File size: 117,533 Bytes
a62262a
1
eop seal executive office of the president office of management and budget washington dc 20503 the director  july 15 2016 m1617 f executive departments and agencies shaun donovan signature from: subject: omb circular no a123 managements responsibility for enterprise risk management and internal control the administration has emphasized the importance ofhaving appropriate risk management processes and systems to identify challenges early to bring them to the attention of agency leadership and to develop solutions to that end the office of management and budget (omb) is updating this circular to ensure federal managers are effectively managing risks an agency faces toward achieving its strategic objectives and arising from its activities and operations these expanded responsibilities reinforce the purposes of the federal managers financial integrity act (fmfia) and the government performance and results act modernization act (gprama) and support the administrations commitment to improve the efficiency and effectiveness of government since 1981 omb circular no a123 (a123) and fmfia have been at the center of federal requirements to improve accountability in federal programs and operations over the years government operations have changed dramatically becoming increasingly complex and driven by changes in technology at the same time resources are constrained and stakeholders expect greater program integrity efficiency and transparency into government operations the policy changes in this circular modernize existing efforts by requiring agencies to implement an enterprise risk management (erm) capability coordinated with the strategic planning and strategic review process established by gprama and the internal control processes required by fmfia and government accountability office (gao)s green book this integrated governance structure will improve mission delivery reduce costs and focus corrective actions towards key risks implementation ofthis policy will engage all agency management beyond the traditional ownership of omb circular no a123 by the chief financial officer community in particular it will require leadership from the agency chief operating officer and performance improvement officer and close collaboration across all agency mission and missionsupport functions successful implementation of this circular requires agencies to establish and foster an open transparent culture that encourages people to communicate information about potential risks and other concerns with their superiors without fear of retaliation or blame similarly agency managers inspectors general (ig) and other auditors should establish a new set of parameters encouraging the free flow of information about agency risk points and corrective measure adoption an open and transparent culture results in the earlier identification of risk allowing the opportunity to develop a collaborative response ultimately leading to a more resilient government this revision ofthe circular has gone through an extensive deliberative process with agencies and their ig teams and including consultation with the gao and many outside groups who seek more efficient and effective delivery of governmental services this revised circular is effective for fiscal year (fy) 2016 and supersedes all previous versions appendices a b c and d of omb circular no a123 remain in effect updates to the gao greenbook are effective for fy 2016 erm implementation requirements are effective for fy 2017 omb plans to work closely with the presidents management council executive councils and the council oflnspectors general on integrity and efficiency (cigie) to provide further implementation guidance attachment: omb circular no a123 managements responsibility for enterprise risk management and internal control attachment omb circular no a123 managements responsibility for enterprise risk management and internal control purpose: this circular defines managements responsibilities for enterprise risk management (erm) and internal control the circular provides updated implementation guidance to federal managers to improve accountability and effectiveness of federal programs as well as mission support operations through implementation of erm practices and by establishing maintaining and assessing internal control effectiveness the circular emphasizes the need to integrate and coordinate risk management and strong and effective internal control into existing business activities and as an integral part of managing an agency authority: this circular is issued under the authority of the federal managers financial integrity act (fmfia) of 1982 as codified in 31 usc 3512 and the government performance results act (gpra) modernization act public law 111352 policy: each federal employee is responsible for safeguarding federal assets and the efficient delivery of services to the public federal leaders and managers are responsible for establishing goals and objectives around operating environments ensuring compliance with relevant laws and regulations and managing both expected and unexpected or unanticipated events they are responsible for implementing management practices that identify assess respond and report on risks risk management practices must be forwardlooking and designed to help leaders make better decisions alleviate threats and to identify previously unknown opportunities to improve the efficiency and effectiveness of government operations management is also responsible for establishing and maintaining internal controls to achieve specific internal control objectives related to operations reporting and compliance management must consistently apply these internal control standards to meet the internal control principles and related components outlined in this circular and to assess and report on internal control effectiveness at least annually risk management practices must be taken into account when designing internal controls and assessing their effectiveness annually agencies must develop a risk profile coordinated with their annual strategic reviews further management must provide assurances on internal control effectiveness in its agency financial report (afr) or the performance and accountability report (par) information regarding identified material weaknesses and corrective actions should be included in any of the three preceding reports requirements: office of management and budget (omb) circular no a123 requires agencies to integrate risk management and internal control functions the circular also establishes an assessment process based on the government accountability offices (gao) standards for internal control in the federal government (known as the green book) that management must implement in order to properly assess and improve internal controls over operations reporting and compliance the primary compliance indicators that management must consider when implementing omb circular no a123 include: management is responsible for the establishment of a governance structure to effectively implement direct and oversee implementation of the circular and all the provisions of a robust process of risk management and internal control  implementation of the circular should leverage existing offices or functions within the organization that currently monitor risks and the effectiveness of the organizations internal control  agencies should develop a maturity model approach1 to the adoption of an erm framework for fy 2016 agencies are encouraged to develop an approach to implement erm for fy 2017 and thereafter agencies must continuously build risk identification capabilities into the framework to identify new or emerging risks andor changes in existing risks (see section iic for additional details)  management must evaluate the effectiveness of internal controls annually using gaos standards for internal control in the federal government (the green book) 1 see https:wwwrimsorgresourcesermpagesriskmaturitymodelaspx for an example maturity model throughout the circular the terms must and will denote a requirement that management will comply with in all cases should indicates a presumptively mandatory requirement except in circumstances where the requirement is not relevant for the agency may or could indicate best practices that may be adopted at the discretion of management effective date: this circular is effective upon publication appendices a b c and d of omb circular no a123 remain in effect applicability: this circular is applicable to each executive agency all other nonexecutive agencies of the federal government are encouraged to adopt the circular inquiries: further information concerning this circular can be obtained from the office of federal financial management (202) 3953993 or the office of performance and personnel management (202) 3955670 office of management and budget washington dc 20503 copies: copies of this circular may be obtained from wwwwhitehousegovomb significant revisions to omb circular no a123 section revision to a123 purpose of revision transmittal to the circular changed title from omb circular no a123 managements responsibility for internal control to omb circular no a123 managements responsibility for enterprise risk management and internal control title changed to align better with the focus of the circular towards an enterprise risk management framework restructure former section i introduction section ii standards and section iii integrated internal control framework restructured as described below appendix a internal control over financial reporting (icofr) removed from the body of a123 and renamed to appendix a internal control over reporting (icor) introduce enterprise risk management guidance; eliminate areas of duplication; and balance emphasis on operations compliance and reporting based on the significance of gao standards for internal control changes related to internal control over reporting; omb plans to issue the prior appendix a as a standalone document appendices a b c and d of omb circular no a123 remain in effect throughout circular referenced erm concepts and guidelines based on the committee of sponsoring organizations of the treadway commission (coso) international organization for standards (iso) and the united kingdoms orange book management of risk principles and concepts2 provide additional erm implementation guidance section i introduction changed the focus of the introduction to illustrate managements responsibility to manage risk the relationships between a 123 and part 6 of a11 federal performance framework and internal controls and enterprise risk management provide an overview of the integration of internal controls and enterprise risk management section ii establishing enterprise risk management in management practices addition of a new section provide for more effective risk management and internal control in the federal government section iii establishing and operating an effective internal control system addition of a new section provide evaluation guidance for the new gao green book 2 references to nonfederal government entities are provided to illustrate best practices and do not signify endorsement by the federal government section revision to a123 purpose of revision section iv assessing internal control included a summary of updated standards of internal control in the federal government and related documentation and assessment requirements provide evaluation guidance for the new gao green book section v correcting internal control deficiencies included minimum requirements for corrective action plans emphasize root cause analysis accountability and collaboration with offices of inspectors general section vi reporting on internal control requires a single assurance statement consistent with the original requirement of the federal managers financial integrity act (fmfia) provide a risk based approach and balance emphasis between operations reporting and compliance internal control objectives section vii additional considerations addition of a new section provide additional considerations for emerging issues including: managing privacy risks integrating acquisition assessments with the new gao green book managing grant risks and managing antideficiency act risks table of contents i introduction 7 ii establishing enterprise risk management in management practices 9 a governance 12 b risk profiles 13 b1 identification of objectives 16 b2 identification of risk 16 b3 inherent risk assessment 17 b4 current risk response 18 b5 residual risk assessment 19 b6 proposed action 19 b7 proposed risk response category 19 c implementation 19 d role of auditors in enterprise risk management 21 iii establishing and operating an effective system of internal control 22 a governance  23 b establish entity level control 24 b1 service organizations 24 b2 managing fraud risks in federal programs 26 iv assessing internal control 29 a documentation requirements 29 b sources of information 29 c identification of deficiencies 30 d internal control evaluation approach 31 v correcting internal control deficiencies 35 a importance of correcting internal control deficiencies 35 b corrective action plan requirements 35 c audit follow up and cooperative audit resolution and oversight initiatives 36 vi reporting on internal controls 37 a annual assurance statement  37 b reporting pursuant to integration of enterprise risk management and internal control 37 c reporting pursuant to omb circular no a123 appendix a 37 d reporting pursuant to omb circular no a130 appendix i 38 e reporting pursuant to section 231 usc 3512(d) (2) 38 f reporting pursuant to section 431 usc 3512(d) (2) (b) 38 g government corporations 39 h classified matters 39 i agencies obtaining audit opinions on internal control 43 viiadditional considerations 44a managing privacy risks in federal programs 44 b conducting acquisition assessments under omb circular no a123 46 c managing grants risks in federal programs 47 d managing antideficiency act risks 48 list of tables table 1 illustrative example of a risk profile 15 table 2 summary of green book components and principles of internal control 23 table 3 illustrative internal control evaluation control environment 33 table 4 principle and component evaluation 33 table 5 overall assessment of a system of internal control 34 table 6 summary of omb circular no a123 reporting requirements 40 table 7 comparison of omb acquisition framework and gao green book 47 list of figures figure 1 the relationship between internal controls and enterprise risk management 8 figure 2 illustrative example of an enterprise risk management model 11 figure 3 erm development and implementation deadlines 20 list of exhibits exhibit 1 illustrative unmodified assurance statement 42 exhibit 2 illustrative modified assurance statement 42 exhibit 3 illustrative statement of no assurance 43 i introduction federal leaders and managers are responsible for establishing and achieving goals and objectives seizing opportunities to improve effectiveness and efficiency of operations providing reliable reporting and maintaining compliance with relevant laws and regulations they are also responsible for implementing management practices that effectively identify assess respond and report on risks risks arise from a variety of external and internal environments examples include economic operational and organizational change factors all of which would negatively impact an agencys ability to meet goals and objectives if not resolved federal leaders and managers achieve these aims through a governance structure defined through a variety of sources including laws enacted by the congress and numerous executive directives and agency policies most relevant to this discussion the federal governments core governance processes are defined by office of management and budget (omb) budget guidance such as omb circular no a11 which defines the processes by which the executive branch develops and executes strategic plans compiles the presidents budget request assembles congressional budget justifications conducts performance reviews and issues annual performance plans and annual performance reports omb circular no a123 provides guidance to federal managers on improving the accountability and effectiveness of federal programs and operations by identifying and managing risks establishing requirements to assess correct and report on the effectiveness of internal controls enterprise risk management (erm) and internal control are components of a governance framework erm as a discipline deals with identifying assessing and managing risks through adequate risk management agencies can concentrate efforts towards key points of failure and reduce or eliminate the potential for disruptive events internal control is a processes effected by an entitys oversight body management and other personnel that provides reasonable assurance that the objectives of an entity will be achieved leading international standards setters in the fields of risk management and internal control including both the committee of sponsoring organizations of the treadway commission (coso) and the international organization for standardization (iso) incorporate internal control as part of the larger risk management process erm is viewed as a part of the overall governance process and internal controls as an integral part of risk management and erm this relationship is depicted in the following cosobased diagram in figure 1 figure 1 the relationship between internal controls and enterprise risk management the remaining sections of this document is organized as follows: section ii of omb circular no a123 defines managements responsibilities for erm and includes requirements for identifying and managing risks most importantly it encourages agencies to establish a risk management council (rmc) develop risk profiles which identify risks arising from mission and missionsupport operations and consider those risks as part of the annual strategic review process it complements section 270 of omb circular no a 11 which discusses agency responsibilities for identifying and managing strategic and programmatic risk as part of agency strategic planning performance management and performance reporting practices together these two circulars constitute the erm policy framework for the federal government with specific erm activities integrated and operationalized by federal agencies section iii of omb circular no a123 includes guidance for establishing internal controls for those risks identified by management as requiring a formal system of internal control to provide reasonable assurance that objectives are achieved for this subset of risks identified by management this circular prescribes requirements conforming with the standards of internal control in the federal government established by the government accountability office (gao) more commonly known as the green book this includes establishing and maintaining internal control to achieve specific objectives related to operations reporting and compliance; assessing and reporting effectiveness; and providing assurances on its agency financial report (afr) or the performance and accountability report (par) information regarding identified material weaknesses and corrective actions should be included in any of the three preceding reports section iv of omb circular no a123 discusses managements responsibility to continuously monitor assess and improve the effectiveness of internal controls also discussed are documentation requirements possible sources of information for use in the assessment on internal controls identification of deficiencies and the internal control evaluation approach section v of omb circular no a123 provides guidance on correcting internal control deficiencies corrective action plan requirements and audit follow up and resolution initiatives an agencys corrective action process provides the ability for management to develop a plan for addressing the risk associated with a control deficiency an agencys ability to correct control deficiencies is an indicator of the strength of its internal control environment section vi of omb circular no a123 provides guidance on annual assurance statements and reporting requirements in accordance with 31 usc 3512 (that allows for a single assurance statement) government corporations and classified matters this section also provides definitions for a control deficiency significant deficiency and a material weakness section vii of omb circular no a123 discusses additional considerations such as managing privacy risks conducting acquisition assessments managing risk to grants and managing antideficiency act risks iiestablishing enterprise risk management inmanagement practices there are several enterprise risk management (erm) models available to help organizations integrate risk management and internal control activities into a common framework section 27024 of the office of management and budget (omb) circular no a11 defines risk as the effect of uncertainty on objectives risk management is a series of coordinated activities to direct and control challenges or threats to achieving an organizations goals and objectives erm is an effective agencywide approach to addressing the full spectrum of the organizations external and internal risks by understanding the combined impact of risks as an interrelated portfolio rather than addressing risks only within silos erm provides an enterprisewide strategicallyaligned portfolio view of organizational challenges that provides better insight about how to most effectively prioritize resource allocations to ensure successful mission delivery while agencies cannot respond to all risks related to achieving strategic objectives and performance goals they must identify measure and assess risks related to mission delivery effective risk management: creates and protects value; is an integral part of all organizational processes; is part of decisionmaking; explicitly addresses uncertainty; is systematic structured and timely; is based on the best available information; is tailored and responsive to the evolving risk profile of the agency; takes human and cultural factors into account; is transparent and inclusive; is dynamic iterative and responsive to change; and facilitates continual improvement of the organization erm reflects forwardlooking management decisions and balancing risks and returns so an agency enhances its value to the taxpayer and increases its ability to achieve its strategic objectives the committee of sponsoring organizations of the treadway commission (coso) erm framework also includes the concepts of risk appetite risk tolerance and portfolio view: risk appetite is the broadbased amount of risk an organization is willing to accept in pursuit of its missionvision it is established by the organizations most senior level leadership and serves as the guidepost to set strategy and select objectives risk tolerance is the acceptable level of variance in performance relative to the achievement of objectives it is generally established at the program objective or component level in setting risk tolerance levels management considers the relative importance of the related objectives and aligns risk tolerance with risk appetite a portfolio view of risk provides insight into all areas of organizational exposure to risk(such as reputational programmatic performance financial information technology acquisitions human capital etc ) thus increasing an agencys chances of experiencing fewer unanticipated outcomes and executing a better assessment of risk associated with changes in the environment erm is beneficial since it addresses a fundamental organizational issue: the need for information about major risks to flow both up and down the organization and across its organizational structures to improve the quality of decisionmaking erm seeks to open channels of communication so that managers have access to the information they need to make sound decisions erm seeks to encompass the range of major risks that threatens agencies ability to implement their missions programs and operations most agencies should build their capabilities first to conduct more effective risk management then to implement erm rating those risks in terms of impact and finally building internal controls to monitor and assess the risk developments at various time points to complete this circle of risk management the agencies must incorporate risk awareness into the agencies culture and ways of doing business while there are many approaches that can be taken to implement erm most include the following elements:3 3 based on the orange book management of risk principles and concepts october 2004 hm treasury figure 2 illustrative example of an enterprise risk management model 1establish the context understanding and articulating the internal and external environments of the organization 2initial risk identification using a structured and systematic approach to recognizingwhere the potential for undesired outcomes or opportunities can arise 3analyze and evaluate risks considering the causes sources probability of the riskoccurring the potential positive or negative outcomes and then prioritizing the results of the analysis 4develop alternatives systematically identifying and assessing a range of risk response options guided by risk appetite 5respond to risks making decisions about the best options(s) among a number of alternatives and then preparing and executing the selected response strategy 6monitor and review evaluating and monitoring performance to determine whether the implemented risk management options achieved the stated goals and objectives 7continuous riskidentification must be an iterative process occurring throughout the year to include surveillance of leading indicators of future risk from internal and external environments the extended enterprise consists of interdependent relationships parentchild relationships and relationships external to an agency thus no agency is selfcontained and risk drivers can arise out of organizations that extend beyond the enterprise these relationships give rise to a need for assurance that risk is being managed in that relationship both appropriately and as planned the risk environment is beyond the boundary of the extended enterprise the environment generates risks that cannot be controlled or constrain the way the organization is permitted to take on or address risk a governance the responsibilities of managing risks are shared throughout the agency from the highest levels of executive leadership to the service delivery staff executing federal programs industry best practices suggest risk management functions generally have the following characteristics: helping senior management develop and implement core policies and procedures withrespect to enterprise risk management including developing a process to define riskappetite and establish risk thresholds accordingly; ensuring the current risk levels and processes are consistent with the established risktolerance thresholds and policies; supporting implementation of effective controls; developing strong reporting systems and analysis that incorporate quantitative andqualitative information to provide effective portfolio views of risk; identifying emerging risks concentrations of risk and other situations that could beproperly assessed; and elevating critical issues to appropriate levels within an agency in a timely fashion to provide governance for the risk management function agencies may use a risk management council (rmc) to oversee the establishment of the agencys risk profile regular assessment of risk and development of appropriate risk response rmc structures will vary by agency and in some cases may be integrated with existing management structures an effective rmc will include senior officials for program operations and missionsupport functions to help ensure those risks are identified which have the most significant impact on the mission outcomes of the agency should agencies choose to use an rmc the rmc should be chaired by the agency chief operating officer (coo) or a senior official with responsibility for the enterprise in cabinetlevel agencies this is the deputy secretary to support this work some agency governance structures are beginning to include a chief risk officer (cro) or equivalent function who champion agencywide efforts to manage risk within the agency and advise senior leaders on the strategicallyaligned portfolio view of risks at the agency a cro may serve as a strategic advisor to the coo and other staff on the integration of enterprise risk management practices into the daytoday business operations and decision making cros generally work with business unit managers within their organizations to identify issues in a timely manner to allow for proactive management of the program and to facilitate informed datadriven decisionmaking regardless of the governance structure developed agency governance should include a process for considering risk appetite and tolerance levels the concept of risk appetite is key to achieving effective erm and is essential to consider in determining risk responses although a formally documented risk appetite statement is not required agencies must have a solid understanding of their risk appetite and tolerance levels in order to create a comprehensive enterpriselevel risk profile risk appetite can be considered qualitatively andor quantitatively and should be factored into the process of balancing risks with opportunities additionally risk appetite and tolerance levels should be evaluated on a regular basis and adjusted accordingly to meet the needs of the organization see omb circular no a11 section 27026 for a discussion of the broader risk management roles the rmc should fulfill with respect to strategic reviews b risk profiles4 4 based on the orange book management of risk principles and concepts october 2004 hm treasury agencies must maintain a risk profile the primary purpose of a risk profile is to provide a thoughtful analysis of the risks an agency faces toward achieving its strategic objectives arising from its activities and operations and to identify appropriate options for addressing significant risks the risk profile assists in facilitating a determination around the aggregate level and types of risk that the agency and its management are willing to assume to achieve its strategic objectives the risk profile differs from a risk register in that it is a prioritized inventory of the most significant risks identified and assessed through the risk assessment process versus a complete inventory of risks the risk profile must consider risks from a portfolio perspective and be approved by an agencys rmc or equivalent additionally the profile must identify sources of uncertainty both positive (opportunities) and negative (threats) the development of an agency risk profile: encourages open and candid conversations about risks facing an organization at all levels; facilitates the ranking of risk priorities (in particular to identify and escalate the most significant risks of which senior management should be aware); captures the reasons for decisions made about risk tolerances; facilitates recording of the way in which it is decided to address risk; allows leadership at all levels to understand the overall risk profile and how their areas of particular responsibility fit into it; and facilitates the review and regular monitoring of risks agencies have discretion in terms of the appropriate content and format for their risk profiles; however in general risk profiles should include the following seven components: 1 identification of objectives 2 identification of risk 3 inherent risk assessment 4 current risk response 5 residual risk assessment 6 proposed risk response 7 proposed action category each of these seven components is illustrated in the table below and further descriptions of each component including guidance for each follows the table in completing their risk profiles agencies may consider reviewing and incorporating results from existing documentation such as gao and oig audit findings oigs annual report on top performance and management challenges ffmiafmfia documentation employee viewpoint survey results external media etc agencies should adhere to the general guidance provided for these components when making modifications to the content and format of their risk profiles see sections c1 though c7 following the table below table 1 illustrative example of a risk profile strategic objective improve program outcomes inherent assessment current risk response residual assessment proposed risk response owner proposed risk response risk impact likelihood impact likelihood category agency x may fail to achieve program targets due to lack of capacity at program partners high high reduction: agency x has developed a program to provide program partners technical assistance high medium agency x will monitor capacity of program partners through quarterly reporting from partners primary program office primary strategic review operations objective manage this risk of fraud in federal operations contract and grant fraud high medium reduction: agency x has developed procedures to ensure contract performance is monitored and that proper checks and balances are in place high medium agency x will provide training on fraud awareness identification prevention and reporting primary contracting or grants officer primary internal control assessment reporting objective provide reliable external financial reporting inherent assessment risk response residual assessment proposed action owner proposed action risk impact likelihood impact likelihood category agency x identified material weaknesses in internal control high high reduction: agency x has developed corrective actions to provide program partners technical assistance high medium agency x will monitor corrective actions in consultation with omb to maintain audit opinion primary chief financial officer primary internal control assessment compliance objective comply with the improper payments legislation program x is highly susceptible to significant improper payments high high reduction: agency x has developed corrective actions to ensure improper payment rates are monitored and reduced high medium agency x will develop budget proposals to strengthen program integrity primary program office primary internal control assessment and strategic review b1 identification of objectives risk must be analyzed in relation to achievement of the strategic objectives established in the agency strategic plan (see omb circular no a11 section 230) as well as risk in relation to appropriate operational objectives specific objectives must be identified and documented to facilitate identification of risks to strategic operations reporting and compliance this process assists in the identification of formal internal controls and compliance with the fmfia as discussed in section iii in summary the risk profile must include the following objectives: strategic objectives: relating to the strategic goals and objectives aligned with and supporting the agencys mission (see omb circular no a 11 section 230)  operations objectives: relating to the effective and efficient use of the agencys resources related to administrative and major program operations including financial and fraud objectives (refer to section iii establishing and operating an effective system of internal control)  reporting objectives: relating to the reliability of the agencys reporting  compliance objectives: relating to the agencys compliance with applicable laws and regulations in some cases there will be overlap across these categories and agencies have discretion in terms of how to address this overlap in addition agencies may find it useful to include additional subcategories of one or more objectives categories to facilitate communication on a narrower topic one of the most common subcategories includes reputational risk reputational risk damages the reputation of an agency or component of an agency to the point of having a detrimental effect capable of affecting the agencys ability to carry out mission objectives examples of reputational risk include the loss of confidence and trust which stakeholders have in an organization to deliver operational services or the loss of an agencys financial statement opinion agencies may use their discretion in determining how to incorporate additional subcategories into their risk profile b2 identification of risk identifying risks is a critical step in building the agencys risk profile the identification of risk can be separated into two distinct phases: 1 initial risk identification (for an agency which has not previously identified its risks in a structured way or for a new component of an agency or perhaps for a new project or activity within an agency); and 2 continuous risk identification (which is necessary to identify new or emerging risks andor changes in existing risks) the identification of risk is a continuous and ongoing process once initial risks are identified it is important to reexamine risks on a regular basis to identify new risks or changes to existing risks assessing risk is the next critical step in building the agencys risk profile which includes three important principles: 1 ensure that there is a clearly structured process in which both likelihood and impact are considered for each risk; 2 record the assessment of risk in a way which facilitates monitoring and the identification of risk priorities; and 3 be clear about the difference between inherent and residual risk some risk is unavoidable and beyond an organizations ability to reduce to a tolerable level nevertheless the organization should make contingency plans and manage risks against those plans for example many organizations have to accept that risk arises due to natural disaster situations that they cannot control b3 inherent risk assessment inherent risk is the exposure arising from a specific risk before any action has been taken to manage it beyond normal operations the impact on the agencys ability to achieve its objectives if the risk occurred can be ranked by appropriate categories as can the likelihood that each significant risk might occur while agencies can design their own appropriate categories for the purposes of this guidance the following illustrative definitions can be used: impact high: the impact could preclude or highly impair the entitys ability to achieve one or more of its objectives or performance goals; medium: the impact could significantly affect the entitys ability to achieve one or more of its objectives or performance goals; and low: the impact will not significantly affect the entitys ability to achieve one or more of its objectives or performance goals likelihood high: the risk is very likely or reasonably expected to occur; medium: the risk is more likely to occur than unlikely; and low: the risk is unlikely to occur b4 current risk response the action taken to manage the risk it could involve one or more of the following: acceptance: no action is taken to respond to the risk based on the insignificance of the risk; or the risk is knowingly assumed to seize an opportunity  avoidance: action is taken to stop the operational process or the part of the operational process causing the risk  reduction: action is taken to reduce the likelihood or impact of the risk  sharing: action is taken to transfer or share risks across the entity or with external parties such as insuring against losses5 5 based on definitions outlined by gao in the green book risk responses take many forms including: avoidance of risk by development of a legislative proposal; reduction of risk by proposing to increase funding for the activity; acceptance of the risk of adopting a new technology in order to provide better services to customers formulation of risk responses should consider the organizations risk appetite and tolerance levels the development of risk responses should be used to inform decisionmaking through existing management processes including the strategic reviews development of the legislative and policy agenda operational planning and budget formulation as part of developing the risk profile management must determine those risks for which the appropriate response includes implementation of formal internal control activities as described in section iii of this guidance and which conform to the standards published by gao in the green book these include those risks that meet each of the following criteria: the agency is working to reduce exposure to the risk  the objective is related to reporting compliance or operations including both administrative operations and the major operational components of programs  the risk is identified in the agency risk profile as at least medium impact and medium likelihood (ie the risk is greater than low)  public reporting on the risk will not negatively impact services provided to the public national security or agency operations  control objectives can be clearly specified b5 residual risk assessment residual risk is the exposure remaining from an inherent risk after action has been taken to manage it using the same assessment standards as the inherent assessment b6 proposed action additional action proposed to further reduce the exposure remaining after the risk mitigation actions have been taken for consideration by senior management proposed risk responses should use the same standards applied to the current risk response as described above including the identification of risks for which implementation of formal internal control activities is appropriate b7 proposed risk response category identification of the existing management process that will be used to implement and monitor proposed actions those proposed actions that will be discussed with omb as part of the annual strategic review must be identified (see omb circular no a11 section 270) as well as proposed actions to be considered during formulation of the presidents budget in particular the rmc or other equivalent governance body must categorize actions for the adoption of formal internal control activities (as described in section iii of this guidance and which conform to the standards published by gao in the green book) when the criteria identified above under current risk responses have been met risk profile disclosure as explained above the development of agency risk profiles requires candor subjective evaluations and frank discussions in identifying the likelihood and severity of internal vulnerabilities in addition risk profiles serve to inform the development of agency strategic plans as well as the presidents budget as such agency risk profiles will often contain predecisional deliberative confidential or sensitive information agencies are encouraged to consult with their office of general counsel if there are questions regarding the disclosure of such information c implementation the management of risk must be regularly reviewed to monitor whether or not the risk profile has changed and to gain assurance that risk management is effective or if further action is necessary in addition processes must be put in place to review whether risks still exist whether new risks have arisen whether the likelihood and impact of risks have changed to report significant changes that adjust risk priorities and deliver assurance on the effectiveness of control in addition the overall risk management process must be subjected to regular review to deliver assurance that it remains appropriate and effectiveat a minimum managementsriskmanagement review processes must6: ensure that all aspects ofthe risk management process are reviewedat least once a year; ensure that risks themselves are subjected to review with appropriatefrequency; and make provisionsfor alerting the appropriate levelof management to new or emergingrisksas well as changesin already identifiedrisksso that the change can be appropriately addressed federal agencies have diverse missions and are at different levels of maturity in terms of theircapacity to fully implement ermtheagencys approach for developing risk profiles and implementing ermshouldbe refinedand improved each yearthis guidancerecognizesthat not all components ofan ermprocessarefully operationalized in theinitial years andagencyleadershipmustset priorities in terms of implementationunless otherwiseapproved by omb agenciesmustmeet thefollowing deadlines: figure3erm developmentand implementation deadlines deliverabledue dateno laterthan:descriptionermimplementationapproachas soon aspracticable prior to june initial riskprofiledeliverableagencies are encouraged (not required) to develop anapproach to implement enterprise risk management (erm) which may include: plannedrisk managementgovernance structure process for considering risk appetite and risktolerance levels methodology fordevelopinga risk profile general implementation timeline andplan formaturing the comprehensivenessand quality of therisk profiles over time initialrisk profilejune 2 2017 agenciesmust complete theirinitial risk profiles incoordination with the agency strategicreviews keyfindings should be made available for discussionwithomb by june 22017 as part of the agency strategic reviewmeetings andor fedstatthe finaldetermination on informationto be sharedwith ombwill be provided in early 2017this initial risk profilewill inform the development of each agencysnewstrategic planand the presidentsfy 2019 budget integration with managementevaluation of internalcontrolseptember152017for those risks forwhichformal internal controls havebeen identified as part of the initial risk profile in fy2017 all agenciesmust present assurances on internalcontrol processes in the fy 2017 agencyfinancialreport (afr) or the performance andaccountabilityreport (par) alongwith a report on identifiedmaterial 6basedin part on the orangebook management of risk principles and concepts october 2004 hm treasury 20 weaknesses and corrective actions until an agency has fully implemented an erm approach to risk management it may continue to provide the existing risk assurance statements to their oig andor private accounting firms as appropriate updated risk profile annually by june 3 no less than annually all agencies must prepare a complete risk profile and include required risk components and elements required by this guidance cfo act agencies at a minimum must complete their risk profiles in coordination with the agency strategic review for these agencies key findings should be made available for discussion with omb by june 3rd as part of the agency strategic review meetings andor fedstat the final determination on information to be shared with omb will be provided in advance of these discussions the risk profile will help to inform changes to strategy policy operations and the presidents budget  omb circular no a11 part 6 is the authoritative policy guidance on deadlines for the summary of findings from the agency strategic reviews including the timing of submissions to omb agencies should consult omb circular no a11 as each prepares materials after initial implementation the agencys risk profile must be discussed each year with omb as a component of the summary of findings from the agency strategic review and fedstat (see omb circular no a11 section 270) for those objectives for which formal internal control activities have been identified as part of the risk profile assurances on internal control processes must be presented in the agency financial report (afr) or performance and accountability report (par) along with a report on identified material weaknesses and corrective actions d role of auditors in enterprise risk management management is responsible for enterprise risk management systems internal or external auditors conduct independent and objective audits evaluations and investigations of an agencys programs and operations which includes aspects of the internal control and risk management systems management uses the results of such evaluations including accompanying findings and recommendations to monitor the design or operating effectiveness of these systems at a specific time or of a specific function or process auditors are also responsible for keeping management informed about risks that it detects including fraud risks and thereby provides information to management for use in the identification and assessment of risks management and external auditors might have different interpretations of risks based on their respective roles and responsibilities the agency risk function should seek to coordinate their roles so that the independence and scope of the external auditors role is preserved while ensuring the continuing flow of risk information to the risk management function iii establishing and operating an effective system of internal control the fmfia requires the gao to prescribe standards of internal control in the federal government more commonly known as the green book these standards provide the internal control framework and criteria federal managers must use in designing implementing and operating an effective system of internal control the green book defines internal control as a process effected by an entitys oversight body management and other personnel that provides reasonable assurance that the objectives of an entity are achieved these objectives and related risks can be broadly classified into one or more of the following categories: operations: effectiveness and efficiency of operations; reporting: reliability of reporting for internal and external use; and compliance: compliance with applicable laws and regulations a subset of the categories of objectives are the safeguarding of all assets management designs an internal control system to provide reasonable assurance regarding the prevention or prompt detection and correction of unauthorized acquisition use or disposition of an entitys assets fmfia also requires omb in consultation with gao to establish guidelines for agencies to evaluate their systems of internal control to determine fmfia compliance instead of considering internal control as an isolated management tool agencies must integrate their efforts to meet the requirements of the fmfia with the enterprise risk management (erm) requirements discussed in section ii thus internal control is an integral part of the entire cycle of strategic planning goal and objective setting budgeting program management accounting and auditing it must support the effectiveness and the integrity of every step of the process and provide continual feedback to management federal managers must carefully consider the appropriate balance between risk controls costs and benefits in their missionsupport operations too many controls can result in inefficiencies while too few controls might increase risk to an unacceptable level managements responsibility is to develop and maintain effective internal control that is consistent with its established risk appetite and risk tolerance levels in addition management is responsible for establishing and integrating internal control into its operations in a riskbased and cost beneficial manner in order to provide reasonable assurance that the entitys internal control over operations reporting and compliance is operating effectively achieving the objectives of external reporting and compliance which are based largely on laws rules regulations and standards established by congress gao and omb depends on how activities within the agencys control are performed generally management and oversight bodies have greater discretion in setting internal reporting objectives that are not driven by external parties however agencys may choose to align its internal and external reporting objectives to allow internal reporting to better support the agencys external reporting achievement of some operations objectives such as certain aspects of program outcomes or maintaining safe operations are not always within the agencys control an effective internal control system increases the likelihood that an entity achieves its objectives however no matter how well designed implemented or operated an internal control system cannot provide absolute assurance that all of an organizations objectives are met factors outside the control or influence of management can affect the entitys ability to achieve all of its objectives for example a natural disaster can affect an organizations ability to achieve its objectives therefore once in place effective internal control provides reasonable not absolute assurance that an organization achieves its objectives the green book is organized by five components of internal control as shown in the exhibit below in addition the five components of internal control contain 17 required principles and each principle has important attributes which explain the principles in greater detail table 2 summary of green book components and principles of internal control components of internal control principles control environment 1 demonstrate commitment to integrity and ethical values 2 exercise oversight responsibility 3 establish structure responsibility and authority 4 demonstrate commitment to competence 5 enforce accountability risk assessment 6 define objectives and risk tolerances 7 identify analyze and respond to risk 8 assess fraud risk 9 analyze and respond to change control activities 10 design control activities 11 design activities for information systems 12 implement control activities information and communication 13 use quality information 14 communicate internally 15 communicate externally monitoring 16 perform monitoring activities 17 remediate deficiency federal managers must carefully consider the appropriate balance between controls and risk in their programs and operations to emphasize too many controls can result in inefficient and ineffective government; agency managers must ensure an appropriate balance between the strength of controls and the relative risk associated with particular programs and operations the benefits of controls should outweigh the cost agencies should consider both qualitative and quantitative factors when analyzing costs against benefits a governance agencies must have a senior management council (smc) to assess and monitor deficiencies in internal control this smc may be a subset of the risk management council however agencies have discretion in determining the appropriate structure a senior management council may include the chief financial officer chief human capital officer chief information officer chief information security officer chief acquisition officer senior agency official for privacy designated agency ethics official and performance improvement officer and the managers of other program offices must be involved in identifying and ensuring correction of systemic material weaknesses relating to their respective programs such councils generally recommend to the agency head which significant deficiencies are deemed to be material weaknesses to the agency as a whole and must therefore be included in the annual fmfia assurance statement and reported in the agencys annual financial report (afr) or performance accountability report (par) this council should be responsible for overseeing the timely implementation of corrective actions related to material weaknesses such a council is also useful in determining when sufficient action has been taken to declare that a significant deficiency or material weakness has been corrected (though the final official determination likely resides with the agency head and the oig) the smc should also include senior assessment teams to lead assessments related to the objective of internal control over reporting (see appendix a to omb circular no a123 internal control over reporting) b establish entity level control establishing entity level control (elc) is another primary step in operating an effective system of internal control the green book defines elcs as controls that have a pervasive effect on an entitys internal control system and pertain to multiple components elcs are mostly within the control environment risk assessment information and communication and monitoring components of the green book control activities are also considered a component of elc and provide a link to an agencys processes as described in section c below entitylevel controls also include controls related to the entitys use of service organizations or management override of internal control and fraud b1 service organizations the green book provides internal control considerations for service organizations (shared service providers (ssp) are one example) service organization internal control considerations include managements responsibility for the performance of third party provided processes establishing user controls at the agency receiving services and service organization oversight  managements responsibility for the processes performed by third party service organizations third party service providers perform activities for many agencies examples include but are not limited to: accounting and payroll processing employee benefit plan servicing information technology services protections for sensitive agency data acquisition or procurement services security services asset management health care claims processing and loan servicing agencies are ultimately responsible for the services and processes provided by third party service organizations as they relate to the agencys ability to maintain internal control over operations reporting and compliance with laws and regulations  managements responsibility for establishing user controls if the processes provided by the third party service organization is significant to an agencys internal control objectives then the agency is responsible for establishing user agency controls that complement the service organizations controls management still retains overall responsibility and accountability for all controls related to the processes provided by the third party and must monitor the process as a whole to make sure it is effective examples of user agency controls include: o input output controls: in most third party provider situations the agency must have access to the information processed by a service organization in some cases this information enables the agency to compare the service organizations results with the results of an independent source for example an agency using a payroll service organization compares the data submitted to the service organization with reports or information received from the service organization after the data has been processed o performance monitoring: agencies must have a process for monitoring the service organizations performance in relation to various metrics as typically defined in a servicelevel agreement most of these metrics must be tailored to specific operations for example agencies regularly review the security availability and processing integrity of servicelevel agreements o process controls: in some third party provider situations the agencys user controls are closely tied to the service organizations processes and provide direct assurance over their operation for example an agency that has its it development provided by a third party service organization chooses to document track approve and test all application changes internally thus retaining significant control over the it development process  managements responsibility for oversight of service organizations the extent of an agencys oversight of a service organization depends on the nature of the contract or agreement terms and conditions the use of a third party provider needs to be considered for managements oversight and assessment of internal control based on risk and when the activity is significant to the agencys achievement of internal control objectives of operations reporting or compliance examples of services provided by the service organization that warrant oversight include: maintenance of a user agencys financial reporting and accounting records; safeguarding of a user agencys assets; services that involve personally identifiable information (pii); investments for employee benefit plans; mortgage services from servicers that service mortgages for others; or application services for technology environments that support operations  service organization responsibility service organizations are responsible for providing assurances to their customers and assisting customers in understanding the relationship between the service providers controls and the customers user controls together service organizations and customers manage the risks of third party provider activities typically through a service organization control (soc) 1 type 2 report (more technically referred to as a statement on standards for attestation engagement no 16 report7) soc 1 report considerations include: o ensuring the soc report adequately addresses the relevant internal control objectives o determining the extent and adequacy of internal control testing performed on the operating effectiveness of internal controls throughout a specified period o ensuring the soc report(s) cover a substantial portion of the fiscal year and bridge or roll forward letters are considered o reviewing the soc report opinion (eg unmodified) and determining what impact any internal control deficiencies included in the soc report have on the related control objectives o evaluating complementary user entity controls included in the soc 1 report to determine that the appropriate controls are in place to support the activities of the service provider o considering any complementary subservice organization controls included in the soc 1 report and the effectiveness of controls at subservice organizations 7 effective for service auditors reports dated on or after may 1 2017 service organization reports will be prepared under a new clarified attestation standard au320 8 gao standards for internal control in the federal government gao14704g section 803 http:wwwgaogovassets670665712pdf b2 managing fraud risks in federal programs the green book defines fraud as obtaining something of value through willful misrepresentation whether an act is fraud is a determination to be made through the judicial or other adjudicative system and is beyond managements professional responsibility for assessing risk waste is the act of using or expending resources carelessly extravagantly or to no purpose abuse involves behavior that is deficient or improper when compared with behavior that a prudent person considers reasonable and necessary in operational practice given the facts and circumstances this includes the misuse of authority or position for personal gain or for the benefit of another waste and abuse do not necessarily involve fraud or illegal acts green book requires management to consider the potential for fraud when identifying analyzing and responding to risks 8 principle 8 of the omb circular no a123 fraud risk profile requirements fraud jeopardizes agency missions by diverting scarce resources from their intended purpose a single case of fraud can undermine programmatic mission disrupt services and force management to expend valuable time resources and staffhours to resolve and recover property lost due to fraud reputational risks of fraud can damage the perception of an agency impact employee morale and create distrust by the public further hindering their efforts to provide services to the public to the extent that federal managers can effectively mitigate and prevent fraud from occurring it can save time and resources spent in investigating and prosecuting fraud and recovering lost money and property thus avoiding the pay and chase model management has overall responsibility for establishing internal controls to manage the risk of fraud this includes reporting to the agencys governance structure what actions have been taken to manage fraud risks and on the status of the agencys risk profile the agencys risk profile as required by section ii of omb circular no a123 must include an evaluation of fraud risks and use a riskbased approach to design and implement financial and administrative control activities to mitigate identified material fraud risks refer to appendix a of omb circular no a123 internal control over reporting for requirements related to reporting internal control objectives the financial and administrative controls established through the agencys risk profile must also include: controls to address identified fraud risks related to payroll beneficiary payments grants large contracts information technology and security asset safeguards and purchase travel and fleet cards; collecting and analyzing data from reporting mechanisms on detected fraud to monitor fraud trends and using that data and information to continuously improve fraud prevention controls; and using the results of monitoring evaluation and investigations to improve fraud prevention detection and response gao framework for managing fraud risks in federal programs to help managers to combat fraud and preserve integrity in government agencies and programs gao identified leading practices for managing fraud risks and organized them into a conceptual framework called the fraud risk management framework (the framework gao15593sp) managers should adhere to these leading practices as part of their efforts to effectively design implement and operate an internal control system that addresses fraud risks managers are responsible for determining the extent to which the leading practices in the framework are relevant to their program and for tailoring the practices as appropriate to align with the programs operations the framework encompasses control activities to prevent detect and respond to fraud with an emphasis on prevention as well as structures and environmental factors that influence or help managers achieve their objective to mitigate fraud risks in addition the framework highlights the importance of monitoring and incorporating feedback which are ongoing practices that apply to the following four components described below  commit to combating fraud by creating an organizational culture and structure conducive to fraud risk management  plan regular fraud risk assessments and assess risks to determine a fraud risk profile  evaluate outcomes using a riskbased approach and adapt activities to improve fraud risk management  design and implement a strategy with specific control activities to mitigate assessed fraud risks and collaborate to help ensure effective implementation establishing risk tolerances in disaster situations managers must balance their priorities to fulfill the programs mission such as effectively disbursing funds or providing services to beneficiaries and taking actions to safeguard taxpayer dollars from improper use for example in disaster situations fraud risks are higher than under normal circumstances because the need to provide services quickly can hinder the effectiveness of existing controls and creates additional opportunities for individuals to engage in fraud as a result managers face additional challenges balancing their mission to provide assistance quickly with implementing controls to address the increased risk of fraud gaos fraud framework calls for managers to determine risk tolerances when assessing fraud risks and to use that determination as part of the basis for developing responses to identified fraud risks including specific controls to address the risks risk tolerance reflects managers willingness to accept a higher level of fraud risks and vary depending on the circumstances of the program when determining risk tolerance in disaster situations managers weigh the programs operational objective of expeditiously providing assistance against the objective of lowering the likelihood of fraud because activities to lower fraud riskssuch as the risk that ineligible individuals submit fraudulent applications for benefitscausing delays in service as a result managers are willing to accept a somewhat higher risk of fraud than under normal circumstances in order to provide emergency assistance in a timely manner gaos fraud framework provides a basis for managers to make decisions about how to respond to fraud risks including determining the specific controls to design and implement given managers defined risk tolerances managers can find additional guidance provided in the association of government accountants (aga) fraud prevention tool kit useful when managing specific types of fraud risks in federal programs agas fraud prevention tool kit provides current stateoftheart tools for federal state local and tribal government financial managers to use in preventing and detecting fraud iv assessing internal control agency managers must continuously monitor assess and improve the effectiveness of internal control associated with those internal control objectives identified as part of their risk profile this continuous monitoring and other periodic evaluations provide the basis for the agency heads annual assessment and report on internal control as required by the fmfia a documentation requirements agency management must determine the appropriate level of documentation needed to support this assessment the green book provides documentation requirements that are a necessary part of an effective internal control system the level and nature of documentation vary based on the size of the entity and the complexity of the operational processes the entity performs management uses judgment in determining the extent of documentation that is needed documentation is required to demonstrate the design implementation and operating effectiveness of an entitys internal control system the green book includes minimum documentation requirements as follows: if managements assessment determines that a principle is not relevant management supports that determination with documentation that includes the rationale of how in the absence of that principle the associated component may be designed implemented and operated effectively  management develops and maintains documentation of its internal control system  management documents in policies the internal control responsibilities of the organization  management evaluates and documents the results of ongoing monitoring and separate evaluations to identify internal control issues  management evaluates and documents internal control issues and determines appropriate corrective actions for internal control deficiencies on a timely basis  management completes and documents corrective actions to remediate internal control deficiencies on a timely basis b sources of information the agencys assessment of internal control may be documented using a variety of information sources to include: management documentation of its internal control system policies procedures and knowledge gained from the daily operation of agency programs and systems  management reviews conducted (i) expressly for the purpose of assessing internal control or (ii) for other purposes with an assessment of internal control as a byproduct of the review  annual performance plans reports strategic reviews and program evaluations relevant to internal control pursuant to the gpra modernization act and omb circular no a11 section 200 federal performance framework  acquisition assessments pursuant to omb memorandum: conducting acquisition assessments under omb circular no a123 may 21 2008  management reviews and annual evaluations and reports related to information technology information security and information resources pursuant to the federal information security modernization act of 2014 and omb circular no a130 responsibilities for protecting federal information resources  outputs of governance mechanisms for information technology resources published by the agency pursuant to the cio authorities described in the federal information technology acquisition reform act (fitara)  office of government ethics program reviews and other internal agency ethics program reviews  annual reviews and reports pursuant to the improper payments information act of 2002 as amended by the improper payments elimination and recovery act of 2010 and the improper payments elimination and recovery improvement act of 2012  program reviews conducted pursuant to omb circular no a129 policies for federal credit programs and nontax receivables  single audit act reports and program reviews conducted pursuant to the uniform administrative requirements cost principles and audit requirements for federal awards for grantmaking agencies  antideficiency act reviews and investigations  independent audit reports including office of inspectors general management challenges and gao high risk reports  internal audit reports  reports and other information provided by the congressional committees of jurisdiction  other reviews or reports relating to agency operations or management controls  