Key versus Non-Key Controls

Article by Prof. Hernan Huwyler, MBA, CPA, CAIO
AI GRC Director | AI Risk Manager | Quantitative Risk Lead
Speaker, Corporate Trainer and Executive Advisor
Top 10 Responsible AI and Risk Management by Thinkers360

Key Controls Versus Non-Key Controls In SOX: How To Distinguish What Matters For Testing And Documentation

There is not any official definition for a key control in SOX. Some guidance about this topic is taken from the PCAOB AS 5.11, but a clear distinction from “key controls” and “non-key controls” is not codified. It is entirely a matter of judgment and there is no commonly accepted definition of a key control. However, being able to distinguish both concepts can save time on documenting and testing controls that are not important. In this post, I described some common characteristics about these categories.

A Key Control has the following characteristics:
It is required to provide reasonable assurance that material errors will be prevented or timely detected
It is the only control that covers a risk of material misstatement (it is indispensable to cover its control objective)
If it fails, it is highly improbable that other control could detect the control absence.
It is a control that covers more than one risk or support a whole process execution
It is usually part of entity-level controls or high-level analytic controls
It need to be tested to provide assurance over financial assertions (as part of the SOX Compliance)

A Non-Key Control has the following characteristics:
It is also referred as sub-process, secondary, activity or operative control
It can fail without affecting a whole process
It is in place to monitor certain information
It have an indirect effect on the risk of material misstatement
Its importance should not be minimized (they are subject to monitoring)
It should not involve significant transactions
It is generally eliminated for testing purposes (as part of control rationalization or streamlining efforts)
Its testing can involve getting the walk-though documentation
It could be evaluated under a Control Self Assessment (CSA) program


The Practical Importance Of Distinguishing Key Controls

One of the most consequential decisions in a SOX compliance program is determining which internal controls are key controls that must be formally documented, tested, and reported upon, and which are supporting or non-key controls that contribute to the control environment but do not require the same level of audit evidence. This distinction directly affects the cost, scope, and efficiency of the compliance program. Organizations that fail to make this distinction rigorously tend to over-document and over-test, consuming audit resources on controls that do not materially affect the reliability of financial reporting. Organizations that draw the line too aggressively risk excluding controls that are genuinely necessary to support the integrity of their financial statements.

Despite its practical importance, the distinction between key and non-key controls is not formally codified in a single authoritative definition. The determination is fundamentally a matter of professional judgment, informed by the applicable auditing standards, the organization's risk assessment, and the specific characteristics of its financial reporting processes.

What The PCAOB Standards Actually Say

The PCAOB Auditing Standard AS 2201, titled An Audit of Internal Control Over Financial Reporting That Is Integrated with An Audit of Financial Statements, provides the most relevant authoritative guidance for external auditors on identifying which controls are important to the audit of internal control over financial reporting. This standard was originally issued as AS No. 5 in 2007 and was subsequently reorganized and renumbered as AS 2201 as part of the PCAOB's reorganization of its interim and final auditing standards. References to AS 5 remain common in practice, and both designations refer to the same substantive guidance.

AS 2201 does not use the term key control as a defined term. Instead, it directs the auditor to identify controls that are important to the auditor's conclusion about whether the company maintains effective internal control over financial reporting. The standard establishes a top-down, risk-based approach in which the auditor begins by identifying significant accounts and disclosures and their relevant assertions, then identifies the controls that address the risks of material misstatement associated with those assertions. This approach is designed to focus audit effort on the controls that matter most rather than requiring testing of every control that exists within the organization.

Paragraph 21 of AS 2201 states that the auditor should test those controls that are important to the auditor's conclusion about whether the company's controls sufficiently address the assessed risk of material misstatement to each relevant assertion. The standard further specifies that the auditor should focus on entity-level controls, controls over the period-end financial reporting process, controls over significant accounts and disclosures, and controls designed to prevent or detect fraud.

The concept of control precision is also important in understanding which controls are likely to be classified as key. Controls that operate at a higher level of precision, meaning that they are designed to detect misstatements at a sufficiently low threshold to prevent a material error from going undetected, are more likely to be identified as key controls. Conversely, controls that monitor general trends or aggregate data without the precision to identify specific misstatements typically function as supporting controls rather than key controls.

Characteristics Of Key Controls

Although no single definition exists, the professional literature, audit methodology guidance from the major accounting firms, and practical experience converge on several characteristics that consistently distinguish key controls from supporting controls.

A key control provides reasonable assurance that a material misstatement in the financial statements will be prevented or detected on a timely basis. This is the foundational characteristic. The control must operate with sufficient precision and frequency to address the risk of material misstatement for a specific relevant assertion, such as existence, completeness, valuation, rights and obligations, or presentation and disclosure.

A key control directly addresses a risk of material misstatement for a significant account or disclosure. Under the top-down approach of AS 2201, the identification of key controls begins with the identification of significant accounts and their relevant assertions. A control qualifies as key when it is the primary mechanism through which the organization mitigates a specific identified risk of material misstatement. In many cases, a key control is the only control that covers a particular risk, making it indispensable. If the control fails and no other control in the system can compensate for the failure, the risk of material misstatement increases to an unacceptable level.

A key control may address multiple risks or support the integrity of an entire process. Some controls operate at a level that provides assurance across several related risks or across an end-to-end process. Period-end management review controls, automated application controls that enforce data integrity across multiple transaction types, and reconciliation controls that validate the completeness and accuracy of an entire account balance are common examples. The breadth of a control's coverage can be an indicator of its key status, though breadth alone is not sufficient without the requisite precision.

A key control may operate at the entity level or the transaction level. The original post stated that key controls are usually part of entity-level controls or high-level analytic controls. In practice, this characterization is incomplete. While entity-level controls such as the control environment, risk assessment processes, and monitoring activities established under the COSO Internal Control Integrated Framework of 2013 are important and may qualify as key controls when they operate with sufficient precision, many of the most critical key controls in a SOX compliance program are transaction-level controls that operate within specific business processes. Automated three-way matching in procure-to-pay, system-enforced posting rules in the general ledger, and authorization controls over journal entries are all transaction-level controls that frequently qualify as key. The level at which a control operates does not determine its classification. What determines its classification is whether it directly and precisely addresses a risk of material misstatement.

A key control must be tested to support management's assessment and the external auditor's opinion on internal control over financial reporting. Under SOX Section 404(a), management is required to assess and report on the effectiveness of the organization's internal controls over financial reporting. Under SOX Section 404(b), the external auditor is required to attest to management's assessment for accelerated filers and large accelerated filers. Key controls are the controls that must be tested with sufficient evidence, including inquiry, observation, inspection, and reperformance, to support these assessments and opinions.

Characteristics Of Non-Key Controls

Non-key controls, also referred to in practice as supporting controls, secondary controls, sub-process controls, activity-level controls, or operative controls, contribute to the overall control environment but do not individually provide the level of assurance required to address a risk of material misstatement. Their characteristics are defined in contrast to key controls.

A non-key control can fail without directly resulting in a material misstatement. The defining characteristic of a non-key control is that its failure, while potentially creating operational issues or increasing the likelihood that errors enter the process, does not by itself result in an unmitigated risk of material misstatement. Other controls in the system, particularly the key controls, are designed to detect or prevent the misstatement that might result from the non-key control's failure.

A non-key control has an indirect rather than direct effect on the risk of material misstatement. Non-key controls typically support the functioning of key controls or provide supplementary monitoring over process execution. For example, a supervisory review of data entry accuracy supports the integrity of information that flows into a key reconciliation control, but the supervisory review itself may not operate with the precision or coverage necessary to independently prevent a material misstatement.

A non-key control monitors specific operational information or process steps. Many non-key controls exist to ensure operational accuracy, process efficiency, or compliance with internal policies at a granular level. They serve important business purposes and should not be treated as unimportant simply because they do not qualify as key for SOX testing purposes. Their operational value is distinct from their role in the financial reporting control framework.

A non-key control is typically excluded from the formal SOX testing program through a process of control rationalization. Control rationalization, also referred to as control streamlining or scoping optimization, is the disciplined process of evaluating the complete population of controls within each significant process and determining which controls are necessary and sufficient to address the relevant risks of material misstatement. Controls that are determined to be non-key are removed from the formal testing program, reducing the compliance burden without reducing the quality of assurance over financial reporting. This rationalization process should be documented and approved by the process owner and the SOX program manager to ensure that the exclusion decision is justified and traceable.

A non-key control may be evaluated through alternative assurance mechanisms. Although non-key controls are excluded from formal SOX testing, they should not be abandoned entirely. Walk-through procedures, which involve tracing a transaction through the process from initiation to recording to confirm the auditor's understanding of the process and the controls within it, may encompass non-key controls as part of the overall process documentation. Control Self-Assessment programs, in which process owners and operational management evaluate the design and operating effectiveness of their own controls with oversight from internal audit or the compliance function, provide a cost-effective mechanism for maintaining visibility over non-key controls without subjecting them to the same level of independent testing required for key controls.

The importance of non-key controls should not be minimized. Non-key controls remain subject to management monitoring and should be included in the organization's broader internal control framework even when they are excluded from the formal SOX testing scope. A non-key control that consistently fails may indicate a process weakness that, over time, could undermine the effectiveness of a related key control. Internal audit and the SOX program team should periodically reassess whether controls previously classified as non-key should be reclassified based on changes in business processes, system configurations, transaction volumes, or the risk environment.

Practical Guidance For Making The Distinction

The classification of controls as key or non-key should follow the top-down, risk-based approach prescribed by AS 2201 and should be revisited at least annually or whenever significant changes occur in the organization's processes, systems, or risk profile.

Start with significant accounts and relevant assertions. The identification of key controls begins not with the controls themselves but with the financial statement accounts and disclosures that are significant to the organization's financial reporting. For each significant account, identify the relevant assertions and the specific risks of material misstatement associated with each assertion. Only then should the controls that address those risks be evaluated for key status.

Evaluate each control against the what-if test. For each control under consideration, ask what would happen if this control failed and no one noticed. If the answer is that a material misstatement could enter the financial statements without being detected by another control in the system, the control is almost certainly key. If other controls in the process would detect and correct the error before it affected the financial statements, the control may be non-key.

Consider control precision, frequency, and coverage. A control that operates daily over individual transactions with specific tolerance thresholds is more likely to be key than a control that operates monthly over aggregated data with broad tolerance ranges. However, high-level analytical controls can also be key if they operate with sufficient precision to detect material misstatements at the account or assertion level.

Document the rationale for every classification decision. The distinction between key and non-key is a judgment, and judgments must be documented and defensible. For every control classified as non-key and excluded from testing, the SOX program should maintain documentation of the rationale, including the identification of which key controls compensate for the non-key control's absence from the testing program. This documentation protects the organization in the event that the external auditor or the PCAOB challenges the scoping decision.

Coordinate with the external auditor. While management owns the SOX compliance program and the classification of key controls, the external auditor must independently evaluate whether management's assessment is reasonable. Early coordination with the external auditor on the key control population and the rationale for exclusion of non-key controls reduces the risk of disagreements during the audit that could result in expanded testing, delayed reporting, or adverse findings.

From Classification To Program Efficiency

The distinction between key and non-key controls is not an academic exercise. It is the mechanism through which organizations achieve a SOX compliance program that is both effective and efficient. A program that tests every control regardless of its importance to financial reporting will be expensive, slow, and difficult to sustain. A program that excludes controls without rigorous analysis of their role in mitigating material misstatement risk will be exposed to deficiencies that could result in material weaknesses or significant deficiencies in the external auditor's report.

The goal is a disciplined, well-documented, risk-based control framework in which every key control is tested with appropriate rigor and every exclusion is justified by a clear understanding of how the remaining key controls provide reasonable assurance over the relevant financial statement assertions. This is the standard that AS 2201 envisions, that the PCAOB evaluates in its inspections, and that distinguishes mature SOX programs from those that treat compliance as a documentation exercise rather than a risk management discipline.

References

Public Company Accounting Oversight Board. Auditing Standard 2201 An Audit Of Internal Control Over Financial Reporting That Is Integrated With An Audit Of Financial Statements

US Securities and Exchange Commission guidance related to management assessment of internal control over financial reporting

Committee of Sponsoring Organizations of the Treadway Commission. Internal Control Integrated Framework

Leading market practice in SOX scoping, control rationalization, and management review control evaluation