Inbound 5872272296509149284
Inbound 5872272296509149284
1.1 Introduction
● Defined as a systematic process of objectively obtaining and evaluating evidence regarding the
efficiency, effectiveness, and economy of operations.
● Emphasis on performance improvement and value addition.
● Not bound to financial data only; evaluates any operational activity.
● Combines traditional audit techniques with business analysis and consultancy.
Core Characteristics:
● A risk-based approach assesses where the greatest potential harm or failure may occur.
● High-risk areas (e.g., data breaches, supply chain failure) receive more audit focus.
● Steps:
1. Risk Identification – known and emerging risks.
2. Risk Prioritization – based on likelihood and impact.
3. Audit Planning – designed around risk severity.
● Ensures efficiency and effectiveness in audit execution.
● Auditors identify:
○ Process inefficiencies
○ Fraud risk indicators
○ Weak internal controls
○ Poor decision-making structures
● Includes internal and external sources:
○ Internal: poor documentation, unclear roles, tech lags.
○ External: economic shifts, supply disruptions, cyber threats.
2.1 Introduction
● Determine:
○ How well resources are used (efficiency).
○ If objectives are achieved (effectiveness).
○ If cost control exists (economy).
● Secondary objectives:
○ Ensure policies and procedures are followed.
○ Evaluate risk management and internal control systems.
○ Enhance strategic alignment and accountability.
2.4 Planning
● Includes:
○ Defining audit universe and selecting target area.
○ Understanding process flows and key players.
○ Establishing audit criteria and methods.
● Use interviews, walkthroughs, and documentation review.
● Identify Critical Success Factors (CSFs) – activities essential for goal achievement.
● Audit focuses on whether these CSFs are:
○ Present
○ Working as intended
○ Supported by controls
● Identify:
○ Process-level risks (e.g., manual approvals).
○ Strategic risks (e.g., market shifts).
○ External risks (e.g., regulations).
● Evaluate likelihood and impact.
2.5 Fieldwork
● Interviews, surveys.
● Assess understanding and intent of personnel.
2.6.4 Recalculation/Reperformance
2.6.7 Flowcharts
● Must be:
○ Neat
○ Indexed
○ Referable to findings
○ Reviewed and signed off
2.7 Reporting
● Communicates:
○ What was found
○ Why it matters
○ What should be done
● Includes:
○ Executive summary
○ Detailed findings
○ Management responses
○ Action plan
2.8 Follow-Up
● Confirm:
○ Recommendations were implemented.
○ Changes have had desired impact.
● Follow-up may include mini-audits or interviews.
2.8.1 Metrics
● Track:
○ Implementation rates
○ Performance changes post-audit
○ Control maturity
○ Audit turnaround time
3.1 Introduction
● Sources:
○ Industry trends
○ Past incidents
○ Stakeholder concerns
○ Control breakdowns
3.3 Measurement of Risks
● Examples:
○ Sales – overpromising, revenue recognition.
○ Procurement – vendor fraud, contract risks.
○ IT – data breaches, downtime.
○ HR – turnover, succession planning.
● Each requires customized risk identification.