Principle 6: Specifies suitable, specific objectives

To meet the principle 6: specifies suitable, specific objectives requirement, you must translate strategy, reporting, and compliance expectations into documented, measurable objectives that are specific enough to drive control design and testing. Operationalize this by assigning owners, defining success criteria and tolerances, mapping objectives to risks and controls, and retaining repeatable evidence that objectives are reviewed and updated.

Key takeaways:

  • Objectives must be specific enough that a control owner can execute and an auditor can test.
  • Each objective needs an owner, measurable criteria, and a clear link to risks and controls.
  • Evidence matters: retain objective statements, approvals, mappings, and review cadence artifacts.

Principle 6 sits at the point where governance intent becomes operational reality. If your objectives are vague (“ensure compliance,” “maintain strong controls”), control design turns into guesswork and testing becomes subjective. Auditors and examiners then default to a predictable conclusion: the control environment may be well-intended, but it is not demonstrably operating.

This requirement page is written for a Compliance Officer, CCO, or GRC lead who needs to implement Principle 6 quickly and defensibly. The goal is not to write better slogans. The goal is to produce objective statements that (1) clearly define what “good” looks like, (2) set measurable or observable criteria and tolerances, (3) identify who is accountable, and (4) map directly to the controls you run and the evidence you retain.

COSO frames Principle 6 as specifying suitable, specific objectives as part of an effective internal control system 1. In practice, that means you build an “objectives layer” that is explicit enough to drive control cards, testing steps, and management reporting without ad hoc interpretation.

Regulatory text

Framework excerpt (provided): “COSO internal control principle 6 implementation expectation.” 2

Operator interpretation: Principle 6 expects management to define objectives with enough clarity and specificity that risks can be identified and assessed, and controls can be designed and evaluated against a known target state 3.

What you must be able to show on request

  • A documented set of objectives across relevant categories (operations, reporting, and compliance are typical COSO groupings) that are specific, suitable to the organization, and consistent with risk appetite and materiality concepts as your organization defines them 1.
  • A direct link from objectives → risks → controls → testing/evidence, so the control program is traceable rather than a collection of disconnected activities.

Plain-English interpretation (what this requirement really demands)

You need objectives that a control owner can run like a checklist and a tester can validate like a claim with proof. “Suitable” means the objective fits your business model, regulatory obligations, and operating footprint. “Specific” means it avoids ambiguity: scope is defined, timing is clear, and success criteria are measurable or at least objectively verifiable.

A practical bar to use: if two competent reviewers read the objective and disagree on whether it was met, the objective is not specific enough.

Who it applies to (entity and operational context)

Applies to: Organizations using COSO Internal Control – Integrated Framework to design, operate, assess, or attest to internal control effectiveness 4.

Operational contexts where this shows up immediately

  • Financial reporting and close controls (objective quality drives SOX-style control design where relevant).
  • Compliance programs where obligations must be translated into operational controls (privacy, security, AML, third-party risk management).
  • Technology and data environments where control objectives must define availability, integrity, access, and change expectations.
  • Third party risk management, where objectives must define what “acceptable third-party risk” means and what monitoring must prove.

What you actually need to do (step-by-step)

Step 1: Build an objective inventory (not a policy library)

Create an “Objective Register” with fields that force specificity:

Field What “good” looks like
Objective statement Actionable and testable; avoids broad verbs like “ensure” without criteria
Category Operations / Reporting / Compliance (or your internal equivalents) 1
Scope Business unit, system, product, process, geography
Owner Named role (not a committee) accountable for performance and evidence
Success criteria Measurable metric or observable condition with a defined method
Tolerance/threshold What constitutes an exception (quantitative or qualitative)
Review cadence trigger Time-based and event-based triggers
Linked risks Risk statements that would prevent the objective
Linked controls Control IDs/cards that address linked risks
Evidence bundle Minimum artifacts that prove the objective is being met

Step 2: Rewrite objectives into “testable” form

Convert vague statements into operational claims.

Example (weak): “Maintain appropriate access controls.”
Example (testable): “User access to financial reporting systems is approved by the designated system owner before provisioning; access changes are logged; terminated users are removed based on HR termination notifications; exceptions are documented and approved.”

This style forces you to define: approver, system scope, event triggers, required logs, and exception handling.

Step 3: Align objectives to risk assessment

For each objective, identify the plausible failure modes and document the risk statements in plain language. Keep the linkage tight:

  • Objective: “Accurate revenue reporting by period.”
  • Risk: “Revenue is recognized in the wrong period due to manual override or incomplete source data.”
  • Controls: “Revenue cutoff review,” “Source-to-ledger reconciliation,” “Override logging and review.”

This creates a defensible chain that supports both design and operating effectiveness discussions 1.

Step 4: Create “requirement control cards” for every objective-critical control

For controls that directly support an objective, produce a control card/runbook:

Minimum control card fields (practical baseline)

  • Control objective (what it prevents/detects)
  • Control owner and backup
  • Trigger events (time-based and event-based)
  • Inputs (systems, reports, tickets)
  • Execution steps (numbered, no ambiguity)
  • Approval points (who signs off, how)
  • Exception rules (what is allowed, escalation path)
  • Evidence to retain and storage location
  • Testing notes (how a tester will validate operation)

This directly implements the recommended practice of creating a requirement control card with objective, owner, triggers, steps, and exception rules 1.

Step 5: Define the minimum evidence bundle per cycle

For each control, define the smallest set of artifacts that proves operation without over-collecting:

Evidence bundle template

  • Inputs: source reports, system exports, ticket queues, HR feed, vendor lists
  • Execution proof: completed checklist, screenshots, system logs, reconciliation outputs
  • Review/approval: sign-off, email approval, workflow approval record
  • Exceptions: exception log entry, rationale, approval, remediation ticket
  • Retention: location, naming convention, retention period per your policy

This matches the recommended practice to define the minimum evidence bundle for each execution cycle 1.

Step 6: Establish objective reviews and change control

Objectives go stale when products, systems, and third parties change. Set two triggers:

  • Time-based review: periodic management review of the objective register for relevance and completeness.
  • Event-based review: M&A, new systems, major vendor onboarding, new regulatory obligation, incident postmortems.

Document decisions: “no change,” “reworded,” “split objective,” “retired,” and link to approvals.

Step 7: Run recurring control health checks tied to objectives

Do lightweight health checks that answer:

  • Did the control run when it was supposed to?
  • Is evidence complete and stored correctly?
  • Are exceptions tracked to closure?

Track issues to validated closure with due dates, consistent with the recommended practice to run recurring control health checks and track remediation 1.

Required evidence and artifacts to retain

Retain artifacts in a way that supports traceability from objective to proof:

  1. Objective Register (versioned) with owner assignments and review history.
  2. Objective-to-risk mapping (risk register references or a mapping table).
  3. Objective-to-control mapping (including which controls are key to objective achievement).
  4. Control cards/runbooks for objective-critical controls.
  5. Evidence bundle samples for each control cycle (inputs, outputs, approvals, exceptions).
  6. Review minutes/approvals for objective updates and periodic reviews.
  7. Health check results and remediation tracker with closure evidence.

Common exam/audit questions and hangups

Auditors tend to probe Principle 6 with a few repeatable lines of questioning:

  • “Show me your objectives for reporting and compliance, and explain how you know they’re specific.”
  • “Who owns each objective and how do they know they’re meeting it?”
  • “Which risks prevent this objective, and which controls address those risks?”
  • “Show evidence the objective set is reviewed and updated when the business changes.”
  • “Where is the evidence stored, and how do you know it’s complete?”

Hangup to anticipate: teams present policies and control narratives but cannot point to explicit objective statements with measurable success criteria. That gap often leads to control design debates and inconsistent testing.

Frequent implementation mistakes (and how to avoid them)

  1. Mistake: objectives written as principles, not targets.
    Fix: require a success criterion field and a tester view: “How would you prove this happened?”

  2. Mistake: no named owner.
    Fix: assign a role with authority over the process and evidence; add a backup for continuity.

  3. Mistake: objectives exist, but mappings don’t.
    Fix: require objective-to-risk and objective-to-control links as a completion gate before sign-off.

  4. Mistake: evidence expectations are undefined.
    Fix: publish the minimum evidence bundle per control cycle and standardize storage/naming.

  5. Mistake: objectives never change after initial documentation.
    Fix: add event-based triggers tied to system changes, third-party onboarding, incidents, and reorganizations.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this principle. Practically, the risk is indirect but real: unclear objectives weaken the defensibility of your internal control program. That shows up as adverse audit findings, control testing disputes, repeat issues, and failures to demonstrate control operation during customer diligence.

For third-party risk management specifically, vague objectives often produce inconsistent onboarding decisions and weak monitoring. Examiners and customers then ask for evidence that the third party program meets stated expectations. If objectives are not specific, your evidence set will be inconsistent.

Practical 30/60/90-day execution plan

First 30 days (foundation and scope)

  • Appoint an accountable owner for the Objective Register and define stakeholders.
  • Inventory existing objectives across operations, reporting, and compliance sources (policies, risk register, audit issues, control narratives).
  • Draft the Objective Register template and define the “testability standard” your team will use.
  • Select a pilot area (financial reporting, access management, or third-party risk management) and rewrite a small set of objectives into testable form.

Days 31–60 (mapping and control operationalization)

  • Map pilot objectives to risks and existing controls; identify unmapped objectives and control gaps.
  • Create control cards for the objective-critical controls in the pilot area.
  • Define minimum evidence bundles and standardize the evidence repository structure.
  • Socialize with control owners; run one execution cycle using the new control cards and evidence bundles.

Days 61–90 (prove operation and institutionalize reviews)

  • Perform a control health check on the pilot controls; log issues and remediate to closure.
  • Expand the Objective Register to remaining areas using the pilot pattern.
  • Implement objective review triggers (time-based and event-based) and document the approval workflow.
  • Prepare an “audit-ready pack” for Principle 6: objective register, mappings, sample evidence, review artifacts.

Where Daydream fits naturally: Daydream can act as the system of record for objective-to-control mappings, control cards, evidence checklists, and recurring health checks, so your Principle 6 artifacts stay current and audit-ready without spreadsheet drift.

Frequently Asked Questions

How specific do objectives need to be to satisfy Principle 6?

Specific enough that a control owner can execute against them and a tester can verify them without subjective interpretation. If you cannot define required evidence for the objective, it is still too vague.

Do we need separate objectives for operations, reporting, and compliance?

COSO commonly frames objectives across operations, reporting, and compliance categories 1. You can use your own taxonomy, but you should be able to demonstrate coverage across those intent areas.

Can we treat policies as objectives?

Policies rarely meet the “specific” bar by themselves because they state expectations but not measurable success criteria, triggers, and tolerances. Keep policies, but create objective statements that drive controls and testing.

What is the minimum mapping we need to show auditors?

Maintain traceability from objective → risks → controls → evidence. A simple mapping table works if it is complete, current, and tied to actual control artifacts.

How do objectives apply to third party risk management?

Objectives define what “acceptable” means for onboarding, contracting, and monitoring third parties. They should specify required diligence steps, approval criteria, monitoring triggers, and evidence expectations so decisions are consistent and reviewable.

How do we keep objectives from going stale after reorganizations or system changes?

Add event-based review triggers tied to change management, third-party onboarding, incidents, and major process changes. Document the review outcome and approvals in the objective register so you can prove ongoing governance.

Footnotes

  1. COSO IC framework overview

  2. COSO Internal Control guidance page

  3. COSO IC framework overview; Weaver summary of COSO 17 principles

  4. COSO IC framework overview; COSO Internal Control guidance page

Frequently Asked Questions

How specific do objectives need to be to satisfy Principle 6?

Specific enough that a control owner can execute against them and a tester can verify them without subjective interpretation. If you cannot define required evidence for the objective, it is still too vague.

Do we need separate objectives for operations, reporting, and compliance?

COSO commonly frames objectives across operations, reporting, and compliance categories (Source: COSO IC framework overview). You can use your own taxonomy, but you should be able to demonstrate coverage across those intent areas.

Can we treat policies as objectives?

Policies rarely meet the “specific” bar by themselves because they state expectations but not measurable success criteria, triggers, and tolerances. Keep policies, but create objective statements that drive controls and testing.

What is the minimum mapping we need to show auditors?

Maintain traceability from objective → risks → controls → evidence. A simple mapping table works if it is complete, current, and tied to actual control artifacts.

How do objectives apply to third party risk management?

Objectives define what “acceptable” means for onboarding, contracting, and monitoring third parties. They should specify required diligence steps, approval criteria, monitoring triggers, and evidence expectations so decisions are consistent and reviewable.

How do we keep objectives from going stale after reorganizations or system changes?

Add event-based review triggers tied to change management, third-party onboarding, incidents, and major process changes. Document the review outcome and approvals in the objective register so you can prove ongoing governance.

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream