Management Override of Controls
The management override of controls requirement means your fraud risk assessment must explicitly evaluate how executives and other leaders could bypass, direct others to bypass, or otherwise defeat internal controls, and what you do to prevent and detect it. You operationalize it by mapping override scenarios to concrete control points, assigning monitoring owners, and retaining evidence that testing covered override pathways (COSO IC-IF (2013)).
Key takeaways:
- Your fraud risk assessment must name management override as a distinct fraud risk and assess realistic override scenarios (COSO IC-IF (2013)).
- Prevention is not enough; you need detective monitoring that can surface override behavior after the fact.
- Evidence has to show end-to-end coverage: scenarios → controls → monitoring/testing → issue management.
Management override is the uncomfortable fraud risk that exists even in mature control environments: the people who approve controls, own budgets, or have privileged access can sometimes bypass the very safeguards designed to prevent improper activity. COSO treats this as a specific consideration in fraud risk assessment, not a generic “fraud exists” statement. The operational bar is straightforward: your fraud risk assessment should explicitly consider override risk and drive mitigations that are testable (COSO IC-IF (2013)).
For a Compliance Officer, CCO, or GRC lead, the fastest path is to make override risk concrete. “Override” is not a single control gap. It shows up as pressured quarter-end entries, exceptions approved without support, manual changes to key data, backdated approvals, emergency access that quietly becomes permanent, or leadership influence that deters challenge. Your job is to (1) document plausible override methods in your environment, (2) verify there are controls that would still work if a senior person tried to bypass normal workflows, and (3) implement monitoring that can detect suspicious patterns even when approvals look “proper” on paper.
This page gives requirement-level guidance you can implement quickly: scope, steps, artifacts, audit questions, common mistakes, and a practical execution plan anchored to COSO’s Principle 8 point of focus (COSO IC-IF (2013)).
Regulatory text
Excerpt (requirement): “The assessment of fraud risk considers the risk of management override of internal controls.” (COSO IC-IF (2013))
What the operator must do: In your fraud risk assessment (or equivalent risk assessment process), you must explicitly identify management override as a fraud risk, evaluate how it could occur in your organization, and ensure the control environment includes preventive and detective measures that address override pathways (COSO IC-IF (2013)). The output must be more than a sentence; it should drive control design, monitoring, and testing you can evidence to auditors.
Plain-English interpretation (what this means in practice)
Management override risk is the risk that leaders can:
- Bypass controls directly (e.g., approve their own exceptions, direct staff to process outside workflow).
- Manipulate key records (e.g., journals, accruals, reserves, revenue recognition inputs, vendor master data, customer terms).
- Exploit privileged access (e.g., admin rights, emergency access, “break-glass” accounts).
- Suppress challenge (e.g., influencing subordinates or discouraging escalation).
Operationally, you need two things:
- Design for independence and friction in high-risk approvals so a senior person cannot complete a high-impact action alone.
- Detective visibility so that if override happens, it leaves signals that are reviewed by someone independent.
Who it applies to
Entity scope: Any organization using the COSO Internal Control – Integrated Framework as a basis for internal control and fraud risk assessment, including teams supporting internal audit activities (COSO IC-IF (2013)).
Operational context (where override shows up most):
- Finance and accounting: journal entries, close, estimates, reserves, write-offs.
- Procurement and payables: new suppliers, changes to bank details, PO/receiving exceptions, single-source justifications.
- Revenue and contracting: pricing overrides, credit memos, side letters, booking timing.
- IT and security: privileged access, disabling logging, changing system configurations, emergency changes.
- Third-party management: onboarding decisions, due diligence exceptions, sanction screening overrides, “rush” engagements.
What you actually need to do (step-by-step)
Step 1: Define “management” and “override” for your program
Write a short scoping statement used consistently across risk assessment, internal audit coordination, and investigations:
- Who counts as “management” (titles, roles, delegated authorities, system admin roles).
- What counts as “override” (policy exception, bypassing workflow, forced approvals, manual postings, out-of-band instructions).
Deliverable: Override Risk Definition + Scope note (owned by Compliance or GRC; reviewed by Internal Audit if applicable).
Step 2: Build an override scenario inventory tied to your real workflows
Create a list of plausible override scenarios. Keep it practical and specific:
- “CFO directs a manual journal entry outside normal approval to hit earnings target.”
- “VP approves an exception to third-party due diligence for an urgent engagement.”
- “Controller backdates approvals or changes close period status.”
- “IT admin grants themselves or management elevated privileges without independent review.”
For each scenario, capture:
- Process/system
- Actor(s) with ability
- Asset/statement line impacted (financial, data, regulatory, reputation)
- Likely concealment method (e.g., splitting transactions, using generic accounts, using temporary IDs)
Deliverable: Management Override Scenario Register.
Step 3: Map scenarios to control points (prevent, detect, respond)
For each scenario, identify existing controls and gaps across three layers:
- Preventive controls
- Segregation of duties for high-risk actions
- Dual approvals, independent approval authority
- System-enforced workflows (no “offline” processing)
- Policy limits and thresholds
- Detective controls
- Journal entry analytics and review
- Exception reporting (policy overrides, late approvals, after-hours activity)
- Privileged access monitoring
- Master data change reports (supplier bank account, customer credit terms)
- Response controls
- Escalation routes that bypass the chain of command implicated in the override
- Investigation playbooks
- Disciplinary framework alignment
- Control remediation workflow
Deliverable: Override Control Coverage Matrix (scenario → controls → owner → frequency → evidence).
Step 4: Assign independent ownership and set review triggers
Override risk fails when the reviewer is not independent. For each detective review, specify:
- Reviewer independence criteria (not in the approval chain; not reporting to the subject where possible)
- Triggers (e.g., manual entries above a set internal threshold; changes to sensitive fields; emergency access use)
- Escalation path (Compliance, Audit, Audit Committee, HR, Legal depending on severity)
Deliverable: Monitoring & Escalation RACI for override signals.
Step 5: Test what you designed (tabletop + sample-based testing)
You need evidence that controls work under pressure. Use:
- Tabletop walkthroughs of 2–3 high-risk scenarios with Finance, IT, and Compliance to confirm “could this happen here?”
- Sample-based testing of exceptions and sensitive changes to confirm approvals, documentation, and independence.
- Access reviews focusing on who can post, approve, or change key configurations.
Deliverable: Override Risk Test Plan + results, with issues logged and tracked.
Step 6: Embed in your fraud risk assessment cadence and governance
Update your fraud risk assessment methodology so management override is:
- A required section
- A mandatory scenario category
- Tied to action items and timelines
- Reported to an appropriate governance body
Deliverable: Fraud Risk Assessment report section addressing override risk (COSO IC-IF (2013)).
Required evidence and artifacts to retain
Auditors and examiners generally want to see traceability from requirement to execution. Retain:
- Fraud risk assessment with explicit management override coverage (COSO IC-IF (2013))
- Management Override Scenario Register (versioned)
- Override Control Coverage Matrix (scenario-to-control mapping)
- Logs/reports used for monitoring (journal entry reports, exception reports, privileged access logs)
- Evidence of review (sign-offs, tickets, annotations, meeting minutes)
- Access review outputs and remediation evidence
- Documented exceptions (who approved, rationale, compensating controls)
- Investigation records for escalations (with confidentiality controls)
- Training/communications on escalation and non-retaliation expectations (where applicable)
Practical tip: Store artifacts in a single “Management Override of Controls” evidence folder with a simple index. In Daydream, teams often implement this as a control objective with linked evidence tasks and recurring review workflows to prevent last-minute evidence scrambles.
Common exam/audit questions and hangups
Use these to pre-brief process owners:
- “Show me where management override is addressed in your fraud risk assessment.”
- “What scenarios did you consider, and why are they credible here?”
- “Who reviews journal entries, exceptions, or privileged access activity, and how do you know they’re independent?”
- “How do you detect override that looks ‘properly approved’?” (Focus on pattern-based monitoring and post-facto analytics.)
- “How are exceptions handled? Are there compensating controls and tracked remediation?”
- “Show evidence of reviews for the last period and the issues raised.”
Hangups auditors commonly flag:
- Generic narrative with no scenario-to-control mapping
- Reviews performed but not evidenced (no sign-off, no retained report)
- Independence not defensible (reviewer reports to the approver)
Frequent implementation mistakes (and how to avoid them)
-
Treating override as purely a tone-at-the-top topic
Fix: Add concrete, testable detective controls (exception reporting, analytics, access monitoring). -
Listing override risk but not changing anything operationally
Fix: Require at least one new monitoring control or strengthened approval gate for the highest-risk scenario category. -
Over-scoping to “all management actions”
Fix: Prioritize pathways with the largest impact: financial reporting, cash disbursements, master data, privileged access. -
Relying on manual reviews without a defined population
Fix: Specify the report, the population, the trigger, and the retention method. -
Weak exception governance
Fix: Centralize exceptions, require rationale, set compensating controls, and make exceptions reportable to Compliance/GRC.
Enforcement context and risk implications
No public enforcement case sources were provided in the approved source catalog for this requirement, so this page does not cite specific actions. Practically, management override failures tend to surface as material misstatements, improper payments, conflicts of interest, or concealed related-party activity. The risk is rarely limited to one control; it becomes a governance failure because override can defeat multiple safeguards at once.
Practical 30/60/90-day execution plan
First 30 days (Immediate)
- Confirm scope and definitions for “management” and “override.”
- Run a workshop with Finance, IT, and Compliance to draft the initial Scenario Register.
- Identify existing detective reports (journals, exceptions, privileged access) and assess whether someone independent reviews them.
- Create a single evidence index and begin saving current-period reports and sign-offs.
By 60 days (Near-term build)
- Complete the Override Control Coverage Matrix and document gaps.
- Implement or tighten monitoring for the top override scenarios (start with what you can instrument quickly: exception reports, access logs, master data change reports).
- Formalize escalation paths and independence criteria in a short procedure.
- Pilot sample-based testing of exceptions and sensitive changes; log issues and remediation owners.
By 90 days (Operationalize and govern)
- Embed management override into the fraud risk assessment template and approval workflow (COSO IC-IF (2013)).
- Report status, findings, and remediation to the relevant governance forum.
- Convert monitoring into recurring tasks with evidence retention expectations (a GRC workflow tool like Daydream can assign owners, prompt reviews, and attach artifacts to the control).
- Validate sustainability: coverage for staffing changes, system changes, and quarter-end pressure periods.
Frequently Asked Questions
Does “management override of controls” only apply to financial reporting controls?
No. Financial reporting is a common hotspot, but override also applies to procurement, third-party onboarding exceptions, IT privileged access, and any process where leadership can bypass normal approvals (COSO IC-IF (2013)).
What counts as evidence that we “considered” management override in the fraud risk assessment?
A defensible scenario list plus a mapping to controls and monitoring is the cleanest evidence. A single narrative sentence without scenarios, owners, and testing usually fails scrutiny (COSO IC-IF (2013)).
How do we show reviewer independence in a practical way?
Document independence criteria in the procedure and reflect it in the RACI (for example, reviews owned by Internal Audit, Compliance, controllership staff outside the approval chain, or a separate security team for access logs). Keep org charts or role descriptions available to support independence questions.
We allow emergency access (“break-glass”). Is that automatically noncompliant?
No, but it increases override risk. You need strong logging, time-bounded access, post-use review, and an escalation process for suspicious or repeated use.
What if executives insist on “rush” exceptions for third parties or contracts?
Treat exceptions as a controlled process: require written rationale, compensating controls, a time limit, and centralized reporting to Compliance/GRC. Track repeat exception requesters as an override risk signal.
How can we operationalize this without adding heavy process overhead?
Start with detective controls using existing data (journal entry reports, access logs, exception queues), assign independent reviewers, and retain evidence. Automating recurring reviews and evidence capture in Daydream reduces manual follow-up and missing artifacts.
Frequently Asked Questions
Does “management override of controls” only apply to financial reporting controls?
No. Financial reporting is a common hotspot, but override also applies to procurement, third-party onboarding exceptions, IT privileged access, and any process where leadership can bypass normal approvals (COSO IC-IF (2013)).
What counts as evidence that we “considered” management override in the fraud risk assessment?
A defensible scenario list plus a mapping to controls and monitoring is the cleanest evidence. A single narrative sentence without scenarios, owners, and testing usually fails scrutiny (COSO IC-IF (2013)).
How do we show reviewer independence in a practical way?
Document independence criteria in the procedure and reflect it in the RACI (for example, reviews owned by Internal Audit, Compliance, controllership staff outside the approval chain, or a separate security team for access logs). Keep org charts or role descriptions available to support independence questions.
We allow emergency access (“break-glass”). Is that automatically noncompliant?
No, but it increases override risk. You need strong logging, time-bounded access, post-use review, and an escalation process for suspicious or repeated use.
What if executives insist on “rush” exceptions for third parties or contracts?
Treat exceptions as a controlled process: require written rationale, compensating controls, a time limit, and centralized reporting to Compliance/GRC. Track repeat exception requesters as an override risk signal.
How can we operationalize this without adding heavy process overhead?
Start with detective controls using existing data (journal entry reports, access logs, exception queues), assign independent reviewers, and retain evidence. Automating recurring reviews and evidence capture in Daydream reduces manual follow-up and missing artifacts.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream