Deficiency Evaluation and Communication

Deficiency Evaluation and Communication requires you to (1) identify internal control deficiencies, (2) evaluate their severity and impact quickly, and (3) communicate them to the right owners, senior management, and the board so corrective action starts immediately. Your job is to make this repeatable: clear definitions, escalation thresholds, time-bound notifications, and auditable evidence. (COSO IC-IF (2013))

Key takeaways:

  • Define what counts as a “deficiency,” how you rate severity, and who must be notified at each level. (COSO IC-IF (2013))
  • Build an escalation workflow that routes issues to control owners fast, then to senior management and the board “as appropriate.” (COSO IC-IF (2013))
  • Preserve evidence: detection source, evaluation rationale, communications, remediation plan, and closure validation. (COSO IC-IF (2013))

“Deficiency evaluation and communication” breaks down into two operator obligations: make a defensible call on how serious a control problem is, and notify the people who can fix it before it becomes an incident, misstatement, or recurring audit finding. COSO frames this as a monitoring expectation: internal control deficiencies must be evaluated and communicated in a timely manner to parties responsible for corrective action, including senior management and the board where appropriate. (COSO IC-IF (2013))

For a CCO, GRC lead, or control owner, the hard part is not writing a policy. It’s operationalizing decisions that feel subjective under pressure: Is this a deficiency or just a process improvement? Who needs to know now versus in a quarterly report? What documentation will satisfy Internal Audit, external auditors, or a regulator that you took the issue seriously and governed it properly?

This page gives you requirement-level implementation guidance: who it applies to, what to build, how to run it day-to-day, and what evidence to retain. It also flags common breakdowns (slow escalation, unclear severity criteria, and “fixes” that are never validated) and provides a practical execution plan you can start immediately. (COSO IC-IF (2013))

Regulatory text

Requirement (verbatim): “The organization evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action, including senior management and the board of directors, as appropriate.” (COSO IC-IF (2013))

What the operator must do:
You must run a consistent process that (a) detects control deficiencies from monitoring activities, (b) evaluates each deficiency with defined criteria, (c) communicates it promptly to the accountable control owner(s), and (d) escalates material or systemic issues to senior management and, when warranted, the board. The output must be evidence-backed: auditors should be able to trace from detection to decision to notification to remediation to verified closure. (COSO IC-IF (2013))

Plain-English interpretation (what this means in practice)

A control deficiency is any condition that reduces the likelihood your controls will prevent or detect errors, policy violations, or other risk outcomes. Under this requirement you cannot leave deficiencies “in the queue” or trapped inside one team’s ticketing system. You need a governance-backed path that answers, every time:

  • So what? How severe is it, and what could go wrong if it persists?
  • Who owns it? Which role has authority and accountability to fix it?
  • Who else must know? Which leaders must be informed based on severity, scope, regulatory impact, or repeat occurrence?
  • What’s the fix and by when? What corrective action will restore the control and prevent recurrence?
  • Did it work? How will you test and confirm closure?

COSO’s emphasis on “timely” and “as appropriate” means you must define time and appropriateness for your organization. If you leave those terms undefined, escalation becomes ad hoc and hard to defend during exams or audits. (COSO IC-IF (2013))

Who it applies to (entity and operational context)

Applies to: Organizations implementing the COSO Internal Control – Integrated Framework, including teams performing monitoring activities such as Internal Audit, Compliance, Risk, Finance controllership, Security assurance, and operational quality functions. (COSO IC-IF (2013))

Operational contexts where this shows up immediately:

  • SOX / ICFR environments: control failures, ineffective controls, or recurring deficiencies requiring management reporting and possible board-level awareness.
  • Regulated operations: compliance control breaches (e.g., failure to perform required reviews, missing approvals, incomplete reconciliations).
  • Third-party oversight: deficiencies in due diligence, contract controls, ongoing monitoring, or access governance tied to third parties (your controls can be deficient even if the root cause is a third party’s performance).
  • Security and privacy control monitoring: exceptions discovered through testing, continuous control monitoring, or incident reviews that indicate a control didn’t operate as designed.

What you actually need to do (step-by-step)

1) Define deficiency categories and evaluation criteria

Create a short standard that any reviewer can apply consistently. Include:

  • Deficiency definition: what constitutes a control deficiency versus an enhancement.
  • Severity scale: for example, low / moderate / high, or “operating effectively / needs improvement / ineffective.” Keep it simple enough to use.
  • Impact dimensions: financial reporting risk, regulatory compliance risk, customer harm, security/privacy impact, operational disruption, and reputational exposure.
  • Scope and recurrence: isolated vs systemic, first-time vs repeat, single control vs multiple controls.

Deliverable: a “Deficiency Evaluation Standard” embedded into your control testing methodology. (COSO IC-IF (2013))

2) Establish triggers (where deficiencies come from)

Document your intake sources so nothing is missed:

  • Internal audit findings and management letter points
  • Compliance testing results
  • Control self-assessments (CSAs)
  • Continuous monitoring alerts and KPI/KRI breaches
  • Incidents and post-incident reviews that reveal control breakdowns
  • Third-party monitoring results that indicate your oversight controls failed

Deliverable: a single intake log or system-of-record with required fields. (COSO IC-IF (2013))

3) Assign accountable owners immediately

The person who found the deficiency is rarely the person who can fix it. Set rules for ownership:

  • Control owner is accountable for corrective action plan and implementation.
  • Second-line reviewer (GRC/Compliance/Risk) challenges severity ratings and validates completeness.
  • Internal Audit (if applicable) remains independent and validates closure based on evidence.

Deliverable: RACI for deficiency management and escalation. (COSO IC-IF (2013))

4) Evaluate severity with documented rationale

For each deficiency, require a written evaluation that covers:

  • What control failed (or did not exist), and the control objective it was meant to meet
  • Root cause hypothesis (process, people, technology, third party, governance)
  • Exposure window (how long it may have existed) stated qualitatively if you cannot support dates
  • Downstream impacts and affected products, business lines, systems, or third parties
  • Proposed severity rating and why

Deliverable: a standardized “Deficiency Assessment” record (form or workflow). (COSO IC-IF (2013))

5) Communicate to the right level using pre-set escalation rules

Build an escalation matrix with explicit recipients and channels. Minimum expectations:

  • Corrective action owner notification: always, and promptly.
  • Senior management notification: for high-severity, systemic, repeat deficiencies, or items that put key obligations at risk.
  • Board/committee notification: for the most significant deficiencies or themes that affect governance responsibilities, risk appetite, or oversight.

A practical approach is to define “board appropriate” triggers such as: cross-business impact, repeated failure of a key control, or deficiencies that management cannot remediate without major program investment. Keep the triggers policy-based, not personality-based. (COSO IC-IF (2013))

Deliverables:

  • Escalation matrix
  • Templates for deficiency notification and executive summaries
  • Standing agenda item for management risk committee and, when appropriate, board/committee reporting (COSO IC-IF (2013))

6) Track corrective actions to closure, then validate effectiveness

You need more than a remediation “plan.” Require:

  • Corrective action steps, owners, dependencies, and milestones
  • Evidence of implementation (policy update, system change record, training completion, configuration proof, reconciliations)
  • Closure testing: re-perform the control, sample test, or other validation that the deficiency is resolved and not just restated

Deliverable: remediation tracker with status, evidence links, and closure sign-off. (COSO IC-IF (2013))

7) Report themes and systemic control health

Single findings matter, but patterns drive governance. Periodically aggregate:

  • Recurring deficiencies by process, control type, or business unit
  • Root cause themes (capacity, unclear procedures, poor system controls, third-party reliance)
  • Aging items and bottlenecks (ownership disputes, dependency delays)

Deliverable: management reporting pack and board-ready summaries as appropriate. (COSO IC-IF (2013))

Required evidence and artifacts to retain

Auditors will test whether your process works end-to-end. Keep artifacts that show each stage:

  • Deficiency intake record: source, date identified, reporter, affected control/process, initial description
  • Evaluation record: severity rating, impact narrative, rationale, root cause notes, scope assessment
  • Communication evidence: emails/meeting minutes/tickets showing notification to owner, senior management, and board/committee where appropriate
  • Remediation plan: actions, owners, due dates, dependencies, resourcing decisions
  • Implementation evidence: change tickets, updated procedures, training records, control design documentation
  • Closure testing evidence: test plan, samples, results, reviewer sign-off
  • Governance reporting: committee decks, risk acceptances, exception approvals if you permit temporary compensating controls (COSO IC-IF (2013))

Tip: if you run deficiency management in Daydream (or a comparable GRC workflow), enforce required fields and attach evidence directly to the deficiency record so you can produce a clean audit trail without manual stitching. (COSO IC-IF (2013))

Common exam/audit questions and hangups

Expect these lines of inquiry:

  • “How do you define a control deficiency versus a recommendation?” (COSO IC-IF (2013))
  • “Show me how you determine severity. Where is the documented rationale?” (COSO IC-IF (2013))
  • “What makes an issue ‘board appropriate’ in your organization?” (COSO IC-IF (2013))
  • “How do you ensure timely communication to corrective action owners?” (COSO IC-IF (2013))
  • “How do you prevent repeat findings? Where do you track root causes and themes?” (COSO IC-IF (2013))
  • “Show closed items. How did you validate the fix worked?” (COSO IC-IF (2013))

Hangups usually appear when escalation is informal (Slack messages, hallway conversations), or when closure is declared without testing.

Frequent implementation mistakes (and how to avoid them)

  1. No shared definition of “timely.”
    Avoidance: set internal service levels for initial triage and escalation in your standard operating procedure, then measure adherence internally. (COSO IC-IF (2013))

  2. Severity ratings drift by team.
    Avoidance: run periodic calibration sessions where Compliance/Risk reviews a sample of deficiency ratings for consistency. (COSO IC-IF (2013))

  3. Ownership assigned to the wrong role (or a group inbox).
    Avoidance: require a named accountable owner with decision rights and a backup delegate. (COSO IC-IF (2013))

  4. Remediation focuses on the symptom, not the control objective.
    Avoidance: force the remediation plan to state the control objective and how the fix restores it. (COSO IC-IF (2013))

  5. Closure without evidence or re-testing.
    Avoidance: define closure criteria that includes validation testing proportionate to severity. (COSO IC-IF (2013))

  6. Board reporting is either flooded or absent.
    Avoidance: build a board threshold and report themes, not every low-level exception. Escalate only what meets your criteria. (COSO IC-IF (2013))

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so you should treat enforcement context as indirect: deficiencies that are not evaluated and escalated tend to persist, become repeat findings, and can compound into reporting failures, compliance breaches, or incidents. The risk is governance failure as much as control failure: if senior management or the board should have been informed and wasn’t, examiners and auditors often view that as a breakdown in oversight. (COSO IC-IF (2013))

Practical execution plan (30/60/90)

First 30 days: Stand up the minimum viable process

  • Appoint a process owner (often GRC/Compliance) and confirm who can escalate to senior management and the board. (COSO IC-IF (2013))
  • Publish the deficiency definition, severity scale, and required fields for documentation. (COSO IC-IF (2013))
  • Create the intake log/system-of-record and start capturing all new deficiencies in one place. (COSO IC-IF (2013))
  • Draft the escalation matrix and confirm senior management/board routes. (COSO IC-IF (2013))

By 60 days: Make it repeatable and auditable

  • Implement workflow controls: required fields, evidence attachments, and approval steps for severity and closure. (COSO IC-IF (2013))
  • Train control owners and reviewers on how to write defensible evaluations and remediation plans. (COSO IC-IF (2013))
  • Start management reporting: open items, high-severity items, and themes. (COSO IC-IF (2013))

By 90 days: Prove it works and tighten governance

  • Run a calibration review of severity ratings across teams, then adjust criteria where ambiguity causes drift. (COSO IC-IF (2013))
  • Perform a retrospective on a sample of deficiencies: detection → evaluation → communication → remediation → validation. Fix breaks in the chain. (COSO IC-IF (2013))
  • Formalize board/committee reporting format and cadence for “board appropriate” deficiencies and themes. (COSO IC-IF (2013))

Frequently Asked Questions

What counts as an “internal control deficiency” for this requirement?

Any condition where a control is missing, poorly designed, or fails to operate as intended, reducing your ability to prevent or detect risk outcomes. Your policy should distinguish deficiencies from optional enhancements so teams escalate consistently. (COSO IC-IF (2013))

How do we decide whether to inform senior management or the board?

Define escalation triggers based on severity, scope, repeat occurrence, and governance relevance. Then apply the triggers consistently and document the rationale for why you escalated (or did not). (COSO IC-IF (2013))

Do we need to communicate every deficiency to the board?

No. COSO calls out board communication “as appropriate,” which implies a threshold. Report significant deficiencies and themes that affect oversight, risk appetite, or systemic control health. (COSO IC-IF (2013))

What evidence do auditors expect to see for “communication”?

They typically want traceable proof that you notified the accountable owner and escalated per your matrix: tickets with timestamps, emails, meeting minutes, or governance decks. The evidence should link to the deficiency record and remediation actions. (COSO IC-IF (2013))

Can we close a deficiency once the fix is deployed, or do we have to retest?

Closure should include validation that the control now operates effectively; otherwise you only proved deployment, not effectiveness. Define closure criteria that require testing proportional to severity and document the results. (COSO IC-IF (2013))

How does this apply to third-party risk management?

Many “third-party issues” are really your internal control deficiencies, such as weak due diligence, missing contract controls, or poor ongoing monitoring. Treat those as deficiencies in your control framework, assign internal owners, and escalate based on impact. (COSO IC-IF (2013))

Frequently Asked Questions

What counts as an “internal control deficiency” for this requirement?

Any condition where a control is missing, poorly designed, or fails to operate as intended, reducing your ability to prevent or detect risk outcomes. Your policy should distinguish deficiencies from optional enhancements so teams escalate consistently. (COSO IC-IF (2013))

How do we decide whether to inform senior management or the board?

Define escalation triggers based on severity, scope, repeat occurrence, and governance relevance. Then apply the triggers consistently and document the rationale for why you escalated (or did not). (COSO IC-IF (2013))

Do we need to communicate every deficiency to the board?

No. COSO calls out board communication “as appropriate,” which implies a threshold. Report significant deficiencies and themes that affect oversight, risk appetite, or systemic control health. (COSO IC-IF (2013))

What evidence do auditors expect to see for “communication”?

They typically want traceable proof that you notified the accountable owner and escalated per your matrix: tickets with timestamps, emails, meeting minutes, or governance decks. The evidence should link to the deficiency record and remediation actions. (COSO IC-IF (2013))

Can we close a deficiency once the fix is deployed, or do we have to retest?

Closure should include validation that the control now operates effectively; otherwise you only proved deployment, not effectiveness. Define closure criteria that require testing proportional to severity and document the results. (COSO IC-IF (2013))

How does this apply to third-party risk management?

Many “third-party issues” are really your internal control deficiencies, such as weak due diligence, missing contract controls, or poor ongoing monitoring. Treat those as deficiencies in your control framework, assign internal owners, and escalate based on impact. (COSO IC-IF (2013))

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
COSO: Deficiency Evaluation and Communication | Daydream