Talent Development and Succession
The “Talent Development and Succession” requirement means you must run a repeatable program that builds and sustains competent staff (and outsourced service providers) through training, mentoring, and development, with clear succession coverage for key roles. To operationalize it, define competency needs by role, assign development plans, track completion and effectiveness, and retain evidence that critical responsibilities stay covered. (COSO IC-IF (2013))
Key takeaways:
- Define competency requirements for critical roles, then map training and mentoring to those requirements. (COSO IC-IF (2013))
- Treat outsourced service providers as part of the control environment; validate their competence for the work you rely on. (COSO IC-IF (2013))
- Evidence matters: role profiles, training plans, completion records, succession coverage, and periodic effectiveness reviews. (COSO IC-IF (2013))
“Talent Development and Succession” sits inside COSO’s Control Environment expectations: the organization needs enough capable people to operate controls, make sound decisions, and maintain continuity when roles change. The practical compliance question is simple: can you prove that the people performing key control activities (and the third parties you depend on) are competent today, and that you have a realistic plan if those people leave tomorrow?
For a Compliance Officer, CCO, or GRC lead, this requirement becomes operational through a few measurable building blocks: role-based competency definitions, structured onboarding and continuing training, mentoring or coaching for complex responsibilities, and succession planning for roles where a single point of failure creates regulatory, financial reporting, or operational risk. COSO also explicitly includes outsourced service providers in scope, so your program must cover competence assurance for third parties performing material activities. (COSO IC-IF (2013))
This page gives you a requirement-level blueprint you can stand up quickly: who it applies to, what to implement, what to retain for audits, and where teams commonly fail.
Regulatory text
COSO requirement (Principle 4 – Point of Focus): “The organization provides mentoring, training, and other development activities to attract, develop, and retain sufficient and competent personnel and outsourced service providers.” (COSO IC-IF (2013))
Plain-English interpretation
You need a documented, operating program that:
- Identifies which roles (and third-party roles) must be competent for key processes and controls.
- Develops and maintains that competence through onboarding, training, mentoring, and ongoing development.
- Reduces single points of failure through succession coverage and cross-training.
- Produces evidence that this is planned, executed, and reviewed, not informal or ad hoc. (COSO IC-IF (2013))
Who it applies to
Entity scope
- Any organization using COSO as its internal control framework, including organizations that rely on COSO-aligned practices for governance, risk, and control maturity. (COSO IC-IF (2013))
- Internal audit functions assessing whether the control environment supports reliable operations and control execution. (COSO IC-IF (2013))
Operational scope (where it shows up in practice)
This requirement becomes “exam critical” anywhere competence gaps can break controls or create continuity risk, including:
- Financial close and reporting controls, controllership, and SOX-like control environments where relevant.
- Compliance program operations (monitoring, investigations, regulatory filings, surveillance).
- Information security and access governance responsibilities tied to key controls.
- Any process heavily dependent on third parties (payroll providers, benefits administrators, outsourced IT operations, claims processors, call centers, managed service providers). (COSO IC-IF (2013))
What you actually need to do (step-by-step)
1) Define “critical roles” and “key responsibilities”
Create a short list of roles where loss of competence or coverage would disrupt controls, compliance obligations, or financial reporting. Start with:
- Control owners for key controls
- System administrators for systems in scope for control execution
- Compliance reviewers/approvers for regulated workflows
- Third-party relationship owners for material outsourced processes (COSO IC-IF (2013))
Operator tip: Your “critical” list should be defensible. Tie each role to a process/control, not a job title hierarchy.
2) Build role-based competency profiles
For each critical role, document:
- Required knowledge (policies, control objectives, regulatory obligations relevant to that role)
- Required skills (tools, systems, review techniques, investigation methods)
- Required authority (approval limits, escalation rights)
- Minimum experience/certification expectations where applicable to your environment (do not invent requirements; reflect what you actually need)
- Training/mentoring pathways to reach and maintain competence (COSO IC-IF (2013))
Keep it practical. A one-page “role competency profile” per role is usually enough.
3) Map learning activities to competencies (not to “training hours”)
Create a training and development matrix:
- Rows: critical roles (including outsourced roles where you rely on their work)
- Columns: required competencies and development activities (onboarding, annual refresh, tool training, mentoring, tabletop exercises)
- Owner: who assigns and who tracks completion
- Evidence source: LMS record, signed attestation, mentoring log, external certification verification (COSO IC-IF (2013))
This avoids a common failure mode: “we trained people” without showing that training matches the competence needed for the control.
4) Implement mentoring and supervised practice for complex work
For roles involving judgment (reviews, exceptions, investigations, model/risk decisions), add:
- A defined mentor/coach assignment for new incumbents
- Supervised execution criteria (e.g., initial work is reviewed until the person demonstrates proficiency)
- A documented sign-off that the person is authorized to operate independently (COSO IC-IF (2013))
Keep the evidence lightweight: a short checklist works if it is consistently completed.
5) Extend competence assurance to outsourced service providers
COSO explicitly includes outsourced service providers, so you need a way to validate that third parties performing material activities are competent for those tasks. (COSO IC-IF (2013))
Minimum operational approach:
- Contractually require qualified personnel for defined functions.
- Obtain and review role qualifications where appropriate (named key personnel, certifications, training completion, experience summaries).
- Confirm their onboarding and change management practices for staff turnover on your account.
- Establish escalation and replacement expectations when performance or competence issues appear.
Where Daydream fits: Daydream can help you standardize third-party competence checks inside your due diligence workflow by attaching “role qualification” evidence requests and review steps to each third-party engagement, so competence doesn’t get handled through scattered email threads.
6) Create a succession and coverage plan for key roles
Succession planning does not have to be complex. For each critical role, document:
- Primary owner and backup (or coverage approach)
- Cross-training plan (what the backup must learn)
- Transition steps when turnover occurs (access changes, handover checklist, validation period)
- Interim coverage for unexpected absence (COSO IC-IF (2013))
Focus on continuity of control execution: who performs the control tomorrow if the current owner is unavailable?
7) Monitor effectiveness and refresh routinely
A program that never changes will drift away from reality. Establish a review cadence that checks:
- Training completion and overdue items for critical roles
- Role changes and whether competency profiles still match the job
- Control failures or audit findings tied to competence gaps
- Third-party performance issues tied to staffing or qualifications (COSO IC-IF (2013))
Document the review and the decisions (add training, change onboarding, replace a provider resource, revise role definition).
Required evidence and artifacts to retain
Auditors and internal control stakeholders usually want proof in five categories:
- Governance and ownership
- Talent development and succession procedure for control-relevant roles
- RACI for who defines competencies, assigns training, and validates completion (COSO IC-IF (2013))
- Role definitions
- Role competency profiles for critical roles
- List of critical roles and rationale (mapped to processes/controls) (COSO IC-IF (2013))
- Training and development execution
- Training matrix (role-to-training mapping)
- LMS exports or completion records
- Onboarding checklists for critical roles
- Mentoring/coaching logs and proficiency sign-offs (COSO IC-IF (2013))
- Succession and coverage
- Succession/coverage plan for critical roles
- Cross-training plans and evidence of completion
- Handover checklists and transition records (COSO IC-IF (2013))
- Third-party competence assurance
- Contract clauses or SOW language requiring qualified staff
- Third-party provided qualifications or training attestations (as appropriate)
- Performance reviews tied to staffing competence
- Issue logs and corrective actions when competence gaps appear (COSO IC-IF (2013))
Common exam/audit questions and hangups
Expect questions like:
- “Show me how you determined which roles are critical to control execution.” (COSO IC-IF (2013))
- “How do you know the control owner is competent, beyond being in the role?” (COSO IC-IF (2013))
- “Where is the evidence that mentoring happens for complex judgment tasks?” (COSO IC-IF (2013))
- “What happens if your key control performer resigns? Who takes over and how are they prepared?” (COSO IC-IF (2013))
- “How do you validate competence of outsourced service providers doing material activities?” (COSO IC-IF (2013))
Hangups that slow audits:
- Training records exist, but they are not tied to role requirements.
- Succession plans are organizational charts, not “control continuity plans.”
- Third-party competence is assumed because procurement completed onboarding.
Frequent implementation mistakes (and how to avoid them)
- Mistake: Treating training as generic compliance content
- Fix: Use role-based competency profiles and map training to the specific controls and tasks performed. (COSO IC-IF (2013))
- Mistake: No proof of mentoring or supervised practice
- Fix: Require a short mentor assignment and sign-off for roles involving judgment, not just system access. (COSO IC-IF (2013))
- Mistake: Backups exist on paper but are not trained
- Fix: Cross-train backups and keep evidence (shadowing notes, completed checklists, supervised runs). (COSO IC-IF (2013))
- Mistake: Outsourced service provider competence is out of scope
- Fix: Add competence assurance steps to third-party due diligence and ongoing monitoring for material outsourced activities. (COSO IC-IF (2013))
- Mistake: No operating rhythm
- Fix: Establish periodic reviews that result in documented actions (updated training, revised role profiles, third-party remediation). (COSO IC-IF (2013))
Enforcement context and risk implications
No public enforcement cases were provided in the available source catalog for this COSO point of focus, so you should treat it as a control environment expectation rather than a stand-alone enforcement hook. The risk is indirect but real: inadequate competence and succession planning can drive control failures, missed regulatory obligations, and weak third-party oversight, which then becomes visible through audit findings, incidents, or reporting errors. (COSO IC-IF (2013))
Practical 30/60/90-day execution plan
Days 0–30: Establish the minimum viable program
- Identify critical roles tied to key processes and controls.
- Draft role competency profiles for the highest-risk roles first.
- Publish a training and mentoring procedure with clear ownership.
- For outsourced service providers supporting material activities, list the engagements and define what “qualified” means for their roles. (COSO IC-IF (2013))
Days 31–60: Implement and collect evidence
- Launch the training matrix and assign required learning by role.
- Start mentoring assignments and supervised practice sign-offs for new or recently changed role incumbents.
- Build succession/coverage plans for each critical role, including backup assignments and cross-training tasks.
- Update third-party contracts/SOWs or monitoring checklists to include competence expectations and evidence collection. (COSO IC-IF (2013))
Days 61–90: Prove it operates and tune it
- Run your first effectiveness review: completion status, gaps, and corrective actions.
- Test succession coverage: walk through at least one transition scenario per major process (tabletop is fine) and document findings.
- Review outsourced service provider staffing changes and validate continued competence for key resources.
- Centralize artifacts in your GRC system or evidence repository; Daydream can help structure requests and keep evidence tied to each role and third party engagement. (COSO IC-IF (2013))
Frequently Asked Questions
Do we need a formal “succession plan” document for every role?
No. Focus on critical roles tied to key controls and obligations, then document practical coverage and cross-training for those roles. COSO expects sufficient and competent personnel, with continuity supported by development activities. (COSO IC-IF (2013))
How do we include outsourced service providers without overreaching?
Limit the scope to outsourced work you rely on for material processes or controls. Define qualification expectations in the SOW and collect proportionate evidence such as training attestations, certifications, or named-resource requirements. (COSO IC-IF (2013))
What evidence is usually enough to show mentoring exists?
Keep it simple: mentor assignment, a short agenda/checklist for supervised tasks, and a sign-off when the person can perform independently. Consistency matters more than detail. (COSO IC-IF (2013))
Our training is in an LMS, but audits still flag us. Why?
Auditors often flag programs that show course completion but do not show role-to-competency alignment. Add role competency profiles and a training matrix that maps required learning to the tasks and controls each role performs. (COSO IC-IF (2013))
How should we handle interim coverage when a key person leaves suddenly?
Document an interim operator (or team) and a handover checklist that preserves control execution, access changes, and review responsibilities. Pair this with a short supervised validation period for the interim performer. (COSO IC-IF (2013))
Can internal audit own this program?
Internal audit can assess it, but operational ownership usually sits with business leaders, HR/L&D, and compliance or control owners. Keep internal audit independent by having them validate design and operating effectiveness rather than run the process. (COSO IC-IF (2013))
Frequently Asked Questions
Do we need a formal “succession plan” document for every role?
No. Focus on critical roles tied to key controls and obligations, then document practical coverage and cross-training for those roles. COSO expects sufficient and competent personnel, with continuity supported by development activities. (COSO IC-IF (2013))
How do we include outsourced service providers without overreaching?
Limit the scope to outsourced work you rely on for material processes or controls. Define qualification expectations in the SOW and collect proportionate evidence such as training attestations, certifications, or named-resource requirements. (COSO IC-IF (2013))
What evidence is usually enough to show mentoring exists?
Keep it simple: mentor assignment, a short agenda/checklist for supervised tasks, and a sign-off when the person can perform independently. Consistency matters more than detail. (COSO IC-IF (2013))
Our training is in an LMS, but audits still flag us. Why?
Auditors often flag programs that show course completion but do not show role-to-competency alignment. Add role competency profiles and a training matrix that maps required learning to the tasks and controls each role performs. (COSO IC-IF (2013))
How should we handle interim coverage when a key person leaves suddenly?
Document an interim operator (or team) and a handover checklist that preserves control execution, access changes, and review responsibilities. Pair this with a short supervised validation period for the interim performer. (COSO IC-IF (2013))
Can internal audit own this program?
Internal audit can assess it, but operational ownership usually sits with business leaders, HR/L&D, and compliance or control owners. Keep internal audit independent by having them validate design and operating effectiveness rather than run the process. (COSO IC-IF (2013))
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream