Significant Change Identification
To meet the Significant Change Identification requirement, you must run a repeatable process that detects internal and external changes, evaluates whether they could materially affect your system of internal control, and triggers timely updates to risk assessments, controls, and monitoring. This is an operational “change-to-risk-to-control” workflow, not a one-time risk exercise. (COSO IC-IF (2013))
Key takeaways:
- Define what “significant change” means for your control environment, with clear triggers and owners. (COSO IC-IF (2013))
- Build intake channels (business, IT, HR, legal, third party) so changes surface early, not after an incident. (COSO IC-IF (2013))
- Require documented assessment outcomes and follow-through actions: control updates, testing, and governance sign-off. (COSO IC-IF (2013))
Significant Change Identification sits inside COSO’s Risk Assessment principle and forces a practical discipline: changes happen constantly, and your internal controls are only effective if they evolve with the business. The requirement is simple to say and easy to fail in practice. Teams either treat “change” as an IT change-management topic only, or they log changes without connecting them to control impacts, resulting in stale control narratives, outdated risk assessments, and gaps during audits.
Operationalizing this requirement means you need three things that work together: (1) a shared definition of “significant” that your business can apply consistently, (2) reliable detection methods across the enterprise (including third parties), and (3) a documented assessment and action workflow that produces evidence. Your job as a Compliance Officer, CCO, or GRC lead is to make the workflow lightweight enough to run continuously, but formal enough that it holds up under scrutiny.
The rest of this page gives you requirement-level guidance you can implement quickly: triggers, steps, decision criteria, artifacts, and the audit questions you should be able to answer on demand. (COSO IC-IF (2013))
Regulatory text
Requirement (excerpt): “The organization identifies and assesses changes that could significantly impact the system of internal control.” (COSO IC-IF (2013))
Operator interpretation: You must maintain a process to (1) identify relevant changes, (2) assess their potential effect on internal control design and operating effectiveness, and (3) make controlled updates (controls, ownership, testing, monitoring, documentation) when changes cross your “significant” threshold. Evidence must show you did this consistently, not only during annual risk assessments. (COSO IC-IF (2013))
Plain-English interpretation (what the requirement is really asking)
A “significant change” is any internal or external shift that could make existing controls insufficient, misaligned, or inconsistently executed. COSO calls out common sources of change: operating environment, leadership, business model, and regulatory landscape. (COSO IC-IF (2013))
In practice, you are building a bridge between:
- Change signals (what changed),
- Risk implications (what could go wrong now),
- Control impacts (what must be added/modified/retired),
- Assurance actions (what to test and monitor next).
Who it applies to
Entity types: Organizations and internal auditors. (COSO IC-IF (2013))
Operational context (where it shows up):
- Enterprise risk and controls: updates to risk register, control library, control narratives, and monitoring plans.
- Governance changes: leadership transitions, reorganizations, changes in authority, new committees, altered approval thresholds.
- Business model shifts: new products, new markets, pricing changes, outsourcing, acquisitions, new revenue recognition patterns.
- Technology and data: core system replacements, new integrations, identity changes, new hosting model, data retention changes.
- Regulatory landscape: new regulatory obligations, updated guidance, or changes in how regulators interpret expectations. (COSO IC-IF (2013))
- Third party dependencies: onboarding a new third party, major changes to an existing third party’s service scope, subprocessor changes, or concentration risks that alter operational resilience.
What you actually need to do (step-by-step)
Step 1: Define “significant change” in control-impact terms
Write a short standard that answers two questions:
- What types of changes must be assessed?
- What makes a change “significant” enough to trigger control updates and governance review? (COSO IC-IF (2013))
A practical definition usually ties “significant” to one or more of:
- Material change to a key process in scope for compliance, reporting, privacy, security, or operational risk.
- Change to control ownership or segregation of duties.
- Introduction of a new system or removal of a system that supports a controlled process.
- Change to data classification, data flows, or retention that affects control requirements.
- Entry into a new jurisdiction or regulatory regime.
- Major changes in third party reliance or critical service providers.
Deliverable: a one-page “Significant Change Criteria” standard plus examples.
Step 2: Build change intake channels (so you hear about change early)
Map where changes originate, then establish intake paths that don’t depend on people remembering to email compliance.
Common intake sources:
- IT change management and architecture review boards
- Procurement and third-party onboarding
- HR (leadership changes, org restructures)
- Legal/regulatory change management
- Product governance / new product approval
- Finance controllership (close process changes)
- Incident and problem management (signals of unaddressed change)
Minimum operational rule: every intake source must produce a ticket, record, or agenda item that can be routed to GRC for triage. (COSO IC-IF (2013))
Tooling note: teams often implement this with a simple workflow in their GRC system. If you use Daydream, set up a “Significant Change” intake form with required fields (change description, affected process/system, third party impact, planned date, executive owner), then route it to control owners for structured impact assessment.
Step 3: Triage quickly using a “change-to-control” decision matrix
Create a short decision matrix that drives consistent outcomes. Example:
| Question | If “Yes” | Evidence produced |
|---|---|---|
| Does this change affect a controlled process, system, or report? | Assign control owner assessment | Triage notes + owner assignment |
| Does it introduce a new risk or increase likelihood/impact of an existing risk? | Update risk assessment entry | Updated risk statement + rationale |
| Do existing controls still address the risk as designed? | If no, open control change | Control update request + revised control description |
| Does the change impact a third party service or reliance? | Trigger third-party reassessment | Updated third-party record + review outcome |
| Should we increase testing/monitoring due to uncertainty? | Adjust testing plan | Updated testing plan or monitoring KPIs |
The matrix is how you prove you “assess,” not just “identify.” (COSO IC-IF (2013))
Step 4: Perform the impact assessment (documented, owned, time-bound)
For changes that pass triage, require a short assessment with:
- What changed (scope, timing, systems, stakeholders)
- Risks affected (new risks or shifts to existing risks)
- Controls affected (add/change/retire; design changes; ownership changes)
- Residual risk and whether risk acceptance is needed
- Testing/monitoring changes (what assurance activities change)
Assign a single accountable owner (process owner or control owner). Compliance/GRC facilitates and challenges; they should not be the default author for operational details.
Step 5: Execute control updates with governance and traceability
Control updates should not live in email threads. Require:
- Revised control descriptions and procedures
- Updated RACI (owner/operator/reviewer)
- Updated control mappings (risks, systems, third parties)
- Approval workflow for material control changes
- A testing plan update that matches the new design (COSO IC-IF (2013))
Step 6: Close the loop with monitoring (so it doesn’t die after assessment)
Operationalize two ongoing checks:
- Change backlog review: open significant-change items, overdue assessments, overdue control updates.
- Effectiveness check: post-change validation (e.g., targeted control test after go-live, or heightened monitoring during early operations). (COSO IC-IF (2013))
Required evidence and artifacts to retain
You want an auditor to be able to trace: signal → assessment → decision → action → verification.
Retain at least:
- Significant Change Criteria standard (definition, triggers, examples) (COSO IC-IF (2013))
- Change intake records (tickets/forms/meeting minutes) showing capture and routing
- Triage results (why it was or wasn’t significant)
- Impact assessment write-ups with named owner and date
- Updated risk assessments/risk register entries
- Control change records: updated control narratives, procedures, and approvals
- Evidence of implementation (e.g., updated configurations, training records, communications)
- Updated testing/monitoring plan and results of any post-change validation
Common exam/audit questions and hangups
Be ready to answer these cleanly, with artifacts:
- “How do you define ‘significant change’?” Show criteria and examples; avoid “we know it when we see it.” (COSO IC-IF (2013))
- “How do changes get to you?” Demonstrate multiple intake channels and routine governance touchpoints.
- “Show me a recent change and how you assessed it.” Provide end-to-end traceability.
- “How do you ensure control documentation stays current?” Point to control change workflow and required updates.
- “How do you cover third parties?” Show triggers tied to onboarding, renewals, scope changes, and criticality.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Only IT changes are evaluated.
Fix: Make the intake map cross-functional (HR, Legal, Finance, Procurement, Product). (COSO IC-IF (2013)) -
Mistake: “Identification” without assessment.
Fix: Require triage outcomes and documented control impacts, even when the conclusion is “no change required.” (COSO IC-IF (2013)) -
Mistake: Vague significance criteria.
Fix: Use explicit triggers tied to controlled processes, systems, and third party dependencies. -
Mistake: Control updates happen, but testing doesn’t.
Fix: Make “testing plan update” a closure requirement for significant changes. -
Mistake: Evidence scattered across email and chat.
Fix: Centralize in a system of record (GRC workflow or ticketing integration) and enforce required fields.
Risk implications (why this fails in real organizations)
If you do not identify and assess significant changes, control failures tend to cluster around transitions: new systems, reorganizations, outsourcing, acquisitions, rapid product changes, and regulatory updates. The risk pattern is predictable: responsibilities shift, process steps move, data flows change, and controls either stop operating or operate against the wrong risk. COSO’s expectation is that you treat change as a standing input into risk assessment and internal control upkeep. (COSO IC-IF (2013))
Practical 30/60/90-day execution plan
First 30 days: Stand up the minimum viable workflow
- Publish “Significant Change Criteria” with clear triggers and ownership. (COSO IC-IF (2013))
- Identify intake sources and add GRC as a required reviewer for defined change categories.
- Create a standard assessment template and decision matrix.
- Start a centralized log (GRC workflow preferred) and require all new items to enter through it.
Days 31–60: Connect the workflow to controls and third parties
- Map change categories to affected control domains and assign control-owner reviewers.
- Integrate procurement and third-party lifecycle events into the intake process.
- Pilot the workflow with a small number of changes and run a lessons-learned review.
- Define governance cadence: standing agenda item in a risk or control committee. (COSO IC-IF (2013))
Days 61–90: Prove it works and make it auditable
- Run a short internal audit-style review: sample completed changes and verify traceability.
- Tighten criteria where triage decisions were inconsistent.
- Add closure rules: no significant change closes until control updates and validation steps are complete.
- Build a dashboard for open items, overdue assessments, and control changes pending approval.
Frequently Asked Questions
What counts as a “significant change” under COSO Principle 9?
COSO requires you to identify and assess changes that could significantly impact internal control, including changes in operating environment, leadership, business model, and regulatory landscape. Your job is to translate that into explicit triggers tied to your controlled processes and systems. (COSO IC-IF (2013))
Do we need to assess every change request or project?
No. You need a triage mechanism that reliably catches changes that could affect internal control. Document the triage decision so you can show why a change did not require a full assessment. (COSO IC-IF (2013))
How do we prove we “assessed” a change?
Keep a record that states what changed, what risks and controls were impacted, what actions were taken (or not), who approved the decision, and how you verified the updated control design or operation. (COSO IC-IF (2013))
How should third parties be included in significant change identification?
Treat third-party scope, criticality, and dependency changes as explicit triggers. If a third party starts handling new data types, supporting a key process, or changing how services are delivered, route it through the same change-to-control assessment workflow. (COSO IC-IF (2013))
Who should own the assessment: Compliance or the business?
The process or control owner should own the assessment content because they understand the operational reality. Compliance/GRC should own the workflow, quality control, challenge function, and evidence standards. (COSO IC-IF (2013))
What if we discover a significant change after it already happened?
Capture it as a late-identified change, perform the impact assessment retroactively, and document corrective actions: control updates, targeted testing, and process changes to prevent repeat misses. Treat it as a signal that intake channels need strengthening. (COSO IC-IF (2013))
Frequently Asked Questions
What counts as a “significant change” under COSO Principle 9?
COSO requires you to identify and assess changes that could significantly impact internal control, including changes in operating environment, leadership, business model, and regulatory landscape. Your job is to translate that into explicit triggers tied to your controlled processes and systems. (COSO IC-IF (2013))
Do we need to assess every change request or project?
No. You need a triage mechanism that reliably catches changes that could affect internal control. Document the triage decision so you can show why a change did not require a full assessment. (COSO IC-IF (2013))
How do we prove we “assessed” a change?
Keep a record that states what changed, what risks and controls were impacted, what actions were taken (or not), who approved the decision, and how you verified the updated control design or operation. (COSO IC-IF (2013))
How should third parties be included in significant change identification?
Treat third-party scope, criticality, and dependency changes as explicit triggers. If a third party starts handling new data types, supporting a key process, or changing how services are delivered, route it through the same change-to-control assessment workflow. (COSO IC-IF (2013))
Who should own the assessment: Compliance or the business?
The process or control owner should own the assessment content because they understand the operational reality. Compliance/GRC should own the workflow, quality control, challenge function, and evidence standards. (COSO IC-IF (2013))
What if we discover a significant change after it already happened?
Capture it as a late-identified change, perform the impact assessment retroactively, and document corrective actions: control updates, targeted testing, and process changes to prevent repeat misses. Treat it as a signal that intake channels need strengthening. (COSO IC-IF (2013))
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream