04 October 2016

Risk and Internal Audit - beyond Three Lines of Defense



1 Introduction

The Three Lines of Defence model (TLD, 3LoD, etc) is a model that sets out to (i) provide a framework for the provision of assurance within a company, (ii) provide regulators with a model they can recommend companies implement, and (iii) that they can assess when reviewing regulated companies. It is the simplicity of the model and the risk of the introduction of silo mentalities that seems to draw much concern from the Risk Management profession. Yet it is also the simplicity of the model that enables companies to implement it.

This article is focused on the relationship between two elements of the Three Lines; Risk Management (in theory 2nd line) and Internal Audit (the 3rd line). These two lines of defence provide Directors, the Board, shareholders and stakeholders with confidence that the system of internal controls is functioning effectively, that risks are being identified and managed, and where appropriate, accepted or assumed deliberately.

As a reminder, operational management is considered the 1st line of defence, in that it is operational management that runs the business, including the internal controls that manage risk and opportunity in the business.

However, a more accurate and measured interpretation of the TLD model shows all three lines (Operational Management; Risk Management (and Compliance); and Internal Audit) all provide elements of assurance, with each supporting the other two to ensure that the assurance provided can be relied upon. Where any of the three lines fail to perform their specific responsibilities, the overall level of assurance that can be provided is reduced, regardless of the quality of the other two lines.

We call it the TLD, but a more appropriate model may be the Three Elements of Assurance, which doesn't sound nearly as interesting.

2 Three Lines of Defence

The first thing to remember about the Three Lines of Defence (TLD) model is that it is not a model for a complete Governance structure. It is a model for the management of risk and provision of assurance and comfort to the Executive, Board and shareholders (and appropriate stakeholders). As such, the TLD fits within an overall set of governance functions and structures, and has the specific purpose of ensuring appropriate focus on, and management of risks and controls.

The three lines are generally considered to be Operational Management (1st line), Risk Management and Compliance (2nd line) and Internal Audit (3rd line). Without operational management, the company, any company, would not accomplish its basic functions, and therefore may assume unacceptable risks when providing services and products to customers. Operational management, through operating the business in line with the objectives and constraints of the Board, provides the returns to the shareholders, within the regulatory and legal constraints on the business. Operational Management also ensures controls function effectively and efficiently, and demonstrates that processes are functioning in a manner consistent with achievement of objectives.

The implementation and operation of the TLD is not "the" governance system, but is an element within an overall governance framework. Some organisations explicitly limit the number of functions considered part of "2nd line" to Risk Management and Compliance, while others include a range of operational support functions such as HR, Finance, IT, etc. Personally I consider these functions to be part of "first line" as they are operational functions supporting the direct activities of the enterprise.

The Bank of International Settlements (BIS), in their 2012 guidance on Internal Audit (http://www.bis.org/publ/bcbs223.pdf), includes Risk Management, Compliance, Legal, HR, Finance, Operations and Technology in the 2nd line. Equally, the IIA (Institute of Internal Auditors) not surprisingly included a wide range of business activities in the 2nd line, while reserving the third line for Internal Audit only.

The BIS, in their 2015 guidance on Corporate Governance (http://www.bis.org/bcbs/publ/d328.pdf), has a slightly updated discussion of the TLD model:

"The increased focus on risk and the supporting governance framework includes identifying the responsibilities of different parts of the organisation for addressing and managing risk. Often referred to as the “three lines of defence”, each of the three lines has an important role to play. The business line – the first line of defence – has “ownership” of risk, whereby it acknowledges and manages the risk that it incurs in conducting its activities.  The  risk  management  function  is  responsible  for  further  identifying, measuring,  monitoring  and  reporting  risk  on  an  enterprise-wide  basis  as  part of  the  second  line  of  defence,  independently  from  the  first  line  of  defence.  The  compliance  function  is  also  deemed  part  of the  2nd line  of  defence.  The  internal  audit  function  is  charged  with  the  3rd line  of  defence, conducting risk-based and general audits and reviews to provide assurance to the board that the overall governance  framework,   including  the  risk  governance  framework,   is  effective  and  that  policies  and processes are in place and consistently applied."

This latest BIS guidance is clear in setting out the three lines. Like any model, if inflexibly adhered to, TLD can oversimplify and result in silos, in which there is an assumption that only IA is able to provide assurance to the Board and Audit Committee; this in a time when regulators and professional associations are increasingly calling for separate Risk Committees or, failing that, a joint Audit and Risk Committee. In the evolving models and expectations of regulators, Risk Management has a critical role in providing assurance at the Board level.

In summary, the TLD model provides an effective mechanism for the allocation of responsibility for the operation of controls, the assessment of the overall risk and control environment, and allocation of responsibility for the detailed review of specific high risk areas of the control environment. While there is a risk of silos reducing the ability of the first and second to provide assurance, the model is "simple" enough to allow for easy communication and allocation of responsibilities and ownership of operation and assurance over the system of internal controls. Regular communication of the concept also ensures that operational management is aware of and able to enunciate the TLD principles.

Regulators and professional bodies agree; Internal Audit and Risk Management need to be separate, and only in exceptional cases, or where the business is too small to afford both, should they be combined. In cases where they are combined, additional oversight by the Board is important. Both functions are and need to be independent of management, yet as highlighted above, they fulfil very different aspects of provision of assurance.

3 Should Risk be pan-enterprise

There is an old adage: Risk Managers do not manage risk, Risk Managers create the environment that enables the identification, assessment, management and reporting on risks across the enterprise. One of the key elements of that statement is "across the enterprise". Risk Management must, like Internal Audit, have free and unrestricted access across the enterprise in order to form and maintain a consolidated picture of the risk environment, and to ensure that management is aware of their responsibilities for implementation and operation of that control environment. (Of course Risk Management has many other responsibilities, and I recommend you dig deeper into the BIS governance guidance document).

Yet here the difference between RM and IA comes to the fore; RM works with management to identify, assess, respond and monitor the risk environment. RM does not perform deep-dive reviews of individual controls or events (unless specifically requested or if part of the management of a specific transactions and activities, in which case RM, for these activities, becomes an element of operational management).

The identification and recording / assessment of risks then assumes the identification of controls associated with that risk. Of course, there may be no controls in place to manage the risk, in which case there should be a record of the gap in the system of controls, and the control gaps should be documented, with responsibility allocated for implementing controls, based on and in agreement with the own or the associated risk.

Controls do not exist in a void. Without a business objective and risks to the achievement of that objective, there is no need for a control. Such "controls" are actually a drag on the effective and efficient performance of business operations to achieve objectives. Therefore, if there is a control, then there is a risk, and the risk only exists in relation to the ability of the business to achieve objectives.

Logically then, identification of a risk universe begins with the objectives of the business or function being controlled, at whatever level of granularity, and from those objectives, risks to the achievement of the objective can be identified. Of course, people will identify risks without a specific linkage in mind. It is part of the role of Risk Management to assist in the assessment of the risk, including how that risk may impact of achievement of objectives.

The role of Risk Management in relation to individual controls and the control environment is to ensure that management performs periodic assessments of the effectiveness of the controls they are responsible for, and provides attestation that the controls are functioning effectively. Where the controls are not functioning, or there are gaps in the system of controls, management must identify these missing controls, and through the Risk Management process, confirm the status of implementing such controls.

Risk Management challenges management's assertions on the effectiveness of the controls over risks. Management operates the controls, and attests to the effectiveness of the controls. Internal Audit tests management’s assertions at a detailed level.

4 The Scope of Internal Audit

To be effective, Internal Audit must have unrestricted access across the enterprise, yet should work to a risk-based programme of internal audits and reviews. There is a natural tension between the desire to provide Internal Audit coverage across all business processes, systems and departments, and the recognition that Internal Audit is a cost overhead that must be carefully applied. The nature of Internal Audit activity is to confirm through investigation that the stated control environment is in place, and that controls are functioning to the level of effectiveness attested by management. This means that Internal Audit by nature must dig deeper in to the strategic and operational functioning of the specific areas subject to individual audits.

This can be expensive, and therefore IA resources need to be carefully targeted and used to best effect. Equally, as the audience for Internal Audit's reports and ultimately for the level of assurance provided is the Board and Audit Committee, Internal Audit activity should be focused only on those areas (process, system or department) whose controls or the failure of the controls may have a material impact on the ability of the business to achieve strategic objectives.

What this means in practice is that Internal Audit must be cognisant of, and monitor risk and control status across the enterprise, but that actual Internal Audit activity should be focused on areas of greatest risk. In addition, specialist resources to perform internal audits of technical areas are expensive to retain on staff, and therefore tend to be brought in for the specific audit.

In summary this means that where Internal Audit is performing a controls based audit (as opposed to an E&E, Strategic or Operational audit), they tend to perform deep yet narrow reviews of higher risk areas. Where controls have previously been identified and management has attested to the effectiveness of the functioning of the controls, Internal Audit can use the Risk Register and associated controls reporting to inform audit planning and performance.

5 The Relationship between Internal Audit and Risk Management planning

The objective of IA planning is to ensure that the highest risk areas within the enterprise and within any individual auditable area are covered by audit review and testing. To accomplish this, frequently IA will review the Risk Register for the area(s) that will be reviewed. The Risk Register should inform audit planning, but should not be the primary resource.

This means that IA needs to interact with Risk Management and the Risk Register three times in the audit cycle: (i) at development of the IA Strategic and Annual Plan, (ii) at the planning stage of each audit, and (iii) post audit confirming that the auditee has updated the Risk Register to reflect findings (risks) and control recommendations. The following chart provides an overview of the IA planning processes, and the key interactions with Risk and the Risk Register.
 

In planning an audit, Internal Audit needs to consider the range of business processes, systems and departments that are included in the specific review. These should be risk assessed and ranked, with the primary focus of audit testing and review being focused on the higher risk areas. At this point it is important to note that risk assessment is not only "likelihood & impact" but extend well beyond, to include factors such as sensitivity of data, value at risk or exposure, as well as other factors.

Note the continual use of the word "risk" in planning and execution of the audit. The question could be asked, why aren't all the risks that IA will be considering already included in the Risk Register? The simple answer is that audit planning is considering a far more granular level of risks at the detailed business process level, while the Risk Register may have a risk or risks that encompass a wider range of detailed business processes within a single risk.

Certainly the major controls should be included in the Risk Register and be associated with individual risks. Again, a Risk to a business objective may have a number of Controls in place to manage that Risk within the Risk Appetite of the enterprise, as set by the Board. Yet the development and evolution of the specific Risk within the Risk Register may omit or fail to include all controls applicable to the Risk. In such a case, if IA places too much reliance on the Risk Register, there is the danger that the full control environment will not be understood, and that key processes and controls will be missed or discounted. This could undermine the value of the audit, and open the results to dispute by not taking into account compensating or other existing controls.


6 IA findings in a Risk world

There should be a link between IA findings and recommendations, and the overall risk environment of the enterprise, and therefore Risk Management. Working backwards, there cannot be an IA recommendation if there is not an associated risk. The failure of a control to function, or a lack of evidence of the functioning of the control does not in itself mean that there is a risk. It could simply mean that the control is redundant, or the evidence previously provided or assumed to be required is not adequate to demonstrate that the control is effective or even required. It can be difficult for an enterprise to get the right balance of under-controlled (and thereby exposed to greater risk than is the Risk Appetite of the enterprise) or over-controlled (and thereby incurring excessive costs of control for limited economic benefit through reduced exposure).

Therefore, when auditing internal controls, generally IA findings should not exist if there is no associated risk. This means that the structure and content of the IA finding needs to clearly enunciate the risk or risks associated with that finding, and the potential impact if the required or recommended controls are not functioning, or not put in place. It is also critical that the auditee recognises and agrees with the description of the description and the resulting situation of risk. Without this agreement, there can be no agreement to the required controls. Failure to gain buy-in to the underlying enunciation of the situation and the risk undermines IA, the auditor, and can result in unnecessary conflict between IA and business units.

Having buy-in to the description of the situation and associated risk(s) does not automatically presuppose that the IA recommendation is the most appropriate response to the risk(s) highlighted by the auditor. Management understands, or should understand, their business objectives and constraints. Therefore management should in theory be best positioned to confirm what controls will be most effective, and to agree to apply the resources required to implement an effective control. IA can and should use best judgement to consider if management's response is appropriate, and if so should be willing to alter the recommendations to meet what management suggests.

The recommendation that is almost always missing from audit reports is one that should be common to all Audits; that the risks, controls and remediation actions identified in the audit should be cross referenced to the Risk Register and the Risk Register updated to reflect the findings of the audit. Where the Risk and Controls are included in the Risk Register, these should be updated based on the audit findings. Where the Risk does not exist, it should be added. Where the Control is not included against a Risk, it should be added.

By taking this final step, IA ensures that the overall risk environment and system of internal controls is updated to reflect the actual current situation.

7 Linkages, and a model

Through the Risk Management and Internal Audit processes, we can build a consolidated picture of the risk environment and system of internal controls. Assurance is provided to Senior Management, the Board, shareholders and key stakeholders. Risk Management ensure a holistic view of the risk and control environment, while Internal Audit provides comfort, through detailed testing, that management's assertions of the effectiveness of the control environment are accurate, and provides guidance on where remediation activity is required.

The TLD model, if narrowly applied as per the IIA's interpretation, assumes all assurance is provided by Internal Audit. This is a narrow view that does not adequately consider the assurance roles that are provided by 2nd and 1st lines in their daily activities.

A more accurate and measured interpretation of the TLD model shows all three lines (Operational Management, Risk Management (and Compliance), Internal Audit) providing assurance, with each supporting the other two to ensure that the assurance provided can be relied upon. Where any of the three lines fail to perform their specific responsibilities, the overall level of assurance that can be provided is reduced, regardless of the quality of the other two lines.

Management's responsibility is to operate controls that exist to manage identified and recorded risks, efficiently and effectively. Risk Management's responsibility is to ensure that risks are identified and assessed, that the risk environment and system of internal controls is defined, that risks and their associated controls are recorded and monitored, and that management provides attestation or assertions on the effectiveness of those controls. Internal Audit provides a ‘final line of defence’ by performing detailed reviews to confirm the effective functioning of control. None is responsible for catching the others out, or "owning" the provision of assurance.

Internal Audit cannot be everywhere or see the entire risk environment - internal and external. Risk Management cannot retain a systemic view of risk if it engages in detailed controls testing, and managers can provide assurance only over those controls for which they are individually responsibility for ensuring are functioning.

We call it the TLD even through a more appropriate model may be the Three Elements of Assurance, but that doesn't sound nearly as interesting.



No comments:

Post a Comment