Principle 15: Communicates externally
To meet the principle 15: communicates externally requirement, you must run a controlled, auditable process for receiving, validating, escalating, and responding to information from outside the organization that affects internal control. Operationalize it by assigning owners, defining channels and SLAs, documenting what gets escalated, and retaining evidence that external communications informed decisions and control changes.
Key takeaways:
- Treat external communications as control inputs, not PR outputs.
- Define who receives what, how it is triaged, and when it must be escalated.
- Keep evidence that external signals drove action (issues, changes, disclosures, and remediation).
Principle 15 in the COSO Internal Control – Integrated Framework focuses on how your organization communicates with parties outside the business in ways that support internal control. For a Compliance Officer, CCO, or GRC lead, this usually shows up as a recurring audit question: “How do you know external information that matters to control design or control performance actually reaches the right people, on time, with proof?”
“External” includes regulators, auditors, customers, third parties, investors, consumer reporting bodies, industry groups, and even anonymous tipsters when information comes from outside your reporting lines. The operational goal is consistent: capture inbound signals (complaints, SOC reports, breach notices, examination findings, supplier quality issues), route them to accountable owners, document evaluation and decisions, and ensure outbound communications (responses, disclosures, attestations) are accurate and approved.
This page translates the COSO principle into requirement-level execution steps, exam-ready artifacts, and common failure modes. It also shows how to structure ownership and evidence so you can demonstrate effective external communication as part of your internal control system. References: COSO Internal Control guidance page; Weaver summary of COSO 17 principles.
Regulatory text
Provided excerpt (framework expectation): “COSO internal control principle 15 implementation expectation.” 1
Framework summary: Principle 15: Communicates externally. 2
Operator interpretation (what you must do):
- Establish processes and channels to obtain relevant information from external parties that can affect internal control (financial reporting, operations, compliance, and risk).
- Establish processes to communicate relevant information to external parties (regulators, auditors, customers, investors, third parties) with clear accountability, approvals, and accuracy checks.
- Maintain evidence that external communications are handled consistently and that critical items are escalated and resolved through your governance structure.
This is less about “having a mailbox” and more about proving that external information is a managed input into your control environment and your control monitoring loop. 1
Plain-English requirement (what Principle 15 really expects)
You need a repeatable way to:
- Receive external control-relevant communications (inbound).
- Evaluate and classify them (is this a complaint, a regulatory request, a control deficiency signal, a third-party incident, a disclosure obligation, or noise?).
- Escalate the right items to the right decision-makers.
- Respond and/or remediate with approved messaging and tracked actions.
- Retain evidence that you did the above, and that the process works.
If your organization can’t show traceability from an external input (example: a customer complaint about inaccurate statements) to an internal decision (example: a control enhancement and customer remediation), Principle 15 will fail in practice.
Who it applies to
Entity scope
- Any organization claiming alignment with the COSO Internal Control – Integrated Framework, including public companies, private enterprises, nonprofits, and regulated entities that map internal control to COSO. 1
Operational contexts where Principle 15 becomes “real”
- Financial reporting controls: external auditor requests, PCAOB-style evidence expectations, investor relations communications that intersect with financial reporting narratives.
- Regulatory and compliance operations: exams, inquiries, complaints, mandated reporting, licensing communications.
- Third-party risk management (TPRM): breach notices, SOC report exceptions, contract compliance notices, subprocessor changes, supply chain quality issues.
- Customer and product risk: safety reports, privacy requests, adverse event reports, dispute notices, chargebacks, product defect signals.
- Security and incident response: external notifications from law enforcement, ISACs, vulnerability researchers, and affected partners.
What you actually need to do (step-by-step)
1) Define “external communication” categories that are control-relevant
Build a simple taxonomy that maps to routing and evidence. Minimum categories most teams need:
- Regulatory communications (inquiries, exams, subpoenas, notices)
- External audit communications (PBC lists, findings, management letters)
- Customer communications (complaints, disputes, escalations)
- Third-party communications (incidents, SLA breaches, contract notices)
- Public/disclosure communications (press statements that touch control-sensitive facts)
Deliverable: an “External Communications Intake Standard” that defines categories, examples, and owners. Map it to Principle 15 in your control matrix. 1
2) Assign accountable owners and backups (RACI)
You need named roles for:
- Intake owner (who monitors each channel)
- Triage owner (who classifies and assigns)
- Functional responder (Legal, Compliance, Finance, Security, Privacy, Product)
- Approver (who signs off on outbound statements)
- Records owner (who ensures retention and retrieval)
A common, workable pattern:
- Compliance owns triage for regulatory and complaint channels.
- Security owns triage for incident/vulnerability channels.
- Finance/Controller owns audit/financial reporting requests.
- Legal is the approval gate for external statements with liability exposure.
Deliverable: a RACI and on-call backup list embedded in the procedure.
3) Establish controlled channels (and close the “shadow inbox” problem)
Create an inventory of approved channels:
- regulator@, audit@, privacy@, security@, complaints@ mailboxes
- web forms with ticket creation
- hotline intake workflow
- vendor/third-party portals
- customer support escalations
Controls to add:
- Auto-forward to a ticketing system or GRC tool with immutable timestamps.
- Access control: limited editors, logged access.
- Monitoring: assigned queue ownership and absence coverage.
Deliverable: channel register, access list, and monitoring procedure.
4) Create triage rules and escalation triggers
Write decision rules that tell staff what to do without improvising:
- What must be escalated immediately (regulator inquiries, audit findings, credible incident notifications, allegations of fraud, financial misstatement signals).
- What can be handled as BAU (routine customer complaints, standard due diligence questionnaires).
- When to invoke cross-functional review (Legal + Compliance + Security, etc.).
Deliverable: a one-page triage playbook plus templates (intake form, assessment checklist, response checklist).
5) Control outbound communications (approval + accuracy + consistency)
For outbound statements that matter to internal control (responses to regulators/auditors, breach notices, customer remediation letters, formal attestations):
- Require drafting standards (facts, source documents, dates, scope, assumptions).
- Require approval workflow (who reviews, who approves, who can send).
- Require version control (final sent copy, attachments, and evidence of approval).
- Require consistency checks against internal incident records and known facts to avoid contradictory statements.
Deliverable: outbound communication approval workflow with required approvers by category.
6) Integrate with issue management and corrective action
Principle 15 is easy to “paper” and still fail operationally. Link external inputs to:
- issue records (deficiency, risk acceptance, corrective actions)
- root cause analysis
- control redesign or control performance monitoring
- management reporting
Deliverable: a rule that any control-relevant external signal generates (or links to) an issue/case ID.
7) Prove it works with monitoring and testing
Minimum monitoring activities:
- periodic review of intake queues for aging items
- sampling of closed items for complete documentation
- trending: recurring complaint types and repeat third-party breaches
- reporting to a governance forum (risk committee, compliance committee)
Deliverable: monitoring evidence and a test script aligned to Principle 15. 1
Required evidence and artifacts to retain
Use this as an audit-ready checklist:
Governance & design
- Principle 15 control statement(s) and control owner assignment
- External communications policy/standard and triage playbook
- RACI + escalation matrix + approval matrix
- Channel inventory (mailboxes, portals, forms) and access control lists
- Records retention requirements for external communications
Operational evidence
- Ticket/case records for inbound items (timestamps, classification, assignment, disposition)
- Copies of inbound communications (emails, letters, portal screenshots, call logs)
- Approval evidence for outbound communications (workflow logs, email approvals, e-signature)
- Final outbound communications (sent copies) tied to case IDs
- Issue management linkage (corrective actions, remediation tracking)
Monitoring
- Queue aging reports
- Sampling/test results, exceptions, and remediation actions
- Committee reporting packs where external communication themes are discussed
Daydream (when you need speed): many teams use Daydream to map Principle 15 to owners, required evidence, and a repeatable artifact checklist so audits don’t turn into mailbox archaeology.
Common exam/audit questions and hangups
Expect variations of:
- “Show me how external complaints get routed to Compliance, and how you decide what is a control issue.”
- “How do you ensure regulator correspondence is complete, accurate, approved, and retained?”
- “How do you know third-party incident notices reach Security and are tracked through closure?”
- “Where is your evidence that external information drove changes to controls or remediation?”
Frequent hangup: teams can show the policy, but cannot produce a clean sample trail from intake to closure with approvals and attachments.
Frequent implementation mistakes (and how to avoid them)
-
Single mailbox, no workflow.
Fix: force case creation and assignment; mailboxes become inputs, not systems of record. -
No documented escalation triggers.
Fix: define triggers by category and risk; require escalation documentation even when you decide “no action.” -
Outbound statements sent without an approval trail.
Fix: require approval in a trackable system or a controlled sign-off process tied to the case. -
Shadow communications bypass Compliance/Legal.
Fix: train front-line teams, add routing rules, and require a single registry for regulator/auditor communications. -
No linkage to issue management.
Fix: if it indicates a control deficiency or incident, it must create/link to an issue record.
Enforcement context and risk implications
COSO is a framework, not a regulator. Your risk is indirect but real: weak external communication controls often surface as audit findings, SOC exceptions, or regulatory criticisms under whichever rules apply to your industry. Principle 15 gaps commonly correlate with inconsistent disclosures, missed regulatory deadlines, incomplete responses, and untracked complaints that later become allegations of systemic control failure. 1
Practical 30/60/90-day execution plan
Days 0–30: Stand up the minimum viable process
- Name control owner(s) and publish a RACI for external communications.
- Inventory inbound/outbound channels and designate systems of record.
- Define categories, triage rules, and escalation triggers.
- Implement case IDs and a required metadata set (category, owner, due date, disposition, approvals needed).
Days 31–60: Make it auditable
- Build approval workflows for outbound communications by category (regulator, auditor, customer, third party).
- Define evidence requirements and retention locations; stop storing final responses only in personal inboxes.
- Connect external intake to issue management for control-relevant items.
- Train intake owners and responders with scenario-based drills.
Days 61–90: Prove operating effectiveness
- Run monitoring: queue aging review, sampling of cases for completeness, escalation timeliness checks.
- Report trends and exceptions to a governance forum; document decisions.
- Tune triage rules based on misses and near-misses.
- Prepare an audit packet: policy, RACI, channel register, sample cases, monitoring evidence mapped to Principle 15.
Frequently Asked Questions
What counts as “external” communication for Principle 15?
Anything originating outside your reporting lines that can affect internal control, including regulators, auditors, customers, third parties, and external incident notifiers. Treat it as external if it introduces facts or obligations your control owners must evaluate.
Do we need a dedicated tool to satisfy the principle 15: communicates externally requirement?
No, but you need traceability, approvals, and retention. If email and spreadsheets can’t produce clean evidence trails quickly, a ticketing or GRC system becomes the practical path.
How do we handle third-party incident notices under Principle 15?
Route notices into a tracked case, classify severity, escalate to Security and Compliance, and link to incident response and vendor management records. Retain the notice, assessment notes, decision logs, and any customer/regulator communications.
Who should approve outbound communications to regulators or auditors?
Set an approval matrix by category; most organizations require Compliance and Legal review for regulator responses and Finance/Controller plus Legal review for financial reporting-related auditor communications. Document both the approver and the final sent version.
What evidence do auditors ask for most often?
A small set of complete samples showing intake, triage, escalation, approvals, final response, and retention. Auditors commonly reject “we have a mailbox” without case records and approvals.
How do we avoid “shadow comms” where business teams reply directly to external parties?
Create clear routing rules, train front-line teams, and require that regulator and auditor communications flow through controlled channels. Add periodic attestations from business owners that they followed the process.
Footnotes
Frequently Asked Questions
What counts as “external” communication for Principle 15?
Anything originating outside your reporting lines that can affect internal control, including regulators, auditors, customers, third parties, and external incident notifiers. Treat it as external if it introduces facts or obligations your control owners must evaluate.
Do we need a dedicated tool to satisfy the principle 15: communicates externally requirement?
No, but you need traceability, approvals, and retention. If email and spreadsheets can’t produce clean evidence trails quickly, a ticketing or GRC system becomes the practical path.
How do we handle third-party incident notices under Principle 15?
Route notices into a tracked case, classify severity, escalate to Security and Compliance, and link to incident response and vendor management records. Retain the notice, assessment notes, decision logs, and any customer/regulator communications.
Who should approve outbound communications to regulators or auditors?
Set an approval matrix by category; most organizations require Compliance and Legal review for regulator responses and Finance/Controller plus Legal review for financial reporting-related auditor communications. Document both the approver and the final sent version.
What evidence do auditors ask for most often?
A small set of complete samples showing intake, triage, escalation, approvals, final response, and retention. Auditors commonly reject “we have a mailbox” without case records and approvals.
How do we avoid “shadow comms” where business teams reply directly to external parties?
Create clear routing rules, train front-line teams, and require that regulator and auditor communications flow through controlled channels. Add periodic attestations from business owners that they followed the process.
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream