Operations Auditing - Chapter 3
Operations Auditing - Chapter 3
The theory of constraints adopts the common idiom “a chain is only as strong as its
weakest link.” This means that organizations, programs, processes, and even departments are
vulnerable because the weakest element can always damage, break, or at the very least
adversely affect the outcome.
There are many types of risks, ranging from strategic, operational, compliance, reporting,
and
IT related. Risk and CSAs are an effective mechanism to involve those who have ownership for
risks and controls in the organization. By documenting processes, participants, and influencing
variables, management can be better prepared to allocate resources appropriately, set priorities,
establish accountabilities, and institute monitoring procedures.
Operational Changes
• Technological Advances
• Globalization
• Outsourcing (domestic and offshore)
• Complexities in financial markets
• Demographics shifts
Internal Auditors are uniquely positioned to help management and their boards of directors,
and advocate for other stakeholders that don’t have direct access to daily business events, but
whose interests must be protected as well.
A risk assessment is the process of identifying, measuring, and analyzing risks relevant
to a program or process. This assessment is systematic, iterative, and subject to both
quantitative and qualitative inputs and factors.
A key aspect of any risk assessment is the identification of the relevant risks. This
takes the form
of a list of risks.
Type Description
Measurement of Risks
After risks have been identified, they must be measured. The measurement process can
be either subjective or quantitative, and either driven by facts or not.
Subjective measures are driven by the participants’ experience and intuition about the
risks involved.
Quantitative measures are data-driven (impact and likelihood of risk in form of
measurement).
The conduct of a risk assessment means that we should look for weaknesses, sometimes
referred to as vulnerabilities, that would make an asset susceptible to damage or loss from the
hazard. Vulnerability is the “degree to which people, property, resources, systems, and
cultural, economic, environmental, and social activity is susceptible to harm, degradation, or
destruction on being exposed to a hostile agent or factor.”
Events can have either a positive or negative impact representing risks and opportunities. These
developments should be incorporated into the objective setting process and risk assessment.
Common-risk checking. Use a prefabricated list of common risks in your industry or area of
scope. This technique is explained in more detail below.
Risk charting. Combination of above approaches consists of listing resources at risk and the
threats to those resources. Identify the risk factors and the consequences.
The Federal Emergency Management Agency provides the Mapping Information Platform
and the Risk MAP (Mapping, Assessment, and Planning) to help organizations by delivering data
that increases public awareness and leads to action to reduce the risk to property and life.*
The US Geological Service (USGS) has a great deal of seismic information to help
organizations identify their vulnerabilities from fault lines, and incident history as a possible
gauge to future activity through probability analysis based on location, time span, and radius
from a designated location.
Environmental Protection Agency (EPA) provides information and assistance regarding
harmful effects to human health or to ecological systems caused by exposure to any physical,
chemical, or biological entity that can result in an adverse response (called stressors).
Risk Mitigation
A strategy to prepare for and lessen the effects of threats faced by a business.
Comparable to risk reduction, risk mitigation takes steps to reduce the negative effects of
threats and disasters on business continuity.
Control Self-Assessments (CSAs) help bridge this gap by requiring process owners to
complete questionnaires and forms that identify major activities, objectives, risks, controls, key
personnel, and challenges within their areas. This process encourages managers to evaluate the
design and effectiveness of their controls.