Auditor Dashboard
Complete Compliance Analysis & Audit Opinion
Provide comprehensive audit findings, assess compliance impact across frameworks, evaluate remediation recommendations, and generate audit reports for stakeholders.
- Critical Issues - All control failures with complete context
- Compliance Impact - Which frameworks affected and control status
- Risk Assessment - Business, compliance, and audit risk scores
- Remediation Plan - AI-recommended solutions with owners and deadlines
Phase 1: Audit Findings - Control Failures
Goal: Review all identified control failures with complete context, severity assessment, and supporting evidence. Establish the baseline for your audit opinion on IT General Controls.
340 Control Failures - Complete Audit Coverage
All Evidence Documented for Committee Review
- Phase 1 (Evidence): 340 control failures documented with SOX, ISO 27001, and ITIL compliance mappings
- Phase 2 (Investigation): Deep-dive into root causes and patterns - identify if these are systemic control breakdowns or isolated incidents
- Phase 3 (Impact Assessment): Evaluate material weakness classifications against the three frameworks and determine audit opinion (qualified vs. unqualified)
- Phase 4 (Remediation Verification): Assess adequacy of management's remediation plans - are they sufficient to address root causes and timeline realistic?
Phase 2: Investigation & Analysis
Manager & AuditorGoal: Dig deeper into each issue to understand scope, root causes, and patterns. See the details that explain why these control failures occurred.
Control Failure Categories - Evidence Summary
Click "View Details" to see SOX violation evidence and assess for material weakness disclosure.
Click "View Details" to see ISO 27001 evidence and segregation of duties risk assessment.
Click "View Details" to see ITIL control effectiveness evidence and service delivery impact assessment.
Click "View Details" to review audit trail completeness and identify evidence gaps for audit opinion support.
Click "View Details" to assess adequacy of management's remediation plans and root cause resolution.
Click "View Details" to review the material weakness assessment across all control areas and framework implications.
AI Risk Intelligence Agent
Analysis Configuration
Phase 3: Impact Assessment
Auditor OnlyGoal: Understand the business and compliance impact of these issues. See which frameworks are affected, which controls failed, and how they rank in terms of risk.
Regulatory & Framework Compliance
ITIL v4 Process Compliance
ISO 27001 Security Controls
SOX IT General Controls
IT General Controls (ITGC) Testing Matrix
Management Assessment of Internal Controls over Financial Reporting
Access to Programs and Data
Logical access controls, user provisioning, segregation of duties
Access to financial applications requires documented approval from data owner
Access removed within 24 hours of employee termination
Quarterly review of admin/privileged access to financial systems
Conflicting access combinations reviewed and remediated quarterly
Program Change Management
Change authorization, testing, approval, and implementation controls
All changes to financial systems require CAB approval before deployment
Business owner sign-off required before production deployment
Developers cannot migrate changes to production
Computer Operations
Job scheduling, incident management, data backup and recovery
P1 incidents affecting financial systems resolved within 4 hours
Daily backup of financial databases with weekly restore testing
Program Development
System development lifecycle, testing standards, documentation
All new development follows documented SDLC methodology
Management's Assessment of Internal Control
Based on the assessment performed, management has identified the following material weaknesses in internal control over financial reporting as of December 31, 2024:
- Access Control Weakness: Terminated employee access was not removed timely from 45 of 50 sampled terminations, representing a 90% exception rate.
- Change Management Weakness: 23 changes to financial applications were deployed without required CAB approval, representing 51% of sampled changes.
- Incident Response Weakness: 47 of 60 sampled P1 incidents affecting financial systems exceeded the 4-hour resolution SLA.
These material weaknesses existed as of December 31, 2024. Management is implementing remediation plans with target completion by Q1 2025.
Risk & Control Self-Assessment (RCSA)
IT Risk Assessment Matrix
Inherent vs Residual Risk after Controls
Unauthorized System Access
Unauthorized Changes to Production
Data Loss / Corruption
Service Unavailability
Risk Heat Map - Systems vs Categories
| System / Category | SLA Breach | Recurring | Access | Change | Docs | Total Risk |
|---|---|---|---|---|---|---|
| Yardi Property Mgmt | 89 | 156 | 12 | 5 | 45 | 307 |
| Oracle Financials | 34 | 28 | 24 | 18 | 23 | 127 |
| Active Directory | 18 | 45 | 32 | 8 | 12 | 115 |
| Email Exchange | 23 | 15 | 6 | 4 | 18 | 66 |
| VPN Gateway | 28 | 19 | 8 | 3 | 7 | 65 |
Risk Trend (6 Months)
Finding Distribution
Audit Findings - Evidence from Database
| Finding ID | Category | Description | Severity | Framework | Evidence | Action |
|---|---|---|---|---|---|---|
| AUD-001 | SLA Breach |
Critical P1 SLA breaches exceeding threshold
What This Means: 47 P1 (critical priority) tickets breached the 4-hour resolution Service Level Agreement. Average breach time: 6.2 hours (156% over SLA). This indicates systematic gaps in incident response capability, particularly during evening/weekend hours (8PM-8AM). Business Impact:
Root Cause: Only 2 L2 incident managers covering 24/7 schedule (should be 3-4). Evening shift (6PM-6AM) has only 1 person. No escalation procedure when queue exceeds 3 incidents. How To Fix (30-day action plan):
Owner & Timeline: VP Infrastructure (Decision maker) + L2 Manager (Executor). Decision needed this week. New hire by Jan 20. Full resolution by Feb 28. |
Critical | ITIL SLA.01 | ||
| AUD-002 | Recurring |
Yardi authentication failures - systemic root cause not addressed
What This Means: The same authentication error (Token Refresh Failure: Code ERR_TOKEN_EXPIRED) has occurred 156 times over 90 days. Each time it's fixed temporarily (token restarted), but the root cause is never addressed. This is a CRITICAL problem management failure - Problem MGMT controls are broken. Business Impact:
Root Cause Analysis: Yardi API token expires every 24 hours but refresh mechanism doesn't auto-renew properly. Restart clears error for 24h, but underlying code bug in token lifecycle isn't fixed. Problem originally reported Aug 2024 but never escalated for permanent fix. How To Fix (45-day action plan):
Owner & Timeline: Yardi System Owner (Decision) + Database Team (Executor). Root cause analysis required by Jan 12. Fix deployed by Jan 25. Closed by Feb 15. |
Critical | ITIL PRB.02 | ||
| AUD-003 | Change Mgmt |
Emergency changes without CAB approval or documentation
What This Means: 23 changes marked as "Emergency" were deployed directly to production without going through the Change Advisory Board (CAB) review process. This bypasses approval controls. 8 of these affected financial systems (Oracle FICO, GL), 12 affected infrastructure (networking, databases). Only 5 had documented approval (email from manager - not formal). This is a CRITICAL control failure. Business Impact:
Root Cause: CAB process requires 5 days lead time. Teams use "Emergency" label to bypass this. VP Operations allows verbal approval. No automated control preventing emergency changes. No audit trail enforcement. How To Fix (60-day action plan):
Owner & Timeline: Chief Infrastructure Officer (Decision maker) + Change Manager (Executor). Must remediate within 30 days (audit expectation). Full control effectiveness by Day 60. Requires board-level sign-off on remediation timeline. |
High | ISO A.12.1.2 | ||
| AUD-004 | Access Control |
Privileged access granted without documented business justification
What This Means: 24 admin/privileged access requests to financial systems were approved in the last 90 days without proper authorization documentation. Most had only IT manager approval (no business owner sign-off). Only 6 of 24 had documented business justification. No evidence of segregation of duty reviews. This violates SOX IT General Controls requirements. Business Impact:
Root Cause: Access request form doesn't require business owner approval, only IT manager. No supervisor verification in workflow. IT automates approval based on template. No periodic access reviews to remove unnecessary privileges. How To Fix (45-day action plan):
Owner & Timeline: Chief Security Officer (Decision) + Identity Management Team (Executor). Critical remediation due by Feb 15 for SOX audit. Quarterly reviews must start by March 31. |
High | SOX ITGC.AC.01 | ||
| AUD-005 | Documentation |
Incomplete incident documentation affecting audit trail
What This Means: 312 of 1,115 tickets (28%) were closed without proper documentation. Specifically: 189 missing resolution notes, 156 missing root cause analysis, 98 missing workaround details. These gaps break the incident management audit trail and prevent knowledge reuse (causing repeated incidents). Violates ITIL INC.01 control requirements. Business Impact:
Root Cause: Closing tickets is rush process - staff wants to mark "done" and move to next ticket. Incident management tool doesn't require resolution notes (fields are optional). Managers don't enforce documentation. No audit of documentation completeness before ticket closure. How To Fix (30-day action plan):
Owner & Timeline: Incident Manager (Decision maker) + IT Support Manager (Executor) + System Admin (technical changes). Documentation requirement must go live by Jan 20 (15 days). Retroactive work by Jan 27. Ongoing monitoring starts Feb 1. |
Medium | ITIL INC.01 | ||
| AUD-006 | Escalation |
Management escalation delays impacting business operations
What This Means: 89 tickets that required urgent escalation to management were delayed by an average of 18 hours from when the escalation request was made. Root cause: The escalation procedure is not documented clearly for night shift (6PM-8AM). L1 support team doesn't know who to call when manager is offline. Violates ITIL INC.05 escalation requirements. Business Impact:
Root Cause: Escalation process not documented for off-hours. Only day shift manager knows procedure. Night shift staff have no escalation runbook. On-call rotation exists but nobody knows how to trigger it. No automated escalation email/SMS sent when escalation is requested. How To Fix (20-day action plan):
Owner & Timeline: IT Operations Manager (Escalation procedure owner) + System Admin (automation setup). Escalation runbook due by Jan 18. Automated SMS/email by Jan 22. Training done by Jan 25. Monitoring ongoing weekly. |
High | ITIL INC.05 |
AI-Generated Remediation Recommendations
Powered by GPT-4Implement Proactive SLA Monitoring & Auto-Escalation
Deploy real-time SLA tracking with automated alerts at 50%, 75%, 90% thresholds. Auto-escalate to Team Lead at 90% and Manager at 100%.
Enforce Change Advisory Board Workflow
Implement mandatory CAB approval gates in ServiceNow. Emergency changes require documented justification and post-implementation review within 48 hours.
Root Cause Analysis Automation for Recurring Issues
Configure AI-powered pattern detection to automatically create Problem tickets when issues recur 3+ times. Link to knowledge base for permanent solutions.
Phase 4: Solution & Action
Auditor OnlyGoal: Create your remediation action plan. See AI-recommended solutions, assign owners, set deadlines, and communicate findings to stakeholders. Transform findings into actionable fixes.
Action Center - Take Immediate Action
One-Click ActionsGenerate Audit Report
Create comprehensive PDF report with all findings, evidence, and recommendations for management review.
Schedule Risk Review Meeting
Auto-create calendar invite with key stakeholders and pre-populated agenda based on current findings.
Create Remediation Tasks
Automatically create ServiceNow tasks for all critical findings with assigned owners and due dates.
Email Executive Summary
Send one-page executive summary to IT Director and CIO with risk scorecard and key action items.
Export All Data to Excel
Download complete findings, evidence tickets, compliance scores, and trends in Excel format.
Configure Risk Alerts
Set up automated alerts when risk thresholds are exceeded or new critical findings are detected.
Evidence Details
| Ticket ID | Created | Priority | Description | SLA Status | Resolution |
|---|