Organizational Structure, Authority, and Responsibility
To meet the organizational structure, authority, and responsibility requirement, you must document who owns which objectives and controls, how they report, and what decision rights they have, with active board oversight. Operationalize it by approving an org structure and RACI, aligning policies and control ownership to that structure, and keeping evidence that it works in practice (not just on paper). (COSO IC-IF (2013))
Key takeaways:
- You need clear reporting lines plus explicit authority and responsibility for objectives, risks, and controls, with board oversight. (COSO IC-IF (2013))
- Auditors look for decision rights that match risk, and for independence where required (for example, control testing and issue validation).
- The fastest path is an org chart + RACI + delegation of authority matrix, tied to control ownership and committee minutes.
“Organizational Structure, Authority, and Responsibility” is a control-environment requirement that becomes an exam finding when no one can answer basic questions: Who owns this risk? Who approved this exception? Who can sign the contract? Who is accountable for control performance and for fixing control failures?
This requirement is less about “having an org chart” and more about proving that your operating model supports internal control: decision rights sit with the right roles, escalation paths exist and are used, and the board oversees the structure management put in place. If your third-party program is involved, this is where you show who can onboard a third party, accept residual risk, approve due diligence exceptions, and terminate relationships.
The practical goal for a Compliance Officer, CCO, or GRC lead is speed: define roles and reporting lines, assign authority and responsibility to named functions (and, where needed, specific titles), connect that structure to your policies, committees, and control library, then retain evidence that governance decisions actually happen through those channels.
Regulatory text
Regulatory excerpt: “Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives.” (COSO IC-IF (2013))
Operator interpretation: You must be able to show (1) a defined organizational structure, (2) clear reporting lines, and (3) documented authority and responsibility assignments that support your objectives and internal control, with the board exercising oversight of that design. (COSO IC-IF (2013))
What an auditor is really testing: whether your governance model prevents gaps (no owner), conflicts (self-approval), and bottlenecks (everything escalates to one person), and whether the board can evidence oversight of the structure and key delegations. (COSO IC-IF (2013))
Plain-English interpretation (what the requirement demands)
You need a governance blueprint that answers four questions without ambiguity:
- Who decides? Document decision rights (approve, reject, accept risk, grant exceptions).
- Who does the work? Assign responsibility for execution (due diligence, monitoring, control operation).
- Who is accountable for outcomes? Name accountable owners for objectives and controls (not generic teams).
- Who checks? Establish reporting lines and independence so testing, monitoring, and issue validation are credible.
If you cannot connect authority to responsibility, you get predictable failure modes: teams inherit tasks without authority to enforce, risk acceptance happens informally, and control breakdowns linger because escalation paths are unclear.
Who it applies to (entity and operational context)
This applies to any organization using the COSO Internal Control – Integrated Framework for internal control design, assessment, or assurance discussions, including management teams and internal audit functions. (COSO IC-IF (2013))
Operationally, it matters most where the organization:
- Has regulated or audited operations and must show governance over internal control design and performance
- Relies on committees (risk, compliance, information security, third-party risk) to approve decisions
- Delegates authority to business units (procurement, product, sales) while expecting centralized oversight
- Manages third-party relationships where approvals, exceptions, and ongoing monitoring require clear decision rights
What you actually need to do (step-by-step)
1) Define the “objective map” you are governing
Start with a short list of your core objectives that internal control supports (financial reporting, operational resilience, compliance obligations, third-party risk outcomes). Then map each objective to accountable executives.
Deliverable: Objective-to-owner map (1 page).
Quality bar: Each objective has exactly one accountable owner, with named backup/delegate.
2) Establish and approve the organizational structure and reporting lines
Create an org chart that reflects reality, not aspirational reporting. Include dotted-line reporting where it affects oversight (for example, compliance embedded in the business but reporting functionally to the CCO). Ensure committee structures appear in the governance model.
Minimum scope: Board/committee oversight, executive leadership, compliance, risk, internal audit, information security, procurement/third-party management, and key business units that own material controls.
Evidence expectation: Board or board committee minutes showing oversight of the structure. (COSO IC-IF (2013))
3) Build a RACI for material processes and controls
For each material process (third-party onboarding, payment approvals, access provisioning, incident response, complaint handling), identify:
- R (Responsible): executes the task
- A (Accountable): owns the outcome and approves key decisions
- C (Consulted): must provide input before decision
- I (Informed): must be notified
Keep the RACI tied to your control inventory. If you maintain a control library, add fields for control owner, operator role, tester, and approver.
Common “fast fail”: assigning “Accountable” to a committee. A committee can approve; accountability should still sit with a role/title.
4) Document authority via a delegation of authority (DoA) matrix
Your DoA should cover decisions that drive control outcomes, such as:
- Contract signature thresholds (including third-party contracts)
- Risk acceptance and exception approvals (due diligence exceptions, policy waivers)
- Spending authority relevant to control performance (security tools, audit support, remediation work)
- Termination authority for third parties and high-risk activities
- Approval of new products/processes that change the control environment
Tie each authority to: role/title, scope, constraints, escalation requirements, and required evidence (ticket, memo, approval in system).
5) Align policies, procedures, and systems to the structure
Update policies so they match the structure and DoA:
- Policies name the approving authority (role/title), not a person.
- Procedures embed escalation triggers and approval checkpoints.
- Systems enforce authority where possible (workflow approvals, role-based access control, segregation-of-duties rules).
If you manage third-party risk, align: onboarding gates, due diligence sign-offs, residual risk acceptance, and ongoing monitoring ownership.
6) Prove it operates: governance cadence and reporting
Set a governance rhythm that produces evidence:
- Committee agendas that include risk decisions, exceptions, and remediation status
- A standardized risk acceptance/exception memo format
- Reporting packs to board/committees that show decisions made and issues escalated
Auditors accept a modest set of high-quality artifacts over sprawling documentation that nobody uses.
7) Add independence and conflict checks
Identify where independence matters (internal audit, compliance testing, issue validation) and document how you prevent self-review. Common patterns:
- Control owners cannot be sole testers of their own controls
- Issue closure requires independent verification for higher-risk issues
- Exceptions require at least one control function sign-off (risk/compliance/security) depending on topic
Required evidence and artifacts to retain
Maintain an “Authority & Responsibility” evidence folder (or GRC collection) with version control:
- Board/board committee materials showing oversight of organizational structure and delegations (agenda + minutes + pack). (COSO IC-IF (2013))
- Current org chart(s) including functional reporting lines relevant to oversight
- RACI matrix for key processes and a mapping to material controls
- Delegation of authority matrix (including risk acceptance and exception approvals)
- Committee charters (risk, compliance, security, third-party risk) with membership, quorum, scope, and decision rights
- Role descriptions for key control roles (control owners, compliance, risk, internal audit, third-party risk)
- Samples of approvals executed according to DoA (tickets, workflow approvals, signed memos)
- Evidence of periodic review and updates (change log, annual governance review sign-off)
If you use Daydream to manage compliance workflows, store the org/RACI/DoA as controlled documents, link them to control owners in your control library, and attach approval evidence directly to the relevant control or process record. That shortens audit walkthroughs because the “who/what/why” is traceable in one place.
Common exam/audit questions and hangups
Expect these questions in walkthroughs and testing:
- “Show me who is accountable for third-party onboarding decisions and where that authority is documented.”
- “Who can approve due diligence exceptions, and what evidence is retained?”
- “How does the board oversee management’s structure and reporting lines?” (COSO IC-IF (2013))
- “Where is segregation of duties documented for high-risk workflows?”
- “When a control fails, who owns remediation, and who validates closure?”
- “How do you keep org/RACI/DoA current after reorganizations?”
Hangups that trigger findings:
- Policy says one thing, the org chart says another, the system workflow does a third
- Committees “own” decisions but nobody can name the accountable executive
- Exception approvals happen in email or chat with no retained rationale
Frequent implementation mistakes and how to avoid them
| Mistake | Why it fails | Fix |
|---|---|---|
| Org chart only, no decision rights | Auditors can’t tie outcomes to authority | Add DoA + RACI tied to controls |
| Naming individuals in policies | Reorgs instantly break compliance | Use roles/titles, keep a role-to-person roster separately |
| Committees as “Accountable” | Accountability becomes diffuse | Assign A to an executive role; committee is approval forum |
| Self-testing controls | Independence concerns | Separate operator, approver, tester roles |
| No evidence of board oversight | Requirement explicitly includes board oversight | Keep minutes/pack showing review/approval of structure (COSO IC-IF (2013)) |
| DoA ignores risk acceptance | Residual risk gets accepted informally | Add explicit risk acceptance/exception lanes to DoA |
Enforcement context and risk implications
No public enforcement cases were provided in the source material for this requirement. Practically, weaknesses here amplify downstream risk: control failures persist because nobody owns them, third-party decisions get made without documented authority, and auditors lose confidence in governance. That often turns a narrow control gap into a broader “control environment” critique.
Practical 30/60/90-day execution plan
First 30 days (stabilize and inventory)
- Collect current org charts, committee charters, and any existing DoA documents.
- List your material processes and controls (start with third-party onboarding, access, payments, incident response).
- Identify top governance pain points: unclear approvals, repeated exceptions, stalled remediation.
- Draft a target-state governance map: board oversight path, key committees, functional reporting lines.
By 60 days (document and approve)
- Finalize and publish: org structure diagram + reporting lines for control functions.
- Build the RACI for top processes and map it to control ownership.
- Draft a DoA matrix that includes risk acceptance and exception approvals.
- Route for approvals through the correct governance body and retain minutes/approvals. (COSO IC-IF (2013))
By 90 days (embed and evidence)
- Update policies and procedures to reflect the approved RACI/DoA.
- Configure workflows in your GRC or ticketing system so approvals follow the DoA.
- Run a tabletop walkthrough for one high-risk workflow (for example, third-party onboarding with an exception) and retain artifacts.
- Schedule a recurring governance review cadence and define what triggers interim updates (reorgs, new products, M&A).
Frequently Asked Questions
Do we need board approval of the org chart?
The requirement calls for management to establish structures “with board oversight.” (COSO IC-IF (2013)) In practice, retain evidence that the board or a board committee reviewed the governance structure and key delegations, even if they did not approve every diagram version.
What’s the minimum documentation that satisfies auditors?
Auditors usually need an org structure with reporting lines, a RACI tied to material processes/controls, and a DoA matrix for key decisions. Add committee minutes and a few samples of decisions executed according to those documents. (COSO IC-IF (2013))
How do we handle dotted-line reporting for compliance or security?
Document it explicitly and explain what the dotted line means (performance review input, escalation rights, agenda control, or approval rights). Then show it operating through committee minutes, escalation records, or workflow approvals.
Who should be the “Accountable” owner for third-party risk decisions?
Assign accountability to a business or enterprise role that can accept risk and fund remediation, then define what approvals must occur through risk/compliance/security. Keep the committee as the decision forum, not the accountable owner.
How often should we update the RACI and DoA?
Update whenever a reorg, role change, or process change affects decision rights or control ownership. Many teams also set a recurring governance review to force periodic confirmation and refresh.
Our organization is small. Do we still need a formal DoA?
Yes, but it can be lightweight. A short matrix covering contract signing, exception approvals, and risk acceptance is usually enough, as long as you can show decisions follow it and the board has oversight. (COSO IC-IF (2013))
Frequently Asked Questions
Do we need board approval of the org chart?
The requirement calls for management to establish structures “with board oversight.” (COSO IC-IF (2013)) In practice, retain evidence that the board or a board committee reviewed the governance structure and key delegations, even if they did not approve every diagram version.
What’s the minimum documentation that satisfies auditors?
Auditors usually need an org structure with reporting lines, a RACI tied to material processes/controls, and a DoA matrix for key decisions. Add committee minutes and a few samples of decisions executed according to those documents. (COSO IC-IF (2013))
How do we handle dotted-line reporting for compliance or security?
Document it explicitly and explain what the dotted line means (performance review input, escalation rights, agenda control, or approval rights). Then show it operating through committee minutes, escalation records, or workflow approvals.
Who should be the “Accountable” owner for third-party risk decisions?
Assign accountability to a business or enterprise role that can accept risk and fund remediation, then define what approvals must occur through risk/compliance/security. Keep the committee as the decision forum, not the accountable owner.
How often should we update the RACI and DoA?
Update whenever a reorg, role change, or process change affects decision rights or control ownership. Many teams also set a recurring governance review to force periodic confirmation and refresh.
Our organization is small. Do we still need a formal DoA?
Yes, but it can be lightweight. A short matrix covering contract signing, exception approvals, and risk acceptance is usually enough, as long as you can show decisions follow it and the board has oversight. (COSO IC-IF (2013))
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream