Policies

General

Published on

Internal Audit Procedure Free Template

Here is the complete Internal Audit Procedure document (PRC-ALL-003), aligned with SOC 2 Trust Criteria CC4.1 and CC4.2, and ISO/IEC 27001:2022 Controls A.5.30 and A.5.31:

1. Document Control

  • Document Title: Internal Audit Procedure

  • Document Identifier: PRC-ALL-003

  • Version Number: v1.0

  • Approval Date: <24 June 2025>

  • Effective Date: <24 June 2025>

  • Review Date: <24 June 2026>

  • Document Owner: <Head of Internal Audit>

  • Approved By: <Audit and Risk Committee>

2. Purpose

The purpose of this Internal Audit Procedure is to define the method and requirements for conducting independent and objective evaluations of ’s internal controls, risk management practices, and compliance with policies, procedures, and applicable standards. Internal audits are a key mechanism for ensuring the effectiveness of governance, identifying control weaknesses, and supporting continuous improvement across business and IT functions.

This procedure supports SOC 2 Trust Services Criteria CC4.1 (monitoring of control activities) and CC4.2 (internal audit function), and aligns with ISO/IEC 27001:2022 controls A.5.30 (Independent Review) and A.5.31 (Compliance with Security Policies and Standards).

3. Scope

This procedure applies to all departments, business units, IT systems, and processes subject to internal controls at . It includes corporate governance, finance, operations, information security, privacy, and compliance-related functions.

All employees, contractors, and service providers involved in business operations may be subject to audit review. This procedure also governs audits in preparation for SOC 2, ISO 27001, ISO 9001, and other compliance certifications.

4. Policy Statement

shall maintain a formal, risk-based internal audit program that:

  1. Independence: Ensures internal audit staff are organizationally independent of the operations they review.

  2. Planning: Establishes an annual audit plan based on risk assessments, business priorities, and compliance requirements.

  3. Execution: Uses documented procedures and standardized templates for conducting audit engagements.

  4. Documentation: Maintains comprehensive audit records, including working papers, findings, and evidence.

  5. Reporting: Issues formal audit reports to management and the Audit and Risk Committee, including observations, risk ratings, and corrective actions.

  6. Follow-up: Tracks remediation of findings through closure and revalidation testing.

  7. Continuous Improvement: Updates audit practices based on industry standards, feedback, and regulatory developments.

All business units must cooperate fully with audit requests and provide timely access to systems, personnel, and documentation.

5. Safeguards

Control ID

Safeguard Description

AUD-01

An annual risk-based audit plan is approved by the Audit and Risk Committee.

AUD-02

Auditors are not assigned to review processes where they have operational responsibilities.

AUD-03

Each audit follows a standardized engagement lifecycle (Planning → Fieldwork → Reporting → Follow-up).

AUD-04

Audit findings are assigned risk ratings (e.g., Low, Medium, High, Critical) and corrective action owners.

AUD-05

A central Audit Tracker logs all findings, due dates, and resolution status.

AUD-06

All supporting audit evidence is retained in a secure repository for at least 3 years.

AUD-07

Progress on unresolved issues is reviewed monthly and escalated if overdue.

AUD-08

All high-risk or repeat findings are escalated to the Board or Risk Committee.

6. Roles and Responsibilities

  • Head of Internal Audit: Manages the audit function, sets annual objectives, and reports to executive leadership.

  • Internal Auditors: Plan, execute, and document audit engagements in accordance with internal methodologies.

  • Audit and Risk Committee: Approves the audit plan, receives audit reports, and oversees corrective actions.

  • Process Owners: Collaborate with auditors, respond to findings, and implement corrective measures.

  • Information Security Team: Assists with audits of technical controls, logs, and risk mitigations.

  • Legal/Compliance Teams: Review audit findings for legal or regulatory implications and support enforcement.

7. Compliance and Exceptions

Compliance with this procedure is monitored through the completion of the annual audit plan, tracking of findings, and adherence to remediation timelines. Audits are themselves subject to quality assurance reviews and periodic external assessments.

Exceptions to the internal audit scope or schedule must be formally documented and approved by the Head of Internal Audit and, where applicable, reported to the Audit and Risk Committee with justification.

8. Enforcement

Failure to cooperate with internal audits or remediate confirmed findings in a timely manner may result in escalation to executive management. Repeated non-compliance may trigger disciplinary action, including access restrictions or employment termination for employees.

Vendors and third parties found in violation of contractual audit requirements may face financial penalties or loss of business relationships.

9. Related Policies/Documents

  • POL-ALL-016: Internal Audit Charter

  • PRC-ALL-001: Risk Assessment Procedure

  • PRC-ALL-004: Corrective and Preventive Action Procedure

  • SOC 2 Trust Criteria: CC4.1, CC4.2

  • ISO/IEC 27001:2022 Controls A.5.30, A.5.31

  • Audit Plan Template

  • Audit Tracker and Issue Log

  • Evidence Collection Checklist

10. Review and Maintenance

This procedure shall be reviewed annually or upon significant changes to audit strategy, governance structure, or applicable regulatory requirements. The Head of Internal Audit is responsible for coordinating updates and version control.

Template

Ready to experience the BlueDocs advantage

See why teams choose BlueDocs for comprehensive knowledge management, training workflows, and policy compliance tracking.

Ready to experience the BlueDocs advantage

See why teams choose BlueDocs for comprehensive knowledge management, training workflows, and policy compliance tracking.

Ready to experience the BlueDocs advantage

See why teams choose BlueDocs for comprehensive knowledge management, training workflows, and policy compliance tracking.

Ready to experience the BlueDocs advantage

See why teams choose BlueDocs for comprehensive knowledge management, training workflows, and policy compliance tracking.