Compliance Risk Assessment Matrix
COMPLIANCE RISK ASSESSMENT MATRIX
TABLE OF CONTENTS
- Document Control
- Executive Summary
- Purpose and Scope
- Regulatory and Standards Framework
- Methodology
- Risk Taxonomy and Categories
- Likelihood Scoring Rubric
- Impact Scoring Rubric
- Control Effectiveness Assessment
- Residual Risk Calculation and Heat Map
- Risk Appetite and Tolerance Statement
- Roles and Responsibilities
- Data Sources and Inputs
- Compliance Risk Register (Matrix)
- Remediation and Action Planning
- Reporting Deliverables
- Review Cadence and Triggers
- Definitions
- Practice Tips
- Sources and References
1. DOCUMENT CONTROL
| Field | Details |
|---|---|
| Organization | [________________________________] |
| Document Owner | [________________________________] |
| Title | [________________________________] |
| Effective Date | [__/__/____] |
| Version | [____] |
| Last Review Date | [__/__/____] |
| Next Review Date | [__/__/____] |
| Approved By | [________________________________] |
| Board / Committee Approval Date | [__/__/____] |
Revision History
| Version | Date | Author | Summary of Changes |
|---|---|---|---|
| [____] | [__/__/____] | [________________________________] | [________________________________] |
| [____] | [__/__/____] | [________________________________] | [________________________________] |
| [____] | [__/__/____] | [________________________________] | [________________________________] |
2. EXECUTIVE SUMMARY
This Compliance Risk Assessment Matrix provides a structured, repeatable methodology for identifying, evaluating, and prioritizing compliance risks across the organization. It is designed to align with the COSO Enterprise Risk Management Framework (2017), ISO 31000:2018 risk management principles, and the DOJ's Evaluation of Corporate Compliance Programs (September 2024 update). The assessment evaluates inherent risk, control effectiveness, and residual risk to produce a prioritized risk register that informs resource allocation, remediation planning, and board reporting.
Summary of Findings (to be completed):
| Category | High Risks | Medium Risks | Low Risks | Total |
|---|---|---|---|---|
| [________________________________] | [____] | [____] | [____] | [____] |
| [________________________________] | [____] | [____] | [____] | [____] |
| Total | [____] | [____] | [____] | [____] |
3. PURPOSE AND SCOPE
3.1 Purpose
This document serves as the organization's primary tool for:
- Systematically identifying compliance risks across all business units, geographies, and regulatory domains
- Evaluating the likelihood and potential impact of each identified risk
- Assessing the effectiveness of existing controls
- Calculating residual risk after considering control effectiveness
- Prioritizing risks for remediation and resource allocation
- Supporting the organization's obligations under SOX Sections 302 and 404 (for public companies) to maintain effective internal controls
- Demonstrating the existence of an effective compliance program as evaluated under the DOJ Evaluation of Corporate Compliance Programs (September 2024)
- Informing board and audit committee oversight of compliance risk
3.2 Scope
☐ All business units and operating divisions
☐ All geographic jurisdictions in which the organization operates
☐ All regulatory domains applicable to the organization
☐ Third-party relationships (vendors, suppliers, agents, intermediaries)
☐ Emerging risks (AI/ML, cryptocurrency, ESG, supply chain)
☐ Other: [________________________________]
Out of Scope (specify any exclusions): [________________________________]
4. REGULATORY AND STANDARDS FRAMEWORK
This risk assessment methodology is informed by the following regulatory requirements and industry frameworks:
4.1 Sarbanes-Oxley Act (SOX) — Sections 302 and 404
Section 302 requires the CEO and CFO of public companies to certify that: (i) the report contains no material misstatements or omissions; (ii) financial statements are accurate in all material respects; (iii) internal controls are properly designed; and (iv) certifying officers have disclosed to the audit committee and auditors all significant deficiencies in internal controls and any fraud involving management or employees with a significant role in internal controls.
Section 404 requires management to assess and report on the effectiveness of internal controls over financial reporting. The company's independent auditor must attest to and report on management's assessment. This compliance risk assessment supports the broader internal controls environment by identifying compliance risks that could give rise to financial misstatement.
Practice Tip (SOX): The SEC has clarified that internal control over financial reporting includes controls over compliance with laws and regulations that could have a material effect on financial statements. FCPA violations, environmental liabilities, and employment claims are common examples of compliance risks with financial reporting implications. Ensure your compliance risk assessment feeds into the SOX 404 scoping process.
4.2 COSO Enterprise Risk Management Framework (2017)
The 2017 COSO ERM Framework, "Enterprise Risk Management — Integrating with Strategy and Performance," organizes ERM around five interrelated components:
- Governance and Culture — Board oversight, operating structure, core values, human capital, talent competencies
- Strategy and Objective-Setting — Business context analysis, risk appetite definition, strategic planning integration
- Performance — Risk identification, risk severity assessment, risk prioritization, risk response implementation
- Review and Revision — Substantial change assessment, risk and performance review, pursuit of ERM improvement
- Information, Communication, and Reporting — Information systems, risk communication, enterprise risk reporting
This risk assessment template is designed to align with Components 3 (Performance) and 4 (Review and Revision).
4.3 ISO 31000:2018 — Risk Management Guidelines
ISO 31000:2018 provides principles and a generic framework for managing risk. Key principles reflected in this template include:
- Risk management should be integrated into all organizational activities
- Risk management should be structured and comprehensive
- Risk management should be customized to the organization
- Risk management should be inclusive (involving stakeholders)
- Risk management should be dynamic (responsive to change)
- Risk management should use the best available information
- Risk management should be continually improved
4.4 NIST Cybersecurity Framework 2.0 (February 2024)
NIST CSF 2.0 is organized around six functions: Govern, Identify, Protect, Detect, Respond, and Recover. The Govern function (new in version 2.0) emphasizes cybersecurity governance, leadership accountability, and risk management strategy. Organizations should integrate cybersecurity risk into this compliance risk assessment to ensure a holistic view.
4.5 DOJ Evaluation of Corporate Compliance Programs (September 2024)
The DOJ's Criminal Division updated its Evaluation of Corporate Compliance Programs in September 2024. Prosecutors evaluate three fundamental questions:
- Is the compliance program well designed? — Risk assessment, policies and procedures, training, reporting mechanisms, third-party management
- Is the program being applied earnestly and in good faith? — Commitment by senior and middle management, autonomy and resources, incentives and disciplinary measures
- Does the compliance program work in practice? — Continuous improvement, investigation response, analysis of misconduct and remediation
The September 2024 update added significant focus on AI and emerging technology risk management, whistleblower protections, and data analytics in compliance.
Practice Tip (DOJ): The DOJ evaluates whether companies conduct regular, risk-based compliance assessments. A company with an effective compliance program — including a documented risk assessment — is more likely to receive a favorable resolution in an enforcement action, including reduced monetary penalties and less burdensome compliance obligations.
4.6 FCPA and Anti-Bribery Risk Factors
The FCPA prohibits corrupt payments to foreign officials (anti-bribery provisions, 15 U.S.C. 78dd-1 et seq.) and requires issuers to maintain accurate books and records and sufficient internal controls (accounting provisions, 15 U.S.C. 78m). Key risk factors for FCPA compliance risk assessment include:
- Countries of operation (Transparency International CPI score)
- Use of third-party intermediaries, agents, consultants, and joint venture partners
- Government-facing transactions (permits, licenses, customs)
- Industry sector (extractives, defense, healthcare, infrastructure)
- Gift, travel, and entertainment practices
- Charitable contributions and political donations
- M&A due diligence (successor liability)
- Volume and complexity of transactions
5. METHODOLOGY
5.1 Assessment Approach
This assessment follows a four-step methodology:
Step 1: Risk Identification. Identify all compliance risks through a combination of regulatory mapping, interviews with business owners, review of historical incidents and enforcement actions, and horizon scanning.
Step 2: Inherent Risk Scoring. Evaluate each risk on two dimensions — Likelihood and Impact — without considering existing controls. Inherent Risk = Likelihood x Impact.
Step 3: Control Effectiveness Assessment. Evaluate the design and operating effectiveness of controls mitigating each risk on a 1-5 scale.
Step 4: Residual Risk Determination. Apply control effectiveness to inherent risk to determine residual risk. Residual Risk = Inherent Risk adjusted for Control Effectiveness.
5.2 Risk Velocity
In addition to likelihood and impact, this assessment optionally evaluates risk velocity — the speed at which a risk event would affect the organization:
| Velocity Rating | Description | Example |
|---|---|---|
| 1 — Slow | Impact unfolds over months to years | Gradual regulatory change |
| 2 — Moderate | Impact unfolds over weeks to months | Enforcement investigation ramp-up |
| 3 — Fast | Impact unfolds within days to weeks | Data breach, whistleblower report |
| 4 — Immediate | Impact is instantaneous or near-instantaneous | Sanctions violation, arrest, public disclosure |
6. RISK TAXONOMY AND CATEGORIES
Organize identified risks under the following categories (customize as appropriate):
6.1 Core Compliance Risk Categories
| Category | Description | Key Regulations |
|---|---|---|
| Anti-Corruption / Anti-Bribery | FCPA, UK Bribery Act, local anti-corruption laws | 15 U.S.C. 78dd-1; Bribery Act 2010 |
| Sanctions / Export Controls | OFAC, EAR, ITAR restrictions | 50 U.S.C. 4801; 31 CFR 500-599; 15 CFR 730-774 |
| Antitrust / Competition | Price fixing, market allocation, bid rigging | Sherman Act (15 U.S.C. 1-7); Clayton Act |
| Data Privacy / Cybersecurity | GDPR, CCPA/CPRA, state privacy laws, NIST | GDPR; Cal. Civ. Code 1798.100; various state laws |
| Financial Crimes / AML | Money laundering, fraud, BSA/AML | BSA (31 U.S.C. 5311); USA PATRIOT Act |
| Securities / Financial Reporting | Insider trading, disclosure, SOX | 15 U.S.C. 78j(b); SOX 302/404 |
| Employment / Labor | EEO, wage/hour, workplace safety, immigration | Title VII; FLSA; OSHA; IRCA |
| Environmental | EPA regulations, state environmental law | CAA; CWA; RCRA; CERCLA |
| Healthcare / PHI | HIPAA, Stark, Anti-Kickback | 42 U.S.C. 1320a-7b; 45 CFR 160-164 |
| Consumer Protection / Marketing | FTC Act, CAN-SPAM, TCPA, advertising | 15 U.S.C. 45; 47 U.S.C. 227 |
| Product Safety / Liability | CPSC regulations, product recall | 15 U.S.C. 2051 |
| Tax | Federal, state, international tax compliance | IRC; FATCA; OECD BEPS |
6.2 Cross-Cutting Risk Categories
| Category | Description |
|---|---|
| Third-Party / Supply Chain | Risks arising from vendors, agents, intermediaries, subcontractors |
| AI / Machine Learning / Emerging Technology | Algorithmic bias, autonomous systems, deepfakes, generative AI |
| ESG / Sustainability | Greenwashing, climate disclosure, human rights in supply chain |
| Recordkeeping / Document Retention | Litigation holds, retention schedules, destruction policies |
| Fraud / Abuse | Internal fraud, procurement fraud, expense reimbursement abuse |
| Conflicts of Interest | Related-party transactions, outside activities, financial interests |
| Whistleblower / Retaliation | Reports of misconduct, investigation integrity, anti-retaliation |
7. LIKELIHOOD SCORING RUBRIC
| Score | Rating | Description | Quantitative Guidance |
|---|---|---|---|
| 1 | Rare | Event is unlikely to occur within the assessment period | Less than 5% probability |
| 2 | Unlikely | Event could occur but is not expected | 5-20% probability |
| 3 | Possible | Event may occur during the assessment period | 20-50% probability |
| 4 | Likely | Event is expected to occur during the assessment period | 50-80% probability |
| 5 | Almost Certain | Event is expected to occur multiple times during the assessment period | Greater than 80% probability |
Factors to consider when assessing likelihood:
- Historical frequency of similar events (internal and external)
- Regulatory enforcement trends and announced priorities
- Industry peer enforcement actions
- Complexity and volume of relevant transactions
- Geographic exposure (high-risk jurisdictions)
- Maturity of applicable compliance controls
- Findings from internal audit or testing
- Complaints, hotline reports, or whistleblower activity
8. IMPACT SCORING RUBRIC
| Score | Rating | Financial Impact | Regulatory Impact | Operational Impact | Reputational Impact |
|---|---|---|---|---|---|
| 1 | Minimal | Less than $[____] | Informal inquiry; no finding | No disruption | No media coverage |
| 2 | Minor | $[____] to $[____] | Formal inquiry; minor finding | Minor disruption; resolved quickly | Limited media coverage |
| 3 | Moderate | $[____] to $[____] | Consent order; moderate fine | Moderate disruption; workaround required | Regional media coverage |
| 4 | Major | $[____] to $[____] | Significant enforcement; material fine | Major disruption; business unit affected | National media; analyst concern |
| 5 | Severe | Greater than $[____] | Criminal prosecution; debarment; systemic failure | Business continuity event; sustained disruption | Sustained global coverage; material value destruction |
Practice Tip: Customize the dollar thresholds in the impact rubric to reflect your organization's size, revenue, and risk appetite. A $1 million fine is "moderate" for a Fortune 500 company but "severe" for a small or mid-market firm.
9. CONTROL EFFECTIVENESS ASSESSMENT
9.1 Control Strength Scoring
| Score | Rating | Description |
|---|---|---|
| 1 | Nonexistent | No controls in place; risk is unmanaged |
| 2 | Weak | Controls exist but are informal, inconsistent, or unreliable; significant gaps |
| 3 | Basic | Controls are documented and partially effective; periodic testing; known gaps |
| 4 | Strong | Controls are well-designed, consistently applied, regularly tested; minor gaps |
| 5 | Mature | Controls are automated where feasible, continuously monitored, independently validated; embedded in culture |
9.2 Control Assessment Dimensions
For each risk, assess controls across the following dimensions:
| Dimension | Assessment Questions |
|---|---|
| Design | Are policies and procedures documented? Are they aligned with applicable law and regulation? |
| Implementation | Are controls operating as designed? Is there evidence of consistent application? |
| Testing | Are controls tested periodically (by compliance, internal audit, or external parties)? When was the last test? |
| Monitoring | Are key risk indicators (KRIs) tracked? Is there real-time or near-real-time monitoring? |
| Remediation | When deficiencies are identified, are they remediated promptly? Is there a tracking mechanism? |
| Training | Is training provided to relevant personnel? Is it role-based for higher-risk positions? Is completion tracked? |
| Tone at the Top | Does leadership demonstrate commitment to compliance? Are resources adequate? |
10. RESIDUAL RISK CALCULATION AND HEAT MAP
10.1 Residual Risk Formula
Inherent Risk Score = Likelihood (1-5) x Impact (1-5) = Range 1-25
Residual Risk = Inherent Risk Score adjusted by Control Effectiveness:
| Control Effectiveness | Risk Reduction Factor |
|---|---|
| 5 — Mature | Reduce inherent risk by 70-80% |
| 4 — Strong | Reduce inherent risk by 50-60% |
| 3 — Basic | Reduce inherent risk by 30-40% |
| 2 — Weak | Reduce inherent risk by 10-20% |
| 1 — Nonexistent | No reduction (residual = inherent) |
10.2 Heat Map Thresholds
| Residual Risk Score | Risk Level | Color | Action Required |
|---|---|---|---|
| 16-25 | Critical | Red | Immediate escalation to senior management / board; remediation plan within 30 days |
| 10-15 | High | Orange | Senior management attention; remediation plan within 60 days |
| 5-9 | Medium | Yellow | Management monitoring; remediation plan within 90 days |
| 1-4 | Low | Green | Routine monitoring; no immediate action required |
10.3 Visual Heat Map
IMPACT
1 2 3 4 5
+----+----+----+----+----+
5 | M | H | H | C | C |
L 4 | M | M | H | H | C |
I 3 | L | M | M | H | H |
K 2 | L | L | M | M | H |
E 1 | L | L | L | M | M |
+----+----+----+----+----+
L = Low | M = Medium | H = High | C = Critical
11. RISK APPETITE AND TOLERANCE STATEMENT
11.1 Risk Appetite
