Oxley compliance, auditors must consider “controls, including information technology general controls, on which other controls are dependent” (PCAOB Release 2003-17).

By and large, most auditors already have some experience analyzing IT “application-level” internal controls; analysis of these controls has been included in standardized audit procedural guidelines for a number of years and has already been incorporated into the testing and walk-through procedures typically conducted during the course of a normal audit. Analyzing “general” IT controls, however, requires a level of IT knowledge and technical expertise that goes well beyond what most internal and external auditors have been trained for.

General IT controls can potentially encompass the entire spectrum of an organization’s IT operations, and many of these controls, along with the systems which support them, may not be adequately documented for purposes of SOA compliance. The auditor’s judgment and discretion must be applied in order to segregate those general IT controls which could potentially have a significant or material impact on any given company’s financial reporting processes. Once these high-risk controls have been successfully isolated, auditors should be prepared to provide guidance to IT department management and personnel in developing appropriate IT general control documentation and testing procedures to support ongoing SOA compliance activities.

The Changing IT Environment

Unfortunately, the COSO Internal Control–Integrated Framework provides little guidance regarding general IT controls, because IT environments have changed dramatically since its publication. When COSO’s integrated framework was initially released, the typical enterprise IT environment was centralized and composed primarily of customized, legacy business applications. The most significant risks these systems represented to the integrity of financial data and reporting related to internal controls over application development, data entry, and system access.

In the COSO framework example documentation itself, only a handful of pages deal specifically with internal controls over IT operations, and these are nearly exclusively devoted to the aforementioned controls. While these IT internal control issues still exist and are a key focal point in any SOA control analysis, they represent only the tip of the iceberg with respect to today’s financially relevant general IT controls.

Since the introduction of COSO’s Internal Control–Integrated Framework, enterprise IT environments have grown exponentially more complex and decentralized. Sophisticated e-mail systems and web-based technologies now handle much of the financial information and corporate communications that were once conducted manually and left paper trails. Generic accounting software applications and integrated ERP systems have sophisticated financial controls that can be configured to dynamically ensure the security, availability, and integrity of financial data.

Analyzing access security parameters and data-entry batch controls is no longer enough to ensure the accuracy and integrity of a company’s financial data. Modern business technologies have enabled companies to conduct transactions in real time on a plethora of disparate processing platforms. As companies continue to leverage modern business technologies, both the pace and the breadth of financial data processing continue to increase. Corralling this financial data flow will be critical to successfully controlling its accuracy and integrity in the future.

COBIT: The COSO of IT

The dizzying array of modern business technology available can differ dramatically in its potential impact on a given company, but the technology itself only represents part of the equation. What about the IT control environment is necessary to successfully manage and maintain these sophisticated IT systems?

Modern IT environments often require teams of highly skilled management and technical personnel to operate efficiently. Are there enough personnel qualified to perform these duties effectively? Is their training maintained on an ongoing basis in order to ensure continuous support for the company’s growing IT systems? Are effective change-management policies and procedures in place to coordinate ongoing system enhancements? Does the high-level system access to financial applications and databases that IT personnel need present a significant internal control issue?

These and countless other issues with respect to IT governance also break new ground for auditors that must now, for SOA-compliance attestation, form an opinion as to the effectiveness of the general IT controls upon which other financial internal controls depend.

The IT Governance Institute has published a discussion document, “IT Control Objectives for Sarbanes-Oxley,” which provides what may be the only comprehensive methodology for assessing both general and application-level IT controls in support of SOA compliance (available from www.isaca.org). The work is based upon COBIT, a detailed set of professional guidelines for establishing effective IT governance, auditing, and internal control objectives. It identifies generic internal control objectives for the financial reporting process and modifies them accordingly to specifically address SOA compliance considerations. This specialized subset of COBIT is then mapped to the components of the COSO framework. The end result is a detailed IT internal control checklist that can be used to thoroughly assess both IT general and application-level controls for purposes of SOA-compliance analysis.

In addition to this checklist, this document also provides IT management with a comprehensive road map for coordinating all aspects of their department’s support for the company’s overall SOA compliance activities. Beyond being an excellent guideline for educating IT management and personnel, it is also a valuable resource for auditors that wish to achieve a greater understanding of modern IT internal controls and their relevance to SOA compliance.

Exhibit 3 and Exhibit 4 illustrate COBIT’s relationship to the COSO internal control integrated framework. Using COBIT as a foundation for an SOA IT internal control analysis methodology is logical because its open framework encompasses an integrated approach to enhancing enterprise IT governance and internal control that is similar to COSO’s. COBIT was designed to provide a consistent set of guidelines and best practices for maintaining an enterprise IT environment, not specifically to support the accuracy and integrity of the financial systems operating within this environment.

While COBIT and the “IT Control Objectives for Sarbanes-Oxley” discussion document derived from it provide an excellent foundation, these reference documents alone cannot solve all of the problems auditors will face in determining how the numerous IT general and application-level internal controls detailed in this documentation may affect a specific organization’s financial reporting processes.

Because the COBIT IT controls are exhaustive and often focused exclusively on IT-related issues, not all will have relevance to a particular company’s financial reporting processes. In general, when COBIT is the reference, auditors should be prepared to make a strong case for how and why a particular IT general control chosen for analysis or testing could potentially uncover a deficiency that could have a significant or material impact on the company’s financial statements. An informed determination about the IT general controls to focus on will be critical to the successful completion of an SOA audit.

Case Study

To illustrate how to isolate modern IT general controls that could have relevance to corporate financial statement processing functions, consider the following characteristics of a typical large corporation:

  • The company maintains multiple national offices and distribution centers linked via WAN and VPN connections.
  • All accounting, supply chain, and fulfillment operations are fully integrated via a modern, distributed ERP system that feeds financial information back to a centralized mainframe in the home office for financial processing and reporting.
  • The company has internally developed an e-commerce website that generates most of its total sales orders. A high percentage of its purchasing and EDI operations are also conducted via secure trading-partner websites maintained by vendors or independent third-party service providers.
  • The company distributes the majority of its internal financial reporting documentation electronically to all business units in real time via secured intranet websites and e-mailed PDF report attachments.

For a company like this, above and beyond the standard IT security, access control, and accounting process walk-throughs, attention should also be paid to the following specialized IT general and application level control areas:

Network infrastructure. In distributed IT environments, particularly those utilizing remote-access technologies, security considerations go well beyond analyzing basic network and application-level user access parameters. A thorough analysis of IT controls in this area would include a review of firewall configuration parameters, network intrusion detection and monitoring provisions, network performance monitoring activities, network configuration and administration functions, data classification and encryption standards, e-mail and antivirus filtering provisions, business continuity provisions, and critical third-party service provider reliability. Because any weak link in the chain of a company’s network infrastructure could jeopardize the company’s financial data, a key deficiency in this area could ultimately have a significant effect on the company’s financial statement production process.

Another key issue is the role the network plays in supporting corporate communications. Information and communication represents one of the key COSO elements in establishing an integrated framework of internal control. Any significant deficiencies that could compromise reliable information exchange and corporate communications could also represent a key internal-control concern.

ERP configuration and business continuity. Modern ERP and accounting systems are capable of fully automating and integrating many highly complex business processes and centrally regulating and monitoring a broad array of financial and accounting system controls. No two vendors’ ERP or accounting applications are alike, and many can be extensively customized to support specialized vertical industry requirements. Detailed knowledge of the control, security, and workflow configuration parameters particular to the specific ERP and accounting software applications in use is critical in analyzing how effectively these systems support the company’s internal controls over financial processes and procedures.

In the example above, all internal accounting operations are being processed centrally via the home office’s mainframe. This affects the company’s ability to produce accurate financial reports on a timely basis should an unplanned business interruption make this system unavailable for an extended time. As a result, an IT internal-control review should ascertain whether the company has performed a formal business-impact analysis or risk-assessment study on its mission-critical business systems, and whether adequate business continuity provisions have been established.

Web-based application development considerations, and third-party reliance. As companies continue to migrate mission-critical business applications to the web and integrate web-based applications with back-end accounting systems, the technical sophistication necessary to effectively evaluate and test related internal controls has grown considerably. Companies employ dozens of different database and application development tools in building their websites. Insofar as these websites increasingly support critical financial operations that could have a material impact upon the company’s financial reporting processes, they represent a key point of concern.

When analyzing web-based application development, auditors should focus on the methodology the company is employing to monitor and regulate website development and maintenance. Are these activities being properly administered, tracked, and audited? Are web-based applications tested thoroughly prior to introduction? Are encryption standards implemented to protect sensitive data? Are adequate reconciliation procedures in place to ensure that online financial transactions are correctly recorded on a timely basis in the company’s back-end accounting systems? Are the underlying databases adequately secured to prevent unauthorized access and manipulation of data prior to their entry into the accounting system? Are any key third-party service providers or business partners utilized to support web-based business activities, and are their systems secure?

Paperless Financial Reporting Systems

Implementing real-time financial management and paperless reporting systems can dramatically enhance the efficiency of an enterprise’s operations. While helping make companies more nimble, the increasing adoption of these technologies has robbed auditors of ready access to the paper trails that have traditionally supported their analysis and testing of internal controls.

To successfully analyze IT controls surrounding dynamic systems and paperless environments, auditors must acclimate themselves to specialized data extraction and analysis tools and work directly with the live data that reside on these systems. Walk-throughs of financial reporting functions will require a detailed understanding of the underlying databases, scripts, applications, and electronic reports generated by these systems. Auditors must also analyze the automated internal control procedures that have been programmed into these applications to perform data integrity checks, including exception handling, error tracking, and reconciliation functions, as well as the e-mail and intranet-based workflow automation processes utilized to streamline financial reporting.

While by no means exhaustive, these illustration issues identify various general IT controls that could have a material impact on financial statements. It is necessary to have a clear understanding of the relationship between these IT general controls and the financial processes they support within the organization’s overall framework of internal control.


Sid M. Edelstein, CPA, is a principal and director of IT services at Cornick, Garber & Sandler, LLP, New York, N.Y. He would like to thank Malcolm Schwartz, one of COSO’s original authors, for his review and comments.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 



The CPA Journal is broadly recognized as an outstanding, technical-refereed publication aimed at public practitioners, management, educators, and other accounting professionals. It is edited by CPAs for CPAs. Our goal is to provide CPAs and other accounting professionals with the information and news to enable them to be successful accountants, managers, and executives in today's practice environments.

©2009 The New York State Society of CPAs. Legal Notices

 

Visit the new cpajournal.com.