Internal controls refer to the policies, procedures, and systems that an organization can put in place to:
- Protect its assets
- Ensure accurate financial reporting
- Minimize errors
- Prevent fraud
These controls establish checks and balances that support transparency and accountability.
Yet, it is surprising that many business leaders are averse to controls. They consider them tedious and time-consuming, something that has more to do with paperwork than protection. However, well-designed and effectively implemented internal controls are crucial for improving financial reporting accuracy, strengthening governance, and reducing the likelihood of fraud. Businesses should not treat internal controls as irrelevant or a compliance exercise, but as practical tools to prevent fraud, protect assets, and maintain trust.
In many organizations, CPAs and audit professionals are the first to realize the need for internal controls to prevent fraud. They raise concerns and push for improvements, not because controls are ‘nice to have’, but because the risks of ignoring them are real and costly.
Benefits of Effective Controls
Internal controls are an investment of time, resources, discipline, and intention. But the return is invaluable. Some benefits include:
- Fraud Mitigation: Controls promote accountability and make it harder for fraud to occur. And if it does happen, early detection can help minimize losses.
- Asset Protection: Controls protect against theft, misuse, and accidental loss of physical and digital assets.
- Operational Efficiency: Controls can streamline workflows, eliminate unnecessary procedures, uncover system weaknesses, and improve overall efficiency.
- Regulatory Compliance: They also help organizations stay compliant with regulations, which reduces the chance of penalties, legal exposure, and reputational damage.
Internal controls do not slow down business; they protect it. And in today’s environment, protection is essential for long-term success.
Think of it this way: running a business without solid internal controls is like leaving your front door unlocked with valuables visible through the window. You are not just making it easy for someone to walk away with something; you are, in fact, inviting it.
Types of Internal Controls
There are three main types of internal controls: preventive, detective, and corrective. Each has a distinct function in safeguarding assets, improving operations, and reducing fraud risk.
Preventive Controls
Preventive controls are the first line of defense in safeguarding your organization’s assets. Their purpose is to stop errors and fraud before they occur, such as inappropriate transactions, before they are processed. As the saying goes, prevention is better than cure. In keeping with that, preventive controls are proactive, designed to reduce the risk of something going wrong in the first place. This matters because evidence from real-world incidents shows that recovering from fraud or errors can be far more expensive than the loss itself. Examples of preventive controls include:
- Segregation of Duties: This is about dividing key tasks and responsibilities among different people to prevent fraud. For example, no single person should be responsible for receiving, recording, depositing, and reconciling funds.
- IT/Access Controls: Apply the principle of least privilege so that employees, partners, and other stakeholders only have access that is necessary for their job. Also, ensure that proper authentication and authorization systems are in place.
- Policies and Procedures: Document policies and procedures so that employees can follow them easily. Review them regularly for updates.
- Physical Controls: Restrict access to assets and sensitive areas like server rooms and asset storage.
- Training and Testing: Educate employees on policies and procedures, ethical behavior, fraud indicators, and reporting channels. Employees should understand responsibilities, expectations, and consequences.
- System Security: Use firewalls, antivirus software, and other cybersecurity tools to protect against external threats. Maintain backups to manage catastrophic events and system failures.
Detective Controls
Detective controls catch fraud and errors after they occur. They do not prevent issues upfront, but they can spot what preventive controls may have missed. This does not mean that preventive controls were ineffective. The truth is, no system is perfect. People make mistakes, while others, with the intent of fraud, constantly try to bypass controls and exploit gaps. Detective controls can also act as a deterrent. If employees know they are being monitored, they are more likely to refrain from wrongdoing. Examples of detective controls include:
- Physical Inventory Checks: Compare inventory records with actual physical stock to verify accuracy.
- Account Reconciliations: Match general ledger balances to bank statements and subsidiary ledgers. This also includes matching invoices, purchase orders, and receiving reports to ensure that the organization is paying for legitimate purchases. Differences should have a valid justification; otherwise, they should be investigated.
- Variance Analyses & Continuous Monitoring: Use data analytics and reporting to spot unusual trends and transactions.
- Audits: Internal and external audits evaluate processes, records, and controls, and provide independent reviews.
- Investigative Questions: Ask individuals involved in a certain process about why an event occurred and which process failed. This can help to identify root causes.
Corrective Controls
Corrective controls are actions taken after detective controls detect errors, violations, or fraud. Their purpose is to address the issue, ensure accountability, and prevent it from happening again. Corrective controls support continuous improvement by closing gaps that emerge through monitoring or investigation. They help organizations review and refine processes and systems, even when no issues have occurred. Examples of corrective controls include:
- Disciplinary Action: Take firm action for fraud. This also discourages other employees from committing it in the future. On the other hand, provide constructive feedback and training for errors that result from misunderstanding rather than intent.
- Software Adjustments: You can close vulnerabilities by applying patches and upgrades as well as through system modifications and configuration changes.
- Policy Updates: Revise procedures based on lessons learned from audits, investigations, and process reviews.
Checklist of Internal Controls to Prevent Fraud
Strong internal controls are essential to securing and sustaining the business. Yet, many organizations struggle with informal, undocumented, and unevenly applied controls across departments. Checklists are a practical solution to this. They turn internal controls into clear, repeatable actions rather than assumptions or verbal instructions.
The following control checklist outlines practices organizations can adopt to prevent and detect fraud, improve accountability, and promote operational efficiency. While every organization is different, these controls provide a baseline that organizations can adapt to match their size, structure, and risk level.
General Oversight and Policy
- Use checks and balances. No single individual should control an entire transaction from start to finish.
- Written policies should clearly cover cash disbursements, attendance and leave, travel and expense reimbursement, asset use, purchasing guidelines, petty cash handling, and conflict-of-interest practices. The board should approve these policies.
- Document any approvals of financial policies, procedures, and expenditures in the board meeting minutes.
Segregation of Duties
- Separate receiving or depositing of funds from record keeping and reconciliation.
- Separate purchasing responsibilities from the accounts payable function.
- A person who writes a check should not be authorized to sign it.
- If, in a small organization, segregation of duties is not possible, require independent review, such as oversight by a board member.
- Make sure employees from the accounting department go on vacations, as sanctioned in the company’s leave policy.
Cash and Check Collections
- Endorse or stamp incoming checks “For Deposit Only” immediately upon receipt/opening mail.
- Add each incoming check to a log before handing it over to the person responsible for depositing receipts.
- Regularly reconcile the incoming check log against deposits. Issue pre-numbered receipts for all cash transactions.
- Perform periodic, unannounced cash counts.
- Reconcile cash receipts daily.
- Centralize cash handling if possible.
Bank Account Reconciliation
- Reconcile bank accounts monthly by an independent person, such as someone not involved in check signing or bookkeeping. Otherwise, a supervisor should review the reconciliation.
- Add the reviewer’s initials and date to bank statements and reconciliation reports. The purpose is to document that a review and reconciliation were performed.
- Keep both the bank statements and the reconciliation reports in an organized filing system for future reference and audit purposes.
Check Management
- Review canceled checks for vendor legitimacy, relevance of the expense to business, authorized signatures, and proper sequencing.
- Prohibit checks written to ‘cash’.
- Mark voided checks as ‘VOID’ in large letters or tear off the signature line to make them unusable. Then file them with your financial records for an audit trail.
- Keep blank checks in locked storage with restricted access.
- Do not pre-sign blank checks. They should be signed after all required information is entered and the supporting documents (invoices, approvals) are attached.
- Require two signatures on checks and for payments that are above a defined threshold. For example, require a second board member’s signature when the amount exceeds a higher specified limit.
- Mark invoices as “Paid” and mention the check number (in case checks are issued).
Credit Cards
- Limit the number of credit cards and verify that all charges are relevant to business.
- Restrict the number of users with access to credit cards and set spending limits with the card issuing companies.
- Prohibit personal use, even if reimbursement is intended.
- Require itemized and original receipts for every transaction.
- Conduct independent monthly review of credit card statements, receipts, and supporting documentation.
Payroll Controls
- Supervisors must approve employee time sheets before payroll is processed.
- The person who distributes paychecks should not be the same person authorizing or recording payroll.
- Review payroll ledgers to ensure that taxes and mandatory deductions have been paid on time.
Assets and Equipment
- Organizational assets (such as vehicles, equipment, phones) must be used for business purposes only.
- Routinely examine expense reports, credit card charges, and telephone bills to verify their relevance to business.
- Maintain vehicle usage logs (date, time, mileage or odometer readings, purpose of the trip, and the employee using the vehicle) and review them regularly to ensure proper use.
- Maintain an updated inventory list of equipment and perform routine physical verification.
Petty Cash
- Keep petty cash in a locked container and limit the number of employees who have access to it.
- Require receipts for every petty cash disbursement, including date, purpose, amount, and recipient.
- Reconcile petty cash before replenishing it.
- Keep the petty cash balance low enough that it must be refilled monthly.
- Patient or client funds should never be mixed with petty cash.
Board of Directors Responsibilities
- Review financial activity regularly by comparing actual expenses and revenues to the approved budget.
- Require an explanation if the actual amounts vary sharply from the budgeted amounts.
- Ensure that external auditors present financial statements and management letters directly to the board.
- Conduct annual performance evaluations of the Executive Director.
- Participate in hiring auditors and consultants.
Ethics and Related Parties
- Discourage related-party transactions. If these are necessary, they must be disclosed and approved by the board.
- Maintain and annually update a written code of ethics and conflict-of-interest policy.
- Award major contracts after competitive bidding.
- Limit the hiring of relatives and conducting business with board members and employees.
Risk Assessment Process
Before you can design and implement robust internal controls, you must first conduct a thorough risk assessment of your business. This involves examining your processes, procedures, and systems to pinpoint areas where fraud, errors, and mismanagement are likely to occur and to assess the significance of those risks. Use a risk assessment matrix to document your risk assessment results, mapping risks by likelihood and potential impact.
The risk assessment process follows a structured path.
- First, organizations identify inherent risks, i.e., the natural risks present in a process before any controls are applied.
- The next step is to evaluate and rank these risks based on two parameters: likelihood (how probable the risk is) and impact (how damaging it could be if it occurs).
- Using this analysis, you should design and implement controls, giving priority to high-likelihood and high-impact risk areas.
- After controls are in place, determine the residual risk, or the level of risk that remains after controls are implemented. Ideally, this should fall within an acceptable tolerance level defined by leadership or regulatory standards.
To illustrate this process, consider a typical fraud example: the fictitious vendor scheme. In this scenario, an employee creates fake vendors in the system and processes fraudulent invoices to siphon funds. A good risk assessment would raise questions such as:
- Who has permission to create vendor profiles?
- Does that access align with their job responsibilities? Or is it excessive access?
- Is the vendor list periodically reviewed for legitimacy?
- Can the system track and identify who created or modified a vendor record?
With this evaluation, the organization can create a risk assessment matrix that records the risks identified through these questions, the likelihood of each event occurring, and its impact. In the example above, the core risk is unnecessary system access with no oversight, which creates an opportunity for fraud. To address it, leadership can implement internal controls for fraud prevention, such as approval workflows, periodic audits, role-based access controls, and vendor verification.
Control Environment
Effective internal control programs are undoubtedly underpinned by an organizational culture rooted in ethics. Policies, procedures, and checklists provide structure, but they are mere documentation without ethical leadership and accountability. Hence, it is important to set the right tone at the top. Management should set ethical examples for employees. This defines expectations for behaviour and nurtures a control environment in which employees act responsibly, thereby reducing fraud risk.
Cultural Foundation
A control culture starts with core values of honesty, responsibility, transparency, and accountability. Organizations must cultivate an environment where fraud is unacceptable while ethical decision-making is encouraged and rewarded. When the culture supports doing the right thing, employees stop viewing controls as added steps and see them as a natural way to do routine work. This builds trust and reduces risk.
Leadership Responsibilities
Leaders play a critical role in shaping and endorsing the control environment. It is not just enough to publish values on a website or include them in a policy manual. A responsible and effective leader lives up to those values in decisions, priorities, and behaviours. Leaders must follow controls and demonstrate integrity. They must also promptly and fairly take corrective action when behaviours deviate from desired values. When employees observe leadership and follow in their footsteps, the control environment becomes credible and respected.
Consequences of Poor Tone
A weak tone at the top has direct consequences that ripple throughout the organization. When rules are ignored or selectively enforced, discipline erodes. Even worse, if leaders bypass controls and fail to address violations, they invite trouble. Employees tend to conclude that controls are flexible or perhaps irrelevant, and that misconduct may go unnoticed or unpunished. This creates an environment where fraud becomes easier, likelier, and harder to detect.
Conclusion
A 2022 KPMG Fraud Outlook survey of 642 senior executives and board members in the Americas found that 71% had experienced internal or external fraud in the last 12 months. The survey also confirmed that fraud, compliance breaches, and cyberattacks have increased in severity and are expected to become more frequent. These findings highlight that organizations cannot rely on trust alone and that strong internal controls to prevent fraud are essential.
An effective internal control system does not just help in regulatory compliance; it serves as a safety net to protect assets, enhance credibility, and support long-term success. And while the internal fraud controls checklist in this article is a great practical tool, the real power of controls lies in the people who consistently follow them. When everyone understands their role and acts responsibly, controls evolve from a burden into a natural part of how work gets done.