Risk appetite is the amount of risk the organization is willing to accept in pursuit of its strategic objectives. The Board of Directors / governing body has established the following risk appetite for compliance risk:
☐ Conservative — Organization seeks to minimize compliance risk; zero tolerance for material violations
☐ Moderate — Organization accepts a moderate level of compliance risk with strong controls
☐ Aggressive — Organization accepts elevated compliance risk in pursuit of growth (not recommended for regulated entities)
11.2 Risk Tolerance Thresholds
| Risk Category | Maximum Acceptable Residual Risk Level | Escalation Threshold |
|---|---|---|
| Anti-Corruption / Anti-Bribery | ☐ Low ☐ Medium | [________________________________] |
| Sanctions / Export Controls | ☐ Low ☐ Medium | [________________________________] |
| Data Privacy / Cybersecurity | ☐ Low ☐ Medium | [________________________________] |
| Financial Crimes / AML | ☐ Low ☐ Medium | [________________________________] |
| Securities / Financial Reporting | ☐ Low ☐ Medium | [________________________________] |
| Employment / Labor | ☐ Low ☐ Medium | [________________________________] |
| Environmental | ☐ Low ☐ Medium | [________________________________] |
| Healthcare / PHI | ☐ Low ☐ Medium | [________________________________] |
| Other: [________________________________] | ☐ Low ☐ Medium | [________________________________] |
12. ROLES AND RESPONSIBILITIES
| Role | Responsibilities |
|---|---|
| Chief Compliance Officer (CCO) | Owns methodology; leads risk assessment; aggregates results; reports to board/committee |
| General Counsel | Legal interpretation; regulatory mapping; enforcement trend analysis |
| Domain Risk Owners (Privacy, HR, Finance, Security, Operations) | Provide risk inputs; own controls; implement remediation; participate in interviews |
| Internal Audit | Independent testing and validation of controls; assess risk assessment methodology |
| Business Unit Leaders | Identify emerging risks; participate in risk interviews; support remediation |
| Board / Audit Committee | Review and approve risk assessment results; set risk appetite; oversee remediation |
| Ethics / Hotline Administrator | Provide complaint and investigation data; report trends |
| External Counsel / Advisors | Regulatory horizon scanning; enforcement benchmarking |
13. DATA SOURCES AND INPUTS
The following data sources should inform the risk assessment:
☐ Incidents, near-misses, and loss events
☐ Ethics hotline and complaint data (volume, categories, trends)
☐ Internal and external audit findings
☐ Regulatory examinations, inquiries, and correspondence
☐ Enforcement actions against the organization
☐ Enforcement actions against industry peers
☐ Product, geographic, and business line changes
☐ M&A activity and integration status
☐ Third-party due diligence results
☐ Key risk indicator (KRI) dashboards
☐ Employee survey results (culture, speak-up)
☐ Training completion rates and assessment scores
☐ Policy exception and waiver logs
☐ Litigation and claims data
☐ Regulatory change tracking (new laws, proposed rules)
☐ Industry benchmarking reports
☐ DOJ and SEC enforcement priorities and speeches
☐ AI and emerging technology deployment inventory
14. COMPLIANCE RISK REGISTER (MATRIX)
14.1 Risk Register Template
| Risk ID | Risk Category | Risk Description | Applicable Law / Regulation | Business Unit / Geography | Likelihood (1-5) | Impact (1-5) | Inherent Risk Score | Control Strength (1-5) | Residual Risk Score | Residual Risk Level | Risk Velocity | Trend | Owner | Evidence / Testing Notes | Remediation & Target Date | Status |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| CR-001 | Anti-Corruption | Third-party agent payments in high-risk jurisdiction without adequate due diligence | FCPA 15 U.S.C. 78dd-1 | International Operations | [____] | [____] | [____] | [____] | [____] | [____] | [____] | ☐↑ ☐→ ☐↓ | [________________________________] | [________________________________] | [________________________________] | ☐ Open ☐ In Progress ☐ Closed |
| CR-002 | Data Privacy | Inadequate consumer consent mechanisms for CCPA/CPRA opt-out rights | Cal. Civ. Code 1798.120 | US Consumer | [____] | [____] | [____] | [____] | [____] | [____] | [____] | ☐↑ ☐→ ☐↓ | [________________________________] | [________________________________] | [________________________________] | ☐ Open ☐ In Progress ☐ Closed |
| CR-003 | Sanctions | Incomplete screening of new counterparties against OFAC SDN list | 31 CFR 501 | Global | [____] | [____] | [____] | [____] | [____] | [____] | [____] | ☐↑ ☐→ ☐↓ | [________________________________] | [________________________________] | [________________________________] | ☐ Open ☐ In Progress ☐ Closed |
| CR-004 | Employment | Misclassification of independent contractors | FLSA; IRS 20-factor test; state laws | US | [____] | [____] | [____] | [____] | [____] | [____] | [____] | ☐↑ ☐→ ☐↓ | [________________________________] | [________________________________] | [________________________________] | ☐ Open ☐ In Progress ☐ Closed |
| CR-005 | Financial Reporting | Material weakness in internal controls over financial reporting | SOX 404; 15 U.S.C. 7262 | Corporate | [____] | [____] | [____] | [____] | [____] | [____] | [____] | ☐↑ ☐→ ☐↓ | [________________________________] | [________________________________] | [________________________________] | ☐ Open ☐ In Progress ☐ Closed |
| CR-006 | AI / Emerging Tech | Algorithmic bias in automated hiring or credit decisions | EEOC guidance; FTC Act; state AI laws | Technology / HR | [____] | [____] | [____] | [____] | [____] | [____] | [____] | ☐↑ ☐→ ☐↓ | [________________________________] | [________________________________] | [________________________________] | ☐ Open ☐ In Progress ☐ Closed |
| CR-007 | [________________________________] | [________________________________] | [________________________________] | [________________________________] | [____] | [____] | [____] | [____] | [____] | [____] | [____] | ☐↑ ☐→ ☐↓ | [________________________________] | [________________________________] | [________________________________] | ☐ Open ☐ In Progress ☐ Closed |
| CR-008 | [________________________________] | [________________________________] | [________________________________] | [________________________________] | [____] | [____] | [____] | [____] | [____] | [____] | [____] | ☐↑ ☐→ ☐↓ | [________________________________] | [________________________________] | [________________________________] | ☐ Open ☐ In Progress ☐ Closed |
| CR-009 | [________________________________] | [________________________________] | [________________________________] | [________________________________] | [____] | [____] | [____] | [____] | [____] | [____] | [____] | ☐↑ ☐→ ☐↓ | [________________________________] | [________________________________] | [________________________________] | ☐ Open ☐ In Progress ☐ Closed |
| CR-010 | [________________________________] | [________________________________] | [________________________________] | [________________________________] | [____] | [____] | [____] | [____] | [____] | [____] | [____] | ☐↑ ☐→ ☐↓ | [________________________________] | [________________________________] | [________________________________] | ☐ Open ☐ In Progress ☐ Closed |
15. REMEDIATION AND ACTION PLANNING
15.1 Remediation Priority Framework
| Priority | Criteria | Expected Response Time |
|---|---|---|
| P1 — Critical | Residual risk is Critical; potential for imminent regulatory action, criminal liability, or material financial loss | Remediation plan within 30 days; implementation within 90 days |
| P2 — High | Residual risk is High; control gaps require prompt attention | Remediation plan within 60 days; implementation within 180 days |
| P3 — Medium | Residual risk is Medium; improvement opportunities exist | Remediation plan within 90 days; implementation within 1 year |
| P4 — Low | Residual risk is Low; monitor and maintain | Address during next scheduled review cycle |
15.2 Remediation Action Tracker
| Action ID | Related Risk ID | Action Description | Priority | Owner | Start Date | Target Completion | Actual Completion | Status | Notes |
|---|---|---|---|---|---|---|---|---|---|
| [________________________________] | [________________________________] | [________________________________] | ☐ P1 ☐ P2 ☐ P3 ☐ P4 | [________________________________] | [__/__/____] | [__/__/____] | [__/__/____] | ☐ Not Started ☐ In Progress ☐ Complete ☐ Overdue | [________________________________] |
| [________________________________] | [________________________________] | [________________________________] | ☐ P1 ☐ P2 ☐ P3 ☐ P4 | [________________________________] | [__/__/____] | [__/__/____] | [__/__/____] | ☐ Not Started ☐ In Progress ☐ Complete ☐ Overdue | [________________________________] |
| [________________________________] | [________________________________] | [________________________________] | ☐ P1 ☐ P2 ☐ P3 ☐ P4 | [________________________________] | [__/__/____] | [__/__/____] | [__/__/____] | ☐ Not Started ☐ In Progress ☐ Complete ☐ Overdue | [________________________________] |
| [________________________________] | [________________________________] | [________________________________] | ☐ P1 ☐ P2 ☐ P3 ☐ P4 | [________________________________] | [__/__/____] | [__/__/____] | [__/__/____] | ☐ Not Started ☐ In Progress ☐ Complete ☐ Overdue | [________________________________] |
| [________________________________] | [________________________________] | [________________________________] | ☐ P1 ☐ P2 ☐ P3 ☐ P4 | [________________________________] | [__/__/____] | [__/__/____] | [__/__/____] | ☐ Not Started ☐ In Progress ☐ Complete ☐ Overdue | [________________________________] |
16. REPORTING DELIVERABLES
The following deliverables should be produced from this risk assessment:
16.1 Board / Audit Committee Report
☐ Executive summary of top risks
☐ Heat map (visual)
☐ Year-over-year trend analysis
☐ Remediation status update
☐ Changes in risk appetite or tolerance
☐ Emerging risks and horizon scan
16.2 Management Report
☐ Full risk register with scoring
☐ Detailed remediation tracker with owners and deadlines
☐ KRI dashboard
☐ Control testing results
☐ Resource requests and budget implications
16.3 Regulatory and Examiner Materials
☐ Risk assessment methodology documentation
☐ Evidence of annual review and board approval
☐ Remediation evidence for prior-period findings
☐ Training completion and testing results
17. REVIEW CADENCE AND TRIGGERS
17.1 Scheduled Reviews
| Review Type | Frequency | Next Scheduled |
|---|---|---|
| Full risk assessment | Annual | [__/__/____] |
| Risk register update | Semi-annual | [__/__/____] |
| KRI review | Quarterly | [__/__/____] |
| Board reporting | Quarterly or semi-annual | [__/__/____] |
17.2 Event-Driven Triggers
The risk assessment must be updated upon:
☐ Regulatory inquiry, examination, or enforcement action
☐ Material incident, data breach, or compliance failure
☐ New market, product, or geographic entry
☐ M&A activity (acquisition, divestiture, joint venture)
☐ Significant control failure or audit finding
☐ Material change in applicable law or regulation
☐ Organizational restructuring
☐ DOJ or SEC enforcement action against industry peer
☐ Whistleblower complaint involving systemic compliance issue
☐ Significant third-party risk event
18. DEFINITIONS
| Term | Definition |
|---|---|
| Inherent Risk | The level of risk before considering the effectiveness of existing controls |
| Residual Risk | The level of risk remaining after considering the effectiveness of existing controls |
| Control Effectiveness | The degree to which existing controls reduce the likelihood or impact of a risk event |
| Risk Appetite | The amount and type of risk the organization is willing to accept in pursuit of its objectives |
| Risk Tolerance | The acceptable variation in performance relative to the achievement of objectives |
| Key Risk Indicator (KRI) | A quantifiable metric used to monitor changes in risk levels over time |
| Risk Velocity | The speed at which a risk event would affect the organization once it materializes |
| Heat Map | A visual representation of risk scores, typically using color coding to indicate severity |
| COSO | Committee of Sponsoring Organizations of the Treadway Commission |
| ERM | Enterprise Risk Management |
| Material Weakness | A deficiency, or combination of deficiencies, in internal control over financial reporting such that there is a reasonable possibility that a material misstatement will not be prevented or detected on a timely basis |
| Significant Deficiency | A deficiency, or combination of deficiencies, in internal control that is less severe than a material weakness yet important enough to merit the attention of those responsible for oversight |
19. PRACTICE TIPS
For Solo Practitioners and Small Law Firms Advising Clients:
-
Start with what matters most. Not every client needs a 200-row risk register. Focus on the top 10-15 compliance risks based on the client's industry, size, geography, and regulatory profile. Expand as the program matures.
-
Use enforcement actions as a teaching tool. When explaining risk ratings to boards or management, cite recent enforcement actions in the client's industry. Concrete examples of fines, monitorship terms, and debarment consequences are more persuasive than abstract likelihood scores.
-
Align with the DOJ framework. If a client could face DOJ prosecution (and most companies could, for FCPA, antitrust, fraud, or other federal offenses), structure the risk assessment to address the three questions in the DOJ's Evaluation of Corporate Compliance Programs. This document becomes Exhibit A in any future negotiation.
-
Document your methodology. The DOJ and SEC do not prescribe a single methodology, but they expect consistency and defensibility. Document why you scored each risk the way you did, what data you considered, and who participated.
-
Connect compliance risk to financial risk. For public company clients, ensure compliance risks with potential financial reporting impact are communicated to the SOX 404 assessment team. An FCPA liability, environmental cleanup obligation, or employment class action can be material.
-
Track trends over time. A single-year snapshot is useful; a multi-year trend analysis is far more powerful. Show the board how risks are increasing, decreasing, or remaining stable — and why.
-
Address AI risk. The DOJ's September 2024 update specifically asks whether companies assess risks associated with AI and emerging technology. If your client uses AI in operations, compliance, or customer-facing applications, it should appear in the risk register.
-
Ensure the assessment is not static. The DOJ evaluates whether compliance programs evolve. An identical risk assessment submitted year after year, with no changes, suggests the program is paper-only.
20. SOURCES AND REFERENCES
- COSO ERM Framework (2017): COSO.org
- ISO 31000:2018 Risk Management Guidelines: ISO.org
- NIST Cybersecurity Framework 2.0: NIST.gov
- DOJ Evaluation of Corporate Compliance Programs (Sept. 2024): DOJ.gov
- SOX Sections 302, 404: 15 U.S.C. 7241, 15 U.S.C. 7262
- FCPA: 15 U.S.C. 78dd-1
- Federal Sentencing Guidelines, Chapter 8: USSC.gov
- COSO Compliance Risk Management Guidance: COSO.org
This template is designed for compliance officers, general counsel, and risk management professionals. It should be customized to reflect the organization's specific industry, regulatory environment, size, and risk profile. The methodology and scoring should be reviewed and approved by senior management and the board before initial deployment.
About This Template
Compliance documents are what regulated businesses use to prove they follow the rules that apply to their industry, whether that is privacy, anti-money-laundering, consumer protection, or sector-specific requirements. Regulators look for consistent policies, up-to-date records, and clear evidence of employee training. The cost of getting compliance paperwork right is almost always smaller than the cost of an enforcement action, fine, or public disclosure.
Important Notice
This template is provided for informational purposes. It is not legal advice. We recommend having an attorney review any legal document before signing, especially for high-value or complex matters.
Last updated: April 2026