3 Understanding of The Entity and Its Environment
3 Understanding of The Entity and Its Environment
CHAPTER 3 FINAL
AUDIT OF FINANCIAL STATEMENTS, AUDIT OF PREDETERMINED OBJECTIVES AND
COMPLIANCE AUDIT
UNDERSTANDING OF THE ENTITY AND ITS ENVIRONMENT
A. ACTIVITY CONTEXT
1. This audit activity deals with the requirements and guidance to obtain the necessary
knowledge of the entity at an overall level. Obtaining this understanding will as far as possible
be coordinated and integrated for all three types of audits (audit of financial statements, audit
of predetermined objectives and compliance audit) that are performed simultaneously as a
single overall engagement for a particular auditee during a particular audit cycle.
2. The compliance audit (and in certain instances as described in chapters 1 and 2, the audit of
predetermined objectives) is a limited assurance engagement and, as such, its scope is
substantially less than a reasonable assurance engagement in relation to the nature and depth
of understanding of the entity and its environment, and the nature and extent of procedures
performed to respond to risks of material non-compliance (or risks of material misstatement
(RMM) in the case of the audit of predetermined objectives).
3. The nature and characteristics of the subject matter and subject matter information and what
could cause it to be misstated are the same irrespective of whether the engagement is a
reasonable or a limited assurance engagement. The difference lies in the level of assurance
that is achievable, since the procedures performed in a limited assurance engagement vary in
nature and timing from, and are less in extent than for, a reasonable assurance engagement.
The auditor obtains an understanding of the same aspects and matters as relevant for a
reasonable assurance engagement, but in the context of the objectives and scope of a limited
assurance engagement.
4. The objective of the auditor in terms of this chapter is to obtain an understanding of the entity
at an overall level to:
• Determine the terms of engagement.
• Form an audit strategy.
• Provide the auditor with input to determine materiality.
• Provide the basis for identifying risk factors and RMM (in the audit of financial statements
and the audit of predetermined objectives performed as reasonable assurance
engagements).
• Identify areas where material misstatement or material non-compliance is likely to arise (as
applicable to the audit of predetermined objectives and the compliance audit, respectively,
performed as limited assurance engagements).
5. Obtaining an understanding of the entity’s internal control relevant to the audit, which includes
internal control at entity and business process levels, is addressed in chapters 7.1, 7.2, 7.3
and 7.4.
6. A more detailed understanding of the entity and its environment is obtained by way of
performing risk assessment procedures as described in chapters 11, 12, 13, 14.1 and 14.2,
which relate to a number of specific consideration circumstances / items (addressed in
individual International Standards on Auditing (ISAs) and in International Standard on
Assurance Engagement (ISAE) 3000) that affect the identification of risk factors.
7. Identifying risk factors through an understanding of the entity and its environment provides the
basis for the identification and assessment of RMM as discussed in chapters 8.1 and 8,2for
reasonable assurance engagements. (For limited assurance engagements, chapter 8.3 and
8.4 addresses identifying areas where material misstatement or material non-compliance is
likely to arise).
B. REQUIREMENTS
• Requirements of ISAs and ISAEs, as applicable to the type of the engagement, are MANDATORY – the
requirements that the auditor shall comply with to achieve the overall objectives of the particular assurance
engagement. These requirements are indicated in bold in the Source column of the tables.
• There is no specific ISAE for assurance engagements on reported information about performance against
predetermined objectives or compliance assurance engagements. Therefore, only ISAE 3000 is applicable. All
‘3000’ references in the tables are to ISAE 3000 issued in December 2013 and applicable for all audits with
year-ends beginning after 15 December 2015.
• Requirements from other engagement standards selected for use and/or requirements ‘deduced’ from identified
standards and/or the auditing principles in the International Standards of Supreme Audit Institutions (ISSAIs) are
SUPPLEMENTARY and have been included to contribute to an adequate evidence-gathering process. The
supplementary requirements are indicated in { } brackets in the Source column of the tables.
8. Table of requirements
Source The auditor shall …
500.6 Design and perform audit procedures (which include risk assessment procedures and further
audit procedures) that are appropriate in the circumstances for the purpose of obtaining
sufficient appropriate audit evidence.
300.9(a) Develop an audit plan that shall include a description of the nature, timing and extent of
planned risk assessment procedures, as determined under ISA 315 (Revised).
315.5 Perform risk assessment procedures to provide a basis for the identification and assessment of
315.6 RMM at the financial statement and assertion levels. Risk assessment procedures by
themselves, however, do not provide sufficient appropriate audit evidence on which to base the
audit opinion. Risk assessment procedures shall include:
Inquiries of management, of appropriate individuals within the internal audit function (if the
function exists), and of others within the entity who in the auditor’s judgement may have
information that is likely to assist in identifying RMM due to fraud or error.
Analytical procedures.
Observation and inspection.
315.7 Consider whether information obtained from the auditor’s client acceptance or continuance
process is relevant to identifying RMM.
315.8 If applicable, consider whether information obtained from other engagements performed for the
entity is relevant to identifying RMM.
315.9 Where the auditor intends to use information obtained from the auditor’s previous experience
with the entity and from audit procedures performed in previous audits, determine whether
changes have occurred since the previous audit that may affect its relevance to the current
audit.
315.11 Obtain an understanding of the following:
Relevant industry, regulatory, and other external factors including the applicable financial
reporting framework.
The nature of the entity to enable an understanding of the classes of transactions,
account balances and disclosures to be expected in the financial statements. Relevant
matters include the entity’s operations, its ownership and governance structures, types of
investments (including investments in special-purpose entities), how it is structured and
how it is financed.
The entity’s selection and application of accounting policies, including the reasons for
changes thereto (including an evaluation of its appropriateness in the context of the
entity’s business, relevant industry and the applicable financial reporting framework).
The entity’s objectives and strategies, and those related business risks that may result in
RMM.
The measurement and review of the entity’s financial performance.
315.23 If the entity has an internal audit function, obtain an understanding of the nature of the internal
audit function’s responsibilities, its organisational status, and the activities performed, or to be
performed.
250.12 As part of obtaining an understanding of the entity and its environment in accordance with
250.13 ISA 315 (Revised), obtain a general understanding of the legal and regulatory framework
250.14 applicable to the entity and the industry or sector in which the entity operates and how the
entity is complying with that framework.
Par. A7 suggests that to obtain a general understanding, the auditor may, for example:
Use the auditor’s existing understanding of the entity’s industry, regulatory and other
external factors.
Update the understanding of those laws and regulations that directly determine the
9. Table of requirements
Source The auditor shall …
ISAE 3000 and other
{ISSAI 100.45} [Should] obtain an understanding of the nature of the entity / programme to be audited.
[This includes understanding the relevant objectives, operations, regulatory environment, internal
controls, financial and other systems and business processes, and researching the potential
sources of audit evidence. Knowledge can be obtained from regular interaction with
management, TCwG and other relevant stakeholders. This may mean consulting experts and
examining documents (including earlier studies and other sources) to gain a broad
understanding of the subject matter to be audited and its context.]
{ISSAI 100.46} [Should] conduct a risk assessment or problem analysis and revise this as necessary in
response to the audit findings.
[This can be achieved through procedures that serve to obtain an understanding of the entity or
programme and its environment, including the relevant internal controls. Such understanding
provides the basis for the identification and assessment of RMM.]
3000.46R For a reasonable assurance engagement
Obtain an understanding of the underlying subject matter and other engagement circumstances
sufficient to enable the [auditor] to identify and assess RMM in the subject matter information,
and, thereby, provide a basis for designing and performing procedures to respond to the
assessed risks and to obtain reasonable assurance to support the [auditor’s] conclusion.
[Understanding the way the entity manages and reports its performance.]
{NZS.24} Consider the entity’s audit history, including recent audit reports and reports to management or
TCwG in relation to matters affecting the entity’s non-financial performance report.
Identified requirements from the ISAs (supplementary to the requirements above). Any reference to ‘financial
statements’ or ‘financial reporting’ or the context of ‘financial’ or ‘accounting’ considerations was adapted and
interpreted to suit the context of an audit of predetermined objectives. Updated terminology is indicated in
italics.
{315.5} Perform risk assessment procedures to provide a basis for the identification and assessment of
{315.6} RMM at the annual performance report and selected programme / objectives / development
priority levels. Risk assessment procedures by themselves, however, do not provide sufficient
appropriate audit evidence on which to base the audit opinion. Risk assessment procedures
shall include:
Inquiries of management, of appropriate individuals within the internal audit function (if the
c. Compliance audit
Audit of compliance with identified provisions of legislation for selected compliance
subject matters / focus areas
[This includes understanding the relevant objectives, operations, regulatory environment, internal
[This can be achieved through procedures that serve to obtain an understanding of the entity or
programme and its environment, including the relevant internal controls.]
3000.46L Obtain an understanding of the underlying subject matter and other engagement circumstances
sufficient to:
Enable the [auditor] to identify areas where a material misstatement of the subject matter
information is likely to arise.
Thereby, provide a basis for designing and performing procedures to address the areas
identified, above, and to obtain limited assurance to support the [auditor’s] conclusion.
{SAE 3100.29} Plan a compliance engagement so that it will be performed effectively.
{SAE 3100.31} Obtain an understanding of the entity and its compliance system, the applicable requirements,
suitable criteria and other relevant engagement circumstances, sufficient to identify and assess
the risks of the entity’s non-compliance with the applicable requirements, and sufficient to design
and perform further evidence-gathering procedures.
[The auditor’s focus is on identifying risk factors that could indicate risks that the entity is, or may
be, materially non-compliant with the applicable requirements.]
{ISSAI 400.52} [Should] understand the audited entity in light of the authorities governing it.
[The authorities that govern the entity (as it applies to each compliance subject matter)
determine the criteria for testing of compliance. The auditor’s understanding of the structure and
operations of the audited entity and its procedures for achieving compliance provides the basis
to determine materiality and identify risks of non-compliance.]
3000.45(a) Make inquiries of the appropriate party(ies) whether they have knowledge of any actual,
suspected or alleged intentional misstatement or non-compliance with laws and regulations
affecting the subject matter information.
{ISSAI 100.47} [Should] identify and assess the risks of fraud relevant to the audit objectives, including making
inquiries and performing procedures to identify and respond to the risks of fraud relevant to the
audit objectives.
3000.45(b) Make inquiries of the appropriate party(ies) whether the responsible party has an internal audit
function and, if so, make further inquiries to obtain an understanding of the activities and main
findings of the internal audit function with respect to the subject matter information.
3000.45(c) Make inquiries of the appropriate party(ies) whether the responsible party has used any experts
in the preparation of the subject matter information.
a. Introduction – identifying risk factors through an understanding of the entity and its
environment
12. The auditor obtains an understanding of the following through inquiries, analytical procedures,
observation and inspection:
• Key aspects of the entity and its environment (refer to subsection c)
• Specific consideration circumstances / items relevant to the audit (refer to subsection g
as well as chapters 11, 12, 13, 14.1 and 14.2)
• The auditee’s internal control (refer to chapters 7.1, 7.2, 7.3 and 7.4)
13. Information about the auditee is gathered and documented to form part of a permanent audit
file. Certain information that had previously been documented (during the prior period
engagement) may be used in the current year audit and is confirmed with the auditee to
ensure that the information is up to date.
14. The auditor obtains an understanding of the auditee to identify risk factors that provide the
basis for the identification and assessment of RMM.
15. Risks are what can go wrong in terms of:
• The financial statements as a whole and the individual financial statement items (classes of
transactions, account balances and disclosures) at the assertion level.
• The reported information in the annual performance report for each selected programme /
objective / development priority as a whole and the individual performance measures /
indicators and their related targets at the assertion level.
• The auditee’s compliance with respect to each selected compliance subject matter / focus
area as measured or evaluated in terms of the selected compliance requirements / criteria
for each focus area.
16. Risk factors are those conditions and events (or causes) that may indicate:
• The existence of RMM in the financial statements and annual performance report.
• The existence of risks of material non-compliance.
Risk factors are any attribute, characteristic, condition or exposure of the auditee’s
environment and circumstances (auditee facts or issues) that increases the likelihood of
something occurring, i.e. it increases risk. They indicate what and how the subject matter
information (e.g. the financial statements) may be misstated. They are the indicators of risk.
The auditor considers various causes of risk in the circumstances of the auditee. Such causes
represent the aspects of the entity and its environment about which the auditor is required to
obtain an understanding.
17. Obtaining an understanding of the auditee and its environment is not a discrete, one-off step;
rather it is a continuous and dynamic process of gathering, updating and analysing information
throughout the three types of audits. The understanding establishes a frame of reference
within which the auditor plans the audit and exercises professional judgement throughout the
audit.
18. Therefore, the auditor considers whether the results of procedures performed during the audit
of financial statements and the audit of predetermined objectives indicate areas where
material non-compliance is likely to arise, or even specific matters that cause the auditor to
believe that there may be material instances of non-compliance.
19. Similarly, the auditor considers whether the results of procedures performed during the
compliance audit indicate previously unidentified RMM of the financial statements or of the
reported performance information for the selected programmes / objectives / development
priorities.
20. Obtaining an understanding assists the auditor in determining how assertions may be used to
consider RMM in terms of the audit of the financial statements and the audit of predetermined
objectives. (Linking identified risk factors to what can go wrong at the assertion level is
addressed in further detail in chapters 8.1,8.2 and 8.3.) For the compliance audit, there is one
overall assertion, namely ‘compliance’. Although TCwG do not make an explicit statement
regarding compliance, there is an inherent / implicit assertion that the entity has conducted its
business and operations ‘in compliance with’. This single overall compliance assertion finds
application in the detailed requirements that are used as criteria for the engagement (refer to
chapter 8.4).
events are relevant to every audit engagement and the list of examples is not necessarily
complete.
Nature of the auditee and its operations
• Operations in regions that are economically unstable, e.g. countries with significant
currency devaluation or highly inflationary economies.
• Operations exposed to volatile markets, e.g. futures trading.
• Operations that are subject to a high degree of complex regulation.
• Changes in the industry in which the entity operates.
• Developing or offering new products or services, or moving into new lines of business.
• Expanding into new locations.
• Changes in the entity, such as large acquisitions, reorganisations or other unusual events.
• Entities or business segments likely to be sold or transferred (transfer of functions).
• Privatisations.
• Major changes to existing programmes.
• New legislation and regulations or directives.
• Political decisions, such as the relocation of operations.
• Programmes without sufficient allocated resources and funding.
• Increased public expectations.
• Procurement of goods and services in certain industries, such as defence.
• Outsourcing of government activities.
• Operations subject to special investigations.
• Changes in political leadership.
• Indications of waste or abuse.
• Inquiries into the entity’s operations or financial results by regulatory or government
bodies.
Financing activities
• New financing sources.
• Budget overspending due to weak budgetary controls.
• Constraints on the availability of government funding and credit.
• Higher than normal expectations to meet budget.
Financial reporting
• Existence of complex alliances and joint ventures.
• Use of complex financing arrangements.
• Significant transactions with related parties.
• Lack of personnel with appropriate accounting and financial reporting skills.
• Changes in key personnel, including the departure of key executives.
• Deficiencies in internal control, especially those not addressed by management.
• Incentives for management and employees to engage in fraudulent financial reporting.
• Past misstatements, history of errors or a significant amount of adjustments at period end.
10
• Questions regarding the competence and ethical behaviour of staff with responsibilities
pertaining to compliance as well as the supervision and monitoring of others.
• High vacancy rate that can result in a lack of segregation of duties and that may leave
gaps in the processes and procedures to be followed to ensure compliance.
• Indications of, or evidence that there may be, collusive behaviour in certain key areas.
• Identified areas of political focus, visibility and sensitivity.
• Identified areas of particular public interest.
• Strained working relationship between the political and the administrative management
function.
• Relevant legislation from which compliance requirements / criteria have been identified is
relatively new, or not well established.
• Different interpretations exist (inside or outside the entity) on what compliance means or
entails with respect to certain compliance requirements / criteria, or indications that
legislation is not clearly understood and applied.
• Indications that management or others within the entity rely on disproportionate levels of
rationalisation to explain why or how certain transactions, events or actions actually
comply with relevant legislation (compliance is not always obvious and clearly observable;
rather further explanation is required).
• Execution of a transaction, event or action is subject to significant application of
judgement (questions whether such judgement is applied with the intentions behind the
relevant legislation).
• Previous audit findings – identified instances of non-compliance, fraud, unlawful acts,
unethical behaviour, management bias, etc.
• Lack of adequate response by management to address findings from previous audits, or
to implement recommendations and improvements.
• Inspections or investigations conducted by regulatory authorities or other enforcement or
oversight bodies.
11
• The knowledge gained and results of the work conducted in the scoping of the audit of
predetermined objectives (part of pre-engagement activities and agreeing the terms of
engagement – also refer to chapter 2). This includes an understanding of:
o The individual programmes / objectives / development priorities that were selected
and how they were selected (application of scoping criteria and decision rules in the
circumstances of the auditee).
o The elements of each selected programme / objective / development priority, namely
the performance measures / indicators and their related targets.
o The prescribed PMRF used by management and TCwG for the preparation of the
performance information by programme / objective / development priority as
presented in the annual performance report.
• The knowledge gained and results of the work conducted in the scoping of the compliance
audit (part of pre-engagement activities and agreeing the terms of engagement – also
refer to chapter 2). This includes an understanding of:
o The individual compliance subject matters / focus areas selected for inclusion as part
of the assurance engagement, e.g. procurement and contract management, budgets,
transfer of funds, and revenue management.
o For each compliance subject matter / focus area, the specific provisions of legislation
selected as the compliance requirements / criteria for the assurance engagement and
that will be used to measure or evaluate the auditee’s compliance.
• Other engagements performed for the auditee, if applicable. These may include any
discretionary engagements such as performance audits, investigations, special audits and
audit-related services.
• Previous experience with the auditee and the audit procedures performed in previous
audits. This includes an understanding of:
o Past misstatements (their size and nature, cause and circumstances) in the audit of
financial statements and in the audit of predetermined objectives with a distinction
between misstatements that had been corrected and misstatements that had not
been corrected, as well as material and non-material misstatements.
o With respect to the compliance audit, past instances of non-compliance and how
non-compliance occurred, with a distinction between material and non-material
instances of non-compliance.
o The nature of the entity and its environment and the entity’s internal control, including
deficiencies in internal controls (across all three types of audits).
o Significant changes that the entity or its operations may have undergone since the
prior reporting period.
• Discussions among the engagement team pertaining to (also refer to chapter 6):
o The susceptibility of the financial statements to material misstatement, and the
application of the applicable financial reporting framework to the auditee’s facts and
circumstances.
o The susceptibility to material misstatement of the auditee’s performance information
as presented in the annual performance report for the selected programmes /
objectives / development priorities, and the application of the prescribed PMRF to the
auditee’s performance facts and circumstances.
o The susceptibility of the auditee’s business and operations to material
non-compliance in the context of the individual compliance subject matters / focus
areas scoped into the audit, and the application in the circumstances of the entity of
those specific provisions of legislation selected as the compliance requirements /
criteria for the engagement.
12
• Meetings held within the Auditor-General of South Africa (AGSA) to identify transversal
risks: within a specific sector (industry) or a specific type of entity (e.g. metro); or generally
for a specific audit cycle.
• Information from portfolio committee meetings or standing committee on public accounts
(SCoPA) resolutions.
30. Inquiry procedures may include, for example, inquiries with the following (which is not an
exhaustive list):
At a minimum
• Management and those responsible for financial reporting, performance management and
reporting as well as the auditee’s compliance with legislation.
• TCwG.
• The internal audit function.
• In-house legal counsel.
As applicable in the circumstances
• Information and communication systems personnel.
• Other employees with different levels of authority.
• Other employees not directly involved in accounting and financial reporting processes,
performance management and reporting processes or the entity’s compliance systems
and processes.
• Organisations or bodies external to the entity (e.g. an oversight body or regulatory body).
• External legal counsel.
• Experts.
31. Analytical procedures performed as risk assessment procedures include the identification of
unusual transactions, events or occurrences; comparing the budget with actual results; and
the calculation of ratios and trends to identify matters that have audit implications.
32. Observation and inspection procedures focus firstly on the subject matter information as
presented by the auditee (i.e. the financial statements and the reported performance
information for selected programmes / objectives / development priorities) and the records,
information, systems and processes that underlie the reported information. For the compliance
audit, similar focus is on the documentation and records maintained by the auditee that
support its compliance, including any significant interpretations made or applied with respect to
the meaning of compliance in the circumstances. In addition, observation and inspection
procedures may relate to any aspect of the auditee’s operations, premises and facilities; any
documents, records, manuals, policies and procedures; minutes of meetings and other records
of proceedings; any internally prepared reports (including in-year management records and
reports); any information or reports from external sources; readily available or accessible
information relating to the auditee’s financial statements, performance information and
compliance, its industry and/or its operations; as well as laws and regulations (this is not an
exhaustive list).
33. The information systems auditor assists with performing risk assessment procedures to obtain
an understanding of the auditee’s IT environment and related controls, and to identify related
risk factors and RMM. The nature and extent of the involvement of the information systems
auditor are determined for each audit based on specific criteria taking cognisance of any
guidance that may have been issued at firm level.
• It is important that there is sufficient contact and interaction with the information systems
auditor from the initial planning of the audit, and through the evidence-gathering process,
to ensure that the audit engagement team has sufficient understanding of how the auditee
13
has responded to risks arising from IT, and to ensure that the related further procedures
provide sufficient appropriate audit evidence.
• The information systems auditor possesses special skills and knowledge pertaining to
information systems and processing, general IT controls and application controls. The
information systems auditor participates in, and is an integral part of, the planning
activities, including discussions among the engagement team.
• Risk assessment procedures that focus on IT will address the following:
o Information about the entity’s IT environment and application systems – refer to
subsection c.
o General IT controls as part of understanding internal control at entity level – refer to
section C.a of chapters 7.1, 7.2, 7.3 and 7.4.
o Automated application controls as part of understanding internal control at business
process level – refer to section C.b of chapters 7.1, 7.2, 7.3 and 7.4.
34. The auditor may have occasion to involve fraud specialists in performing risk assessment
procedures pertaining to the engagement team’s understanding of certain circumstances,
events, transactions or occurrences with the focus on identifying fraud risk factors and related
RMM due to fraud (or non-compliance, as applicable). Fraud specialists possess special
knowledge and skills relating to investigations involving the identification, follow-up and
interrogation of information about fraud or that may indicate that fraud could have occurred.
Refer to subsection e for further guidance.
14
• The budget / expenditure structure (also linked to appropriations, budgets and actual
expenses).
• Governance structures of the auditee, including internal audit functions, audit committees,
etc.
• For prior year misstatements, whether they were resolved or remained uncorrected, and
whether they were material, including any corrective actions taken in the current year, if
applicable, and whether management is aware of any misstatements, or events or
circumstances that may contribute to misstatements in the current year.
• Significant changes at the auditee from the previous reporting period.
External factors
41. The auditor obtains an understanding of external factors affecting the entity by reviewing, for
example, the following (which is not an exhaustive list):
• Media coverage, investigations, litigation and claims.
• Resolutions of council and SCoPA as well as ministerial directives.
• Publications by government, e.g. state of the nation address.
• General economic conditions, interest rates, availability of financing, inflation and currency
revaluations.
15
43. Linked to objectives and strategies is a general understanding of the business risks facing the
entity. Although ‘business risk’ is broader than the RMM of the financial statements and of
reported performance information, an understanding of the business risks increases the
likelihood of identifying RMM, since most business risks will eventually have financial and
performance consequences. However, the auditor does not have a responsibility to identify or
assess all business risks.
44. One of the components of internal control is the risk assessment process established by
management, with oversight by TCwG, for purposes of identifying and responding to business
risks. Refer to chapters 7.1, 7.2, 7.3 and 7.4 that address, among other, the components of
internal control.
16
• Many small to medium-sized entities would fit this description. Due to the scope of the
minimum IT procedures for this level – limited in number and nature (inquiry and
observation) – it is possible that these IT procedures would not require the assistance of
an information systems auditor .
Level 2 – medium risk
• This is the middle of the spectrum.
• Generally speaking, these entities would have more than one server associated with
financial reporting and/or performance information, more than one network operating
system or a non-standard one, more workstations than level 1 but fewer than about 30 in
total, possibly some customisation of the application software (or relatively complex
configuration of commercial off-the-shelf applications, e.g. mid-size enterprise resource
planning), medium reliance on IT for key controls over financial and/or performance
information or several manual controls, updates and maintenance on the system is
performed centrally on site or through vendors, a few to moderate number of emerging or
advanced technologies, and few online / e-commerce transactions.
• This level would require an information systems auditor to design and/or perform the
necessary IT procedures that address the risk and the level of control reliance to be
placed on financial and/or performance information systems.
Level 3 – high risk
• This is the high end of the spectrum.
• These entities would have more than two servers associated with financial reporting
and/or performance information, have remote locations, have generally more than
30 workstations associated with financial reporting, use enterprise resource planning or
write custom software, perform centralised updates and maintenance on the system and
distribute these to decentralised sites or through onsite vendors, employ a large number
of emerging or advanced technologies, and possibly have a large number of online /
e-commerce transactions. The entities would also rely heavily on IT for key controls over
financial and/or performance information.
• An entity running transversal systems would also fall into this category. Information
systems for which certain IT processes are managed centrally, but which are used by
various auditees who have limited responsibility regarding the design and enhancement of
the system, will be classified as high risk at a national level.
• Information systems auditors will perform IT audit procedures that address the risk and
the level of control reliance to be placed on the financial and/or performance information
systems.
47. The level of sophistication at an auditee will be the first consideration when deciding on the
need for an information systems auditor. During the second level of assessment, the extent
and nature of procedures to be performed will be determined, as well as the responsibility for
performing the audit procedures, the engagement risk, and the planned approach. These
matters will determine the ultimate classification of the auditee and the extent and nature of
the work to be performed on the IT general controls (refer to chapter 7.1).
48. An information systems auditor is someone with the necessary skills and experience to audit
IT general controls. Adequate skills is seen as being qualified in an IT area of expertise, such
as a certified information systems auditor or a certified information systems manager, or
having network and security qualifications, such as a certified information systems security
professional. To be able to obtain these certifications, certain knowledge and experience
needed to have been obtained and are therefore seen as the minimum requirements for an
information systems auditor.
49. Once the entity’s IT sophistication and resulting level of risk have been determined, a deeper
understanding of the IT environment needs to be obtained. For entities that have been
17
assessed as a level 1 (low-risk) auditee, a lower level of understanding will be required than
for a level 2 (medium-risk) or a level 3 (high-risk) auditee.
50. The following figure indicates the information that needs to be obtained for a level 1 auditee,
the additional information that will be obtained for a level 2 auditee as well as the further
information that will be required for a level 3 auditee:
51. Refer to chapters 7.1, 7.2, 7.3 and 7.4 for further guidance on obtaining an understanding of
IT general controls and the effect of IT at the business process level.
18
o How and when the auditee will adopt requirements of financial reporting standards
and legislation that are new.
• Consideration of disclosures to assist the auditor in giving appropriate attention to, and
planning adequate time for, addressing disclosures. This consideration may assist the
auditor to determine the effects on the audit of:
o Significant new or revised disclosures required as a result of changes in the entity’s
environment, financial condition or activities.
o Significant new or revised disclosures arising from changes in the applicable financial
reporting framework.
o The need for the involvement of an auditor’s expert to assist with the audit procedures
related to particular disclosures.
o Matters relating to disclosures that the auditor may wish to discuss with TCwG.
• Identification of the business processes within which events and transactions are initiated
and executed, and information is captured, processed and reported, for financial reporting
purposes. Individual financial statement items are linked to one or more business
processes. Refer to chapter 7.1 that address, among other, the auditor’s understanding of
internal control at the business process level.
19
20
21
73. Inquiries of ‘others’ within the entity could specifically include entity personnel working directly
within the accounting and financial reporting processes, performance management and
reporting processes or the processes pertaining to the selected compliance focus areas (at
different levels of responsibility), as well as the entity’s compliance and regulation officer (or
other similar position) and the entity’s in-house legal counsel.
The compliance audit: focus on the compliance requirements / criteria for the subject matters /
focus areas scoped into the audit
74. The compliance subject matters / focus areas and the compliance requirements / criteria for
each are predetermined with a distinction between different categories of auditees in terms of
different legislation that may apply to different types of public sector entities (which forms part
of the scoping of the audit as discussed in chapter 2).
75. Standard audit programs have been designed that summarise the predetermined compliance
requirements / criteria for each compliance focus area, and provide additional guidance, as
applicable, in terms of what compliance with each requirement means, or what it entails for the
auditee to comply with that requirement.
76. The auditor ensures that there is sufficient understanding within the engagement team of not
only the compliance focus areas applicable to the auditee, but also of the detailed compliance
requirements / criteria themselves (using the relevant standard audit programs applicable to
the particular auditee and the compliance subject matters / focus areas scoped into the audit).
This facilitates the auditor’s consideration of how non-compliance may occur.
77. Furthermore, the auditor considers how the entity ensures compliance with legislation; that is,
the policies, systems and procedures established to ensure compliance with applicable
legislation as well as compliant conduct by the entity’s officers, employees and, where
appropriate, third parties. This is part of the entity’s internal control to ensure achievement of
its compliance objectives. Refer to chapter 7.4 that address the auditor’s understanding of
internal control.
78. Although inquiries and other initial procedures are important to obtain the required level of
understanding, the auditor’s conclusions about the auditee’s compliance must be based on
evidence obtained through tests of compliance. The auditor’s measurement or evaluation of
the auditee’s compliance is dependent on sufficient understanding of the detailed compliance
requirements / criteria for each selected compliance subject matter / focus area.
79. Any non-compliance already identified during the planning stage will be followed up and
corroborated by performing additional procedures to address the specific matters concerned. If
the further evidence confirms an instance of non-compliance, it will be accumulated with all
other instances of non-compliance identified during the evidence-gathering process and
evaluated to determine the effect on the auditor’s conclusion in the assurance report.
22
82. In the context of an audit of predetermined objectives, the auditor is in particular concerned
with the possibility of fraudulent reporting of performance information, such as:
• Intentional misstatements, including omissions or manipulation of reported performance
information or disclosures to deceive the users of the annual performance reports.
• Intentional misstatements in reporting the degree to which the entity has actually
performed / delivered against planned targets.
• The credibility of reported actual results compared to what was expected.
83. The auditor also considers the possibility of risks of material non-compliance due to fraud (i.e.
intentional actions or inaction, as opposed to unintentional actions or inaction, or actions or
inaction in error). Fraud in compliance auditing relates mainly to the abuse of public authority,
but also to fraudulent reporting on compliance issues. [ISSAI 400.55] Instances of
non-compliance with authorities may constitute the deliberate misuse of public authority for
improper benefit, and may relate to decisions, non-decisions, preparatory work, advice,
information handling and other acts in the public service.
84. The consideration of fraud requires a general mindset and alertness throughout the audit
[ISA 240.12-15].
• The auditor maintains professional scepticism throughout the audit, recognising the
possibility that a material misstatement due to fraud could exist, notwithstanding the
auditor’s past experience of the honesty and integrity of the entity’s management and
TCwG.
Note: While the auditor cannot be expected to disregard past experience with
management and TCwG, a belief that they are honest and have integrity does not relieve
the auditor of the need to maintain professional scepticism, including considering that
there may have been changes in circumstances. [ISA 200.A22; ISA 240.A8;
ISAE 3000.A80]
• Unless the auditor has reason to believe the contrary, the auditor may accept records and
documents as genuine. If conditions identified during the audit cause the auditor to believe
that a document may not be authentic or that terms in a document have been modified but
not disclosed to the auditor, the auditor investigates further. [ISA 200.A21; ISA 240.13
& .A9; ISAE 3000.A79]
• Where responses to inquiries of management or TCwG are inconsistent, the auditor
investigates the inconsistencies.
• Discussions among the engagement team place particular emphasis on how and where
the entity’s financial statements or reported performance information may be susceptible
to material misstatement due to fraud, including how fraud might occur.
85. During the process of obtaining an understanding of the entity and its environment, the auditor
is alert to risk factors that may indicate RMM due to fraud. Fraud risk factors are events or
conditions that indicate an incentive or pressure to commit fraud or provide an opportunity to
commit fraud. [ISA 240.11(b)]
86. The auditor’s risk assessment procedures include inquiries of management regarding their:
• Assessment of the risk that the financial statements and reported performance information
may be materially misstated due to fraud, including the nature, extent and frequency of
such assessments.
• Process for identifying and responding to the risks of fraud, including any specific risks of
fraud that management has identified or that have been brought to its attention, or
financial statement items (classes of transactions, account balances or disclosures) or
performance measures / indicators and their related targets for which a risk of fraud is
likely to exist.
23
• Communication, if any, to TCwG regarding its processes for identifying and responding to
the risks of fraud in the entity.
• Communication, if any, to employees regarding its views on business practices and
ethical behaviour.
87. The auditor further makes inquiries of management, TCwG and others within the entity, as
appropriate, to determine whether they have knowledge of any actual, suspected or alleged
fraud affecting the entity. Examples of others within the entity to whom the auditor may direct
inquiries about fraud include:
• Operating personnel not directly involved in the financial or performance reporting
processes.
• Employees with different levels of authority.
• Employees involved in initiating, processing or recording complex or unusual transactions
or events, and those who supervise or monitor such employees.
• In-house legal counsel.
• Chief ethics officer or equivalent person.
• Persons charged with dealing with allegations of fraud.
88. The auditor obtains an understanding of how TCwG exercise oversight of management’s
processes for identifying and responding to the risks of fraud and the internal control that
management has established to mitigate these risks. This understanding may be obtained in
different ways, including attending meetings where such discussions take place, reading the
minutes from such meetings, or making inquiries of TCwG.
89. If the entity has an internal audit function, the auditor inquiries of the internal audit function
whether it has knowledge of any actual, suspected or alleged fraud affecting the entity, and
obtain its views about the risks of fraud.
90. The auditor evaluates whether unusual or unexpected relationships identified in performing
analytical procedures may indicate RMM due to fraud.
91. Other information obtained about the entity and its environment may also assist in identifying
RMM or non-compliance due to fraud. This may include:
• Information obtained from the auditor’s client acceptance and retention processes.
• Experience gained on other engagements performed for the entity.
• Information pertaining to ongoing investigations or investigations that have been finalised,
including liaising with investigative authorities such as the Public Protector and the Special
Investigating Unit (prescribed processes must be followed in these instances).
• Information provided by the fraud specialist where requested to undertake a certain
investigation, or otherwise requested to assist the audit engagement team.
92. The auditor is alert during the planning process (and later throughout the audit when
performing procedures and obtaining and evaluating evidence) to information that may
indicate that it could be appropriate to involve a fraud specialist to assist with the identification
of fraud risk factors and related RMM due to fraud (as well as, if required in the circumstances,
designing and performing procedures in response to such risks).
93. In accordance with the criteria provided below, an engagement manager may decide to
involve a fraud specialist. A fraud specialist refers to an audit professional who:
• Has undergone relevant fraud training as determined by the AGSA.
• Has the necessary experience.
• Has competencies related to fraud identification and investigation.
24
94. A fraud specialist must be involved in the audit if there is a complex significant risk of fraud. A
complex significant risk of fraud exists if the majority of the following factors are present; or if
some of the following factors are present and the engagement manager deems those few
factors to be extremely significant to necessitate the involvement of a fraud specialist:
• Senior officials have been suspended on allegations of fraud.
• There is a known history of instances of fraud committed by management.
• During the current and/or previous financial years, there have been allegations of fraud
against management from external and/or internal parties.
• Management has failed to investigate alleged fraud and/or take action or remedy
instances of confirmed fraud reported in the prior year.
• The auditee is subject to ongoing fraud-related investigations or litigation, or the auditee
was subject to investigations of fraud by law-enforcement agencies in the current and/or
prior financial years.
• There has been an increase in irregular, unauthorised or fruitless and wasteful
expenditure since the prior year, resulting from weaknesses in procurement and contract
management or the utilisation of conditional grants.
95. Where the minimum criteria for involving a fraud specialist has been met (i.e. the majority of
the above criteria apply), the auditor must involve a fraud specialist when performing risk
assessment procedures during:
• Discussions among the engagement team.
• Inquiries of management, TCwG, the internal audit function and others within the entity.
• Assessment of fraud risk factors.
• Preliminary analytical review procedures.
• Documenting the identified alleged, suspected and known instances of fraud.
96. If the minimum criteria for involving a fraud specialist is not met, but the engagement manager
deems it necessary to engage a fraud specialist, it is up to the engagement manager to
determine in which stages of the audit or audit procedures the fraud specialist would be
involved.
97. The auditor evaluates whether the information obtained about the entity and its environment
(as per subsection c) and the results of the risk assessment procedures that focused on the
consideration of fraud (as discussed in this section) indicate that one or more fraud risk factors
are present.
98. Fraud risk factors may not necessarily indicate the existence of fraud, but they have often
been present in circumstances in which fraud has occurred and, therefore, may indicate
RMM or non-compliance due to fraud.
99. The determination of whether a fraud risk factor is present and whether it is to be considered
in assessing RMM of the financial statements and of the reported performance information
due to fraud requires the exercise of professional judgement. Refer to chapters 8.1,8.2 and
8.3.
100. Similarly, for a compliance audit, the determination of whether a fraud risk factor is present
and how the auditor proceeds to test for compliance in response to the fraud risk that has
been determined as an area where material non-compliance is likely to arise, requires
professional judgement.
101. Annexure A provides examples of fraud risk factors – risk factors relating to misstatements
arising from fraudulent financial reporting and from the misappropriation of assets (which
may also be adapted and interpreted to suit the context of the audit of predetermined
objectives and the compliance audit, as applicable).
25
f. Specific risk assessment procedures and related activities directed at the internal audit
function
102. If the auditee has an internal audit function, the auditor interacts with the internal audit
function as part of the process of obtaining an understanding of the auditee and identifying
risk factors and RMM. Furthermore, the auditor’s initial understanding and evaluation of the
internal audit function determine whether the audit engagement team could consider using
the work of the internal audit function, or using internal auditors to provide direct assistance
to the external auditor.
103. The auditor obtains the following information as part of engagement team’s initial review and
preliminary understanding of the auditee’s internal audit function:
• The function’s reporting structure.
• By whom the head of internal audit is appointed.
• Any restrictions that are placed on the internal audit function.
• The methodology used by the function (manuals, documents, systems, supervision, etc.).
• The members and their qualifications, experience and training interventions.
• The approved charter for the function and the annual audit plan.
104. If, based on the annual audit plan (i.e. the planned audits undertaken or the reports to be
issued), the auditor considers the possibility of using the work performed by the internal audit
function to modify the nature or timing, or reduce the extent, of the audit procedures directly
performed by the external audit engagement team, the relevant requirements of ISA 610
(Revised) must be satisfied. Refer to subsection g and chapter 12.
105. The auditor may further consider the possibility of using internal auditors to provide direct
assistance to the external audit engagement team, under the direction, supervision and
review of the external auditor. The relevant requirements of ISA 610 (Revised) must be
satisfied. Refer to subsection g and chapter 12.
26
concerned are complied with in so far as they relate to obtaining an understanding and
identifying risk factors and related RMM, or identifying areas where material misstatement or
material non-compliance is likely to arise, as applicable.
Circumstances / items that may be relevant to the audit of financial statements, the audit of
predetermined objectives or the compliance audit
• Accounting estimates in the case of the audit of financial statements, or performance
information estimates in the case of the audit of predetermined objectives.
• Related parties (could be relevant to the audit of financial statements or the compliance
audit).
• Using the work of internal auditors (refer to subsection f).
• Using the work of an auditor’s expert.
• Using the work of ‘others’, i.e. management’s expert or another auditor.
• Audit considerations relating to an entity using a service organisation.
• Audit of group reporting
Additional circumstances / items that may be relevant to the audit of financial statements (it is
not expected to be relevant to the audit of predetermined objectives or the compliance audit)
• Initial audit engagements – opening balances.
• Comparative information.
• Going concern.
• Specific considerations with respect to litigation and claims.
• Specific considerations with respect to inventory.
• Specific considerations with respect to segment information.
27
understanding of the value chain key activities are obtained from the related business
processes e.g. procurement and supply chain management, HR management, performance
indicators, etc.
115. Refer to Annexure A of chapter 2 for more detail on the matters to consider and the approach
to documenting the understanding.
28
• Identified or suspected non-compliance with legislation and the results of discussions with
management and, where applicable, TCwG.
• Any documentation of communications about fraud made to management, TCwG,
regulators and others.
29
125. In an audit of financial statements, the above also includes considering the effect of
uncorrected misstatements from the prior period, which is discussed in further detail in
chapters 15.1 and 18.1.
30
ANNEXURE A
EXAMPLES OF FRAUD RISK FACTORS
(refer to section Ce.)
The sources of these examples are ISA 240 and ISSAI 1240, which address the consideration of
fraud in an audit of financial statements. These risk factors may also be adapted and interpreted to
suit the context of the audit of predetermined objectives and the compliance audit, as applicable.
1. The following are examples of risk factors relating to misstatements arising from fraudulent
financial reporting.
• Financial stability or profitability is threatened by political, economic, budget, industry, or
entity operating conditions, such as (or as indicated by):
o High degree of competition or market saturation, accompanied by declining margins.
o High vulnerability to rapid changes, such as changes in technology, product
obsolescence, or interest rates.
o Significant declines in customer demand and increasing business failures in either the
industry or overall economy.
o Operating losses making the threat of bankruptcy, foreclosure, or hostile takeover
imminent.
o Recurring negative cash flows from operations or an inability to generate cash flows
from operations while reporting earnings and earnings growth.
o New accounting, statutory, or regulatory requirements.
o Weak budgetary controls.
o Privatizations.
o New programs.
o Major changes to existing programs.
o New financing sources.
o New legislation and regulations or directives.
o Political decisions such as relocation of operations.
o Programs without sufficient allocated resources and funding.
o Procurement of goods and services in certain industries such as defence.
o Outsourcing of government activities.
o Operations subject to special investigations.
o Changes in political leadership.
o Public and private partnerships.
• Excessive pressure exists for management to meet the requirements or expectations of
third parties or those charged with governance due to the following:
o Need to obtain additional debt financing to stay competitive – including financing of
major research and development or capital expenditures.
o Marginal ability to meet debt repayment or other debt covenant requirements.
o Perceived or real adverse effects of reporting poor financial results on significant
pending transactions, such as contract awards.
o Increased public expectations.
31
32
2. The following are examples of risk factors relating to misstatements arising from
misappropriation of assets.
• Personal financial obligations may create pressure on management or employees with
access to cash or other assets susceptible to theft to misappropriate those assets.
• Adverse relationships between the entity and employees with access to cash or other
assets susceptible to theft may motivate those employees to misappropriate those assets.
• For example, adverse relationships may be created by the following:
o Known or anticipated future employee layoffs.
33
34
o Lack of timely and appropriate documentation of transactions, for example, credits for
merchandise returns.
o Lack of mandatory vacations for employees performing key control functions.
o Inadequate management understanding of information technology, which enables
information technology employees to perpetrate a misappropriation.
o Inadequate access controls over automated records, including controls over and
review of computer systems event logs.
o Disregard for the need for monitoring or reducing risks related to misappropriations of
assets.
o Disregard for internal control over misappropriation of assets by overriding existing
controls or by failing to take appropriate remedial action on known deficiencies in
internal control.
o Behaviour indicating displeasure or dissatisfaction with the entity or its treatment of
the employee.
o Changes in behaviour or lifestyle that may indicate assets have been
misappropriated.
o Tolerance of petty theft.
o Public sector officials make no distinction between personal and government
transactions, e.g. misuse of government credit cards;
o The belief by certain public sector officials that their level of authority justifies a
lifestyle similar to private sector executives, when their agreed terms of compensation
are not sufficient for such a lifestyle;
o Tolerance of unacceptable behaviour in situations where it may be difficult to dismiss
or replace employees.
35