assessments of internal control over financial reporting and reviews of financial management systems pursuant to appendix a of omb circular no a123 internal control over reporting appendix b to omb circular no a123 improving the management of government charge card program appendix c to omb circular no a123 requirements for effective estimation and remediation of improper payments or appendix d to omb circular no a123 compliance with the federal financial management improvement act use of information should take into consideration the completeness of the assessment and whether the process included an evaluation of internal control agency management should avoid duplicating reviews that assess internal controls and should coordinate their efforts with other evaluations to the extent practical c identification of deficiencies agency managers and employees should identify deficiencies in internal control from the sources of information described above and the results of their assessment process the assessment process must include an assessment of compliance with each of the green book components and principles in addition the identification of deficiencies must include all management and operational functions and processes that support mission delivery agency employees and managers report control deficiencies at a minimum to the next supervisory level which allows the chain of command structure to determine the relative importance of each deficiency reporting of deficiencies should also include reporting deficiencies to the agencys inspector general definitions of control deficiencies significant deficiencies and material weaknesses are provided in section vi agency managers and staff are encouraged to identify control deficiencies as this reflects positively on the agencys commitment to recognizing and addressing management problems failing to report a known material weakness or significant deficiency reflects adversely on the agency and continue to place the agencys mission support operations at risk agencies must carefully consider whether systemic weaknesses exist that adversely affect internal control across organizational or program lines d internal control evaluation approach management is responsible for evaluating whether a system of internal control reduces the risk of not achieving the entitys objectives related to operations reporting or compliance to an acceptable level in evaluating internal control management should follow a riskbased assessment approach:9 9 section based on coso internal control integrated framework illustrative tools for assessing effectiveness of a system of internal control (new york: american institute of certified public accountants 2013) 1 conduct an assessment of internal control management must conduct an evaluation of internal controls for each of the green books principles for each of the entity objectives 2 prepare a summary of internal control deficiencies management should leverage an aggregated or summary log of all identified internal control deficiencies from the sources of information listed in section b above and the results of their assessment process the log may support the evaluation of the green books internal control components and principles 3 conclude on internal control principle evaluation management must summarize its determination of whether each principle is designed implemented and operating effectively that determination is a function of management judgment based on: a the applicability of the principle to the agencys circumstances b whether the agency has actually been able to implement perform and apply the principle c any internal control deficiency that may result d the extent of compensating internal controls within the principle and e the extent to which the remaining risk impacts on the agencys ability to achieve its objectives and meet its mission and goals evaluation of whether each principle is designed implemented and operating effectively must be of the yesno type 4 conclude on internal control component evaluation management must also summarize its determination of whether each component is designed implemented and operating effectively similar to item three above evaluation of internal control components is a function of management judgment and qualitative determinations if an internal control principle is not designed implemented and operating effectively management is unable to conclude that the internal control component is operating effectively 5 conclude on overall assessment of a system of internal control management must summarize its determination of whether each of the green books components and principles are designed implemented and operating effectively and components are operating together in an integrated manner in addition management must determine the severity of internal control deficiencies or combination of deficiencies when aggregated across the components if one or more internal control components are not operating effectively a material weakness must be reported the following table illustrates how internal control principles within the control environment component roll up into the determination of whether the component is designed implemented and operating effectively in addition to the overall assessment of a system of internal control examples below include illustrative summaries of control deficiencies table3illustrative internal control evaluationcontrol environment illustrative internalcontrol evaluationcontrol environmentprinciplecontrol deficiency summaryprinciple 1: demonstratecommitment tointegrity andethical valuesthe agencys ethics training program is not sufficientto make all employees aware of the importance ofadhering to the executive branch employee standards ofconduct the agency doesnot have processes in place to detectandmitigate potential employee conflicts of interest management concludes the principle isnotdesigned implemented and operating effectively principle 2: exercise oversight responsibilityinternal control deficiency noted because the seniormanagement councils review of risk assessments andremediation plans are not documented management concludes that the principle is designed implemented and operating effectively despite internalcontrol deficiencies based on an evaluation of the severity of deficiencies and that compensating controlsare in place principle 3: establish structure responsibility andauthorityinternal control deficiency noted because oversight andcontrol structures havenot evolved to keep upwith changes in operations management concludes that the principle is designed implemented and operating effectively as the deficiencynoted only affect a small portion of the agency principle 4: demonstratecommitment to competenceno internal control deficiencies noted management concludes that the principle is designed implemented and operating effectively principle 5: enforce accountabilityinternal control deficiencies noted because managementwith oversight from the seniormanagement council does not take necessarycorrective actions management concludes that the principle is notdesigned implemented and operating effectively the following table is anillustrativeexample of the results of managements assessment of the control environment component: table4principleand component evaluation principle evaluationprincipledesigned implemented(yesno) operating effectively1) demonstrate commitment to integrity and ethical valuesnoineffective2) exercise oversightresponsibilityyeseffectivewith internal controldeficiencies and compensatingcontrolsnoted3) establish structure responsibility andauthorityyeseffectivewith internal controldeficiencies and compensatingcontrolsnoted 4) demonstrate commitment to competence yes effective 5) enforce accountability no ineffective component evaluation component designed implemented (yesno) operating effectively control environment no ineffective in the table above management concludes the control environment component is not designed implemented and operating effectively since two principles are not designed implemented and operating effectively due to the identified deficiencies from the summary log each principle supports the design implementation operational effectiveness of the associated component if one principle is ineffective management is unable to conclude that the component is effective10 in the table below since management concluded that the control environment is not operating effectively it must conclude that the overall system of internal control was not operating effectively and an entitylevel control material weakness must be reported 10 see green book ov303 factors of effective internal control table 5 overall assessment of a system of internal control overall assessment of a system of internal control system evaluation designed implemented (yesno) operating effectively control environment no ineffective risk assessment yes effective control activities yes effective information and communication yes effective monitoring yes effective are all components operating together in an integrated manner no ineffective overall evaluation of a system of internal control overall evaluation operating effectively is the overall system of internal control effective no v correcting internal control deficiencies a importance of correcting internal control deficiencies correcting control deficiencies is an integral part of management accountability and must be considered a priority by the agency an agencys ability to correct control deficiencies is an indicator of the strength of its internal control environment effective remediation of control deficiencies is essential to achieving the objectives of the fmfia and uncorrected or longstanding control deficiencies must be considered in determining the overall effectiveness of internal control the corrective action process provides the mechanism for management to present a comprehensive plan for addressing the risk associated with a control deficiency b corrective action plan requirements agencies should perform a rootcause analysis of the deficiency to ensure that subsequent strategies and plans address the root of the problem and not just the symptoms identifying and developing an understanding of the root cause of control deficiencies is managements responsibility management should incorporate ig and gao audit findings as part of its identification process; however auditors are not responsible for identifying root causes of control deficiencies as a result reliance on audit findings or recommendations alone may lead to incomplete corrective actions management should also consider alternative risk mitigation strategies and perform costbenefit analysis to determine the best or most costeffective solution a summary of the corrective action plans for material weaknesses that have not been fully mitigated at the time of reporting must be included in the agencys afr par or other management report also see section vi for reporting on material weaknesses the summary discussion must include a description of the material weakness status of corrective actions and timeline for resolution management must maintain more thoroughly detailed corrective action plans internally which must be made available for omb and audit review managements process for resolution and corrective action of identified internal control deficiencies must: communicate corrective actions to the appropriate level of the agency and delegate authority for completing corrective actions to appropriate personnel  determine the resources required to correct a control deficiency the corrective action plan must indicate the types of resources needed (eg additional personnel contract support training etc ) including nonfinancial resources such as senior leadership support for correcting the control deficiency  include critical path milestones that affect the overall schedule and performance of the corrective actions needed to resolve the control deficiency critical path milestones must lead to a date certain of the correction of the control deficiency  require prompt resolution and internal control testing to validate the correction of the control deficiency  ensure that accurate records of the status of the identified control deficiency are maintained and updated throughout the entire process  ensure that the corrective action plans are consistent with laws regulations and agency policy  ensure that performance appraisals of appropriate officials reflect effectiveness in resolving or implementing corrective action for identified material weaknesses  fully disclose uncorrected internal control weaknesses and highlight those that are material a determination that a control deficiency has been corrected should be made by the senior accountable official only when sufficient corrective actions have been taken and validated this determination must be in writing supported by appropriate documentation and made available for review by appropriate officials eg the agencys senior management council or equivalent c audit follow up and cooperative audit resolution and oversight initiatives as managers consider office of inspectors general (oig) gao and other investigative audit reports in identifying and correcting internal control deficiencies they must be mindful of the statutory requirements included in the inspector general act as amended and omb circular no a50 audit followup management has a responsibility to complete action in a timely manner on audit recommendations on which agreement with the oig has been reached management must make a decision regarding oig audit recommendations within a sixmonth period after issuance of the audit report and implement managements decision within one year to the extent practicable some agencies use cooperative audit resolution and oversight initiatives (caroi)11 to complement oversight of corrective actions and internal control efforts in addition the uniform grant guidance encourages agencies to use cooperative audit resolution mechanisms as part of audit followup techniques that promote prompt corrective actions by improving communication fostering collaboration promoting trust and developing a common understanding of audit findings to improve federal program outcomes the aga has conducted research and has developed a framework to implement caroi at federal agencies the aga provides the caroi is a tool for achieving: 1) alternative and creative approaches to resolving audit findings and their underlying causes and 2) greater success in attaining program goals at all levels of government through the constructive use of monitoring and technical assistance (ie oversight activities) while the establishment of a caroi is not a requirement of this document a caroi or similar construct is encouraged 11 https:wwwagacgfmorgagatoolsresourcesdocumentscaroipdf vi reporting on internal controls a annual assurance statement the assurance statement and summary information related to section 2 and section 4 of the fmfia must be provided in a single report section of the annual afr par or other management report labeled analysis of entitys systems controls and legal compliance the section must include the annual assurance statement a summary of the agencys process for assessing internal control effectiveness and resulting material weaknesses and corrective action plans as of september 30 of a given fiscal year12 the assurance statement is an accountability statement so only essential information must be included table 5 provides a summary of internal control reporting requirements and exhibits 1 2 and 3 provide illustrative examples of assurance statements 12 agencies may use roll forward procedures for timing differences in different types of internal control assessments (eg timing differences between june 30 and september 30) b reporting pursuant to integration of enterprise risk management and internal control management has discretion in determining the scope of operations reporting and compliance objectives based on the agencys risk profile as described in section ii of this document agencies are required to provide assurances on their process to identify risks and establish controls or integrate existing controls to the identified risk some of these internal control systems may have been operating effectively prior to integration of these risks these assurances should be built out over time following a maturity model approach and reported in the afr along with a report on identified material weaknesses and corrective actions until an agency has fully implemented an erm approach to risk management they may continue to provide the existing risk assurance statements to their oig andor private accounting firms c reporting pursuant to omb circular no a123 appendix a appendix a of omb circular no a123 provides a methodology for agency management to assess document and report on internal controls over reporting this document also encourages an integrated approach to assess the internal controls over reporting considering the current legislative and regulatory environment in which federal entities operate managements assessment of internal control over external financial reporting must follow the assessment methodology provided in appendix a to circular no a123 internal control over reporting d reporting pursuant to omb circular no a130 appendix i appendix i of omb circular no a130 responsibilities for protecting and managing federal information resources establishes minimum requirements for federal information security programs assigns federal agency responsibilities for the security of information and information systems and links agency information security programs and agency management control systems established in accordance with omb circular no a123 the appendix also establishes requirements for federal privacy programs assigns responsibilities for privacy program management and describes how agencies must take a coordinated approach to implementing information security and privacy controls e reporting pursuant to section 231 usc 3512(d) (2) section 231 usc 3512(d) (2) commonly referred to as section 2 of the fmfia requires that the head of each executive agency annually submit to the president and the congress (i) a statement on whether there is reasonable assurance that the agencys controls are achieving their intended objectives; and (ii) a report on material weaknesses in the agencys controls  statement of assurance the statement of assurance represents the agency heads informed judgment as to the overall adequacy and effectiveness of internal control within the agency related to operations reporting and compliance the statement must take one of the following forms: o unmodified statement of assurance (no material weaknesses or lack of compliance reported); o modified statement of assurance considering the exceptions explicitly noted (one or more material weaknesses or lack of compliance reported); or o statement of no assurance (no processes in place or pervasive material weaknesses) in deciding on the type of assurance to provide the agency head should consider information from the assessment process described in section iv of this circular with input from senior program and administrative officials management is precluded from concluding that the agencys internal control is effective (unmodified statement of assurance) if there are one or more material weaknesses in support of a single assurance statement a detailed summary of management assurances must also be provided in the other information section of the annual afr par or other management report the detailed assurances should mirror the single assurance statement and provide assurance over the effectiveness of internal controls in each supporting area of operations reporting (including external financial reporting) and compliance the agency head must sign the statement of assurance f reporting pursuant to section 431 usc 3512(d) (2) (b) section 431 usc 3512(d) (2) (b) commonly referred to as section 4 of the fmfia requires cfo act agencies a separate report on whether the agencys financial management systems comply with governmentwide requirements these financial management systems requirements are mandated by section 803 (a) of the federal financial management improvement act and appendix d to omb circular no a123 compliance with the federal financial management improvement act of 1996 ffmia section 803(a) requirements include compliance with federal financial management system requirements applicable federal accounting standards and the united states standard general ledger (ussgl) at the transaction level if the agencys systems do not comply with financial systems requirements the statement must list the lack of compliance noted and discuss the agencys plans for bringing its systems into compliance financial management systems include both financial and financiallyrelated (or mixed) systems g government corporations for government corporations section 306 of the chief financial officers act established a reporting requirement related to the internal controls for corporations covered by the government corporation control act these corporations must submit an annual management report to the congress this report must include among other items a statement on control systems by the head of the management of the corporation consistent with the requirements of the fmfia the corporation is required to provide the president the director of omb and the comptroller general a copy of the management report when it is submitted to the congress h classified matters the statement of assurance is made available to the public however relevant information that is specifically prohibited from disclosure by any provision of law or specifically required by executive order to protect the interest of national defense or the conduct of foreign affairs must not be included in the statement made available to the public descriptions of major vulnerabilities must be framed in such a way as to preclude an adverse party from exploiting the information table 6 summary of omb circular no a123 reporting requirements category definition reporting control deficiency a control deficiency exists when the design implementation or operation of a control does not allow management or personnel in the normal course of performing their assigned functions to achieve control objectives and address related risks13 a deficiency in design exists when (1) a control necessary to meet a control objective is missing or (2) an existing control is not properly designed so that even if the control operates as designed the control objective would not be met14 a deficiency in implementation exists when a properly designed control is not implemented correctly in the internal control system 15 a deficiency in operation exists when a properly designed control does not operate as designed or when the person performing the control does not possess the necessary authority or competence to perform the control effectively16 internal to the organization and not reported externally progress against corrective action plans must be periodically assessed and reported to agency management significant deficiency a significant deficiency is a deficiency or a combination of deficiencies in internal control that is less severe than a material weakness yet important enough to merit attention by those charged with governance17 internal to the organization and not reported externally progress against corrective action plans must be periodically assessed and reported to agency management 13 green book ov308 14 green book ov305 15 green book ov305 16 green book ov306 17 consistent with auc 260 the auditors communication with those charged with governance the 2011 revision of government auditing standards defines those charged with governance as the person(s) or organization(s) with responsibility for overseeing the strategic direction of the entity and the obligations related to the accountability of the entity this includes overseeing the financial reporting process subject matter or program under audit including related internal controls category definition reporting material weakness a significant deficiency that the agency head determines to be significant enough to report outside of the agency as a material weakness in the context of the green book nonachievement of a relevant principle and related component results in a material weakness18 a material weakness in internal control over operations might include but is not limited to conditions that: impacts the operating effectiveness of entity level controls; impairs fulfillment of essential operations or mission; deprives the public of needed services; or significantly weakens established safeguards against fraud waste loss unauthorized use or misappropriation of funds property other assets or conflicts of interest a material weakness in internal control over reporting is a significant deficiency in which the agency head determines significant enough to impact internal or external decisionmaking and reports outside of the agency as a material weakness a material weakness in internal control over external financial reporting is a deficiency or a combination of deficiencies in internal control such that there is a reasonable possibility19 that a material misstatement of the entitys financial statements will not be prevented or detected and corrected on a timely basis a material weakness in internal control over compliance is a condition where management lacks a process that reasonably ensures preventing a violation of law or regulation that has a direct and material effect on financial reporting or significant effect on other reporting or achieving agency objectives material weaknesses and a summary of corrective actions must be reported to omb and congress through the afr par or other management reports progress against corrective action plans must be periodically assessed and reported to agency management 18 the federal information security modernization act of 2014 no longer requires that a significant deficiency identified be reported as a material weakness for fmfia 19 in this definition a reasonable possibility exists when the likelihood of the event is reasonably possible or probable as those terms are used in auc 265 communicating internal control related matters identified in an audit exhibit 1 illustrative unmodified assurance statement the agency management is responsible for managing risks and maintaining effective internal control to meet the objectives of sections 2 and 4 of the federal managers financial integrity act the agency conducted its assessment of risk and internal control in accordance with omb circular no a123 managements responsibility for enterprise risk management and internal control based on the results of the assessment the agency can provide reasonable assurance that internal control over operations reporting and compliance were operating effectively as of september 30 20xx head of the agency signature exhibit 2 illustrative modified assurance statement the agency management is responsible for managing risks and maintaining effective internal control to meet the objectives of sections 2 and 4 of the federal managers financial integrity act the agency conducted its assessment of risk and internal control in accordance with omb circular no a123 managements responsibility for enterprise risk management and internal control based on the results of the assessment the agency can provide reasonable assurance that internal control over operations reporting and compliance were operating effectively as of september 30 20xx except for the following material weaknesses reported: insert brief description of each internal control material weakness; head of the agency signature exhibit 3 illustrative statement of no assurance the agency management is responsible for managing risks and maintaining effective internal control to meet the objectives of sections 2 and 4 of the federal managers financial integrity act the agency conducted its assessment of risk and internal control in accordance with omb circular no a123 managements responsibility for enterprise risk management and internal control based on the results of the assessment the agency is unable to provide assurance that internal control over operations reporting and compliance was operating effectively due to the following material weaknesses: insert brief description of each internal control material weakness; head of the agency signature i agencies obtaining audit opinions on internal control agencies may be required or may at their choice elect to receive an audit opinion on internal control over external financial reporting these agencies must provide a separate assurance statement for internal control over external financial reporting the green book and omb circular no a123 provide adequate criteria for managements assessment of internal control and related management assurances public company accounting oversight board requirements for the private sector are not requirements of the federal government vii additional considerations a managing privacy risks in federal programs the federal government necessarily creates collects uses processes stores maintains disseminates discloses and disposes of personally identifiable information (pii) to carry out the missions mandated by federal statute the term pii as defined by omb refers to information that can be used to distinguish or trace an individuals identity either alone or when combined with other information that is linked or linkable to a specific individual because there are many different types of information that can be used to distinguish or trace an individuals identity the term pii is necessarily broad to determine whether information is pii the agency must perform an assessment of the specific risk that an individual can be identified using the information with other information that is linked or linkable to the individual in performing this assessment it is important to recognize that information that is not pii can become pii whenever additional information becomes available in any medium and from any source that would make it possible to identify an individual once the agency determines that an information system contains pii the agency must then consider the privacy risks and the associated risk to agency operations agency assets individuals other organizations and the nation when considering privacy risks the agency must consider the risks to an individual or individuals associated with the agencys creation collection use processing storage maintenance dissemination disclosure and disposal of their pii in particular the agency must evaluate the sensitivity of each individual data element that is pii as well as all of the data elements together the sensitivity level of the pii will depend on the context including the purpose for which the pii is created collected used processed stored maintained disseminated disclosed or disposed for example the sensitivity level of a list of individuals names may depend on the source of the information the other information associated with the list the intended use of the information how the information will be processed and shared and the ability to access the information in addition when determining the privacy and associated risks the agency must also consider the volume of pii a higher volume of pii about a single individual or multiple individuals may pose increased privacy or associated risks agency privacy programs in order to manage federal information resources that involve pii agencies must develop implement document maintain and oversee agencywide privacy programs that include people processes and technologies agencies privacy programs are led by the senior agency official for privacy (saop) and are responsible for ensuring compliance with applicable privacy requirements developing and evaluating privacy policy and managing privacy risks privacy programs review of privacy risks should begin at the earliest planning and development stages of agency actions and policies that involve pii and should continue throughout the life cycle of the information privacy impact assessments as a general matter an agency must conduct a privacy impact assessment (pia) under section 208(b) of the egovernment act of 2002 absent an applicable exception under that section when the agency develops procures or uses information technology to create collect use process store maintain disseminate disclose or dispose of pii20 a pia is an analysis of how pii is handled to ensure that handling conforms to applicable privacy requirements determine the privacy risks associated with an information system or activity and evaluate ways to mitigate privacy risks a pia is both an analysis and a formal document detailing the process and the outcome of the analysis 20 see 44 usc  3501 note section 208(b) of the egovernment act requires agencies absent an applicable exception under this section to conduct a pia before: (i) developing or procuring it that collects maintains or disseminates information that is in an identifiable form; or (ii) initiating a new collection of information that (i) will be collected maintained or disseminated using it; and (ii) includes any information in an identifiable form permitting the physical or online contacting of a specific individual if identical questions have been posed to or identical reporting requirements imposed on 10 or more persons other than agencies instrumentalities or employees of the federal government a pia is one of the most valuable tools federal agencies use to ensure compliance with applicable privacy requirements and manage privacy risks agencies must conduct and draft a pia with sufficient clarity and specificity to demonstrate that the agency fully considered privacy and incorporated appropriate privacy protections from the earliest stages of the agency activity and throughout the information life cycle in order to conduct a meaningful pia the agencys saop must work closely with the program managers information system owners information technology experts security officials counsel and other relevant agency officials moreover a pia is not a timerestricted activity that is limited to a particular milestone or stage of the information system or pii life cycles rather the privacy analysis must continue throughout the information system and pii life cycles accordingly a pia must be considered a living document that agencies are required to update whenever changes to the information technology changes to the agencys practices or other factors alter the privacy risks associated with the use of such information technology in addition to serving as an important analytical tool for agencies a pia also serves as notice to the public regarding the agencys practices with respect to privacy and information technology all pias must be drafted in plain language and must be posted on the agencys website unless doing so would raise security concerns or reveal classified or sensitive information although pias are generally required by law such as by the egovernment act of 2002 agencies may also develop policies to require pias in circumstances where a pia would not be required by law risk management framework agencies privacy programs have responsibilities under the risk management framework21 the risk management framework provides a disciplined and structured process that integrates information security privacy and risk management activities into the information system development life cycle agencies should refer to omb circular no a130 for more detailed guidance regarding the role of agencies privacy programs under the risk management framework 21 traditionally the risk management framework was a framework to help agencies address information security and related risks in the authorization process for federal information systems nist has published a suite of standards and guidelines that describe how to implement an agencywide risk management framework as of the date of this publication many of the existing nist standards and guidelines that detail how to implement an agency wide risk management framework do not fully address the role of privacy and agencies privacy programs in the future nist may revise or develop standards and guidelines to further clarify how privacy and agencies privacy programs are integrated into the risk management framework b conducting acquisition assessments under omb circular no a123 in may 2008 ombs office of federal procurement policy (ofpp) issued guidelines including an assessment template to (1) establish a standard approach for assessing acquisition activities and programs; and (2) integrate these efforts into existing agency internal control processes and practices required by omb circular no a123 the template was adopted from the government accountability office (gao) framework for assessing the acquisition function at federal agencies (framework) (gao05218g) and consists of four interrelated areas ie cornerstones that are essential to an efficient effective and accountable acquisition process: (1) organizational alignment and leadership; (2) policies and processes; (3) human capital; and (4) information management and stewardship assessments conducted using this acquisition framework can continue to be leveraged in meeting the requirements of the current update to omb circular no a123 these guidelines are based on gaos framework for assessing the acquisition function at federal agencies (gao05218g) and can continue to be leveraged in meeting the requirements of the current update to omb circular no a123 each of the elements of ombs acquisition framework is reviewed below in relation to the green book the critical factors contained in each element of the acquisition framework are used where possible to depict these similarities and differences the following illustrative table is included in setting out concepts that are common to both ombs acquisition framework and the green book and required by the green book but not part of the acquisition framework table 7 comparison of omb acquisition framework and gao green book common to both differences required by the green book aligning acquisition with agency mission and needs commitment from leadership none planning strategically effectively managing the acquisition process promoting successful outcomes of major projects management responsibility for considering fraud risks valuing and investing in the acquisition workforce strategic human capital planning acquiring developing and retaining talent creating resultsoriented organizational cultures management responsibility for considering fraud risks identify data and technology that support acquisition management decisions safeguarding the integrity of operations and data none agencies should continue their prior assessment activities under the acquisition framework to comply with the 2014 revision of the green book for example the framework describes the commitment from leadership element to include management providing clear strong and ethical executive leadership and effective communication and continuous improvement these activities align with the green book principles that require an entity to demonstrate commitment to integrity and ethical values while ensuring that management should communicate the necessary quality information both internally and externally one required green book principle that is absent from the current acquisition framework is managements consideration for potential fraud when identifying analyzing and responding to risks agencies must consider fraud risks in their strategic plans and ensure agency professionals involved in planning for reviewing awarding and managing deliverables under contract and throughout the acquisition lifecycle receive training on fraud indicators and risks additional guidance covering administrative actions and procedures for preventing fraud in emergency responses and contingency operations can be found in ombs emergency acquisitions guide22 and in the federal acquisition regulation (far) 22 memorandum for chief acquisition officers senior procurement executives emergency acquisitions guide 1142011 http:wwwwhitehousegovombprocurement c managing grants risks in federal programs on december 26 2013 omb published the final guidance uniform administrative requirements cost principles and audit requirements for federal awards (uniform guidance) 2 cfr 200 these new requirements set forth standards for obtaining consistency and uniformity among federal agencies for the audit of nonfederal entities expending federal awards the requirements seek to effectively focus federal resources improve federal grant award performance and create a governmentwide framework for ensuring effective fiscal management of federal grants in addition the requirements in 2 cfr 200501 audit requirements reduce the administrative burden on recipients by increasing the single audit threshold to $750000 in federal award expenditures per year the guidance in 2 cfr 200205 requires federal awarding agency review of risk(s) posed by applicants risk evaluation(s) whenever making new awards and authorized use of a risk based approach within each federal agency there is a shared interest for management and oversight of federal grant dollars from both a financial management and grants management perspective leveraging the riskbased perspective the internal controls framework should serve as a mechanism to ensure effective and efficient allocation and use of federal grant dollars agencies must consider fraud risks in their strategic plans and ensure federal officials involved in planning for awarding and managing grants and other forms of financial assistance receive training of fraud indicators and risk in addition the federal government has a number of complex interdependencies with state and local governments and other recipients of federal funding from an erm perspective these interdependencies are called the extended enterprise impacts the agencys risk management and give rise to certain additional risks which need to be considered in the agencys risk profile finally erm and use of data analytics is an emerging best practice; examples include: preaward decision support: appropriate tools and data analytics made available to federal awarding agencies to properly conduct risk analysis  prepost award monitoring plans and activities: federal awarding agencies use of relevant data to determine risks and take appropriate action prior to making awards  award grantee risk mitigation: federal awarding agencies plan for and execute monitoring and mitigation activities meeting their specific needs  grant policy monitoring standards: federal awarding agencies manage grant portfolios using a common set of riskbased standards d managing antideficiency act risks the antideficiency act (ada) imposes restrictions on the amounts of obligations or expenditures that agencies may make ada violations are ultimately reported to the president congress and the government accountability office an ada violation may be a symptom of an underlying control deficiency omb circular no a11 section 150 administrative control of funds outlines requirements for the administrative control of funds under the ada section 1503 explains the relationship between an agencys internal controls and its fund controls in addition omb circular no a11 section 145 requirements for reporting antideficiency act violations provides more information about the ada and also provides agencies with guidelines for reporting violations the agencys risk profile as described in section ii must include a review of the agencys budget authority from sources such as appropriations legislation and identify any areas in which there is a risk of violating the ada