Database Reference
In-Depth Information
The following map is created to identify the top risks with all impacted
business processes based on the organization's tolerance for risk as indentified
by the management:
Low
probability
High
Verifying controls
InFission Compliance PMO facilitates manage control verification by preparing
a control self-assessment survey with specific questions regarding key controls.
The key controls are determined by reviewing the results for risk rating, financial
statements, and control documentations which include:
• Key Process List by Location
• Account-Process Matrix
• Risks-Control Matrix
• IT General Computer Controls and Application Matrix
The Compliance PMO selects the key controls to be included in the control self-
assessment survey by selecting the internal controls, which mitigate risk with high
likelihood and impact using the input from the risk assessment, shown as follows:
Monitor
Controls
Key
Controls
Accept
Monitor
Risks
Risks
 
Search WWH ::




Custom Search