Templates Compliance Regulatory Compliance Risk Assessment Matrix

Compliance Risk Assessment Matrix

Ready to Edit

COMPLIANCE RISK ASSESSMENT MATRIX


TABLE OF CONTENTS

  1. Document Control
  2. Executive Summary
  3. Purpose and Scope
  4. Regulatory and Standards Framework
  5. Methodology
  6. Risk Taxonomy and Categories
  7. Likelihood Scoring Rubric
  8. Impact Scoring Rubric
  9. Control Effectiveness Assessment
  10. Residual Risk Calculation and Heat Map
  11. Risk Appetite and Tolerance Statement
  12. Roles and Responsibilities
  13. Data Sources and Inputs
  14. Compliance Risk Register (Matrix)
  15. Remediation and Action Planning
  16. Reporting Deliverables
  17. Review Cadence and Triggers
  18. Definitions
  19. Practice Tips
  20. Sources and References

1. DOCUMENT CONTROL

Field Details
Organization [________________________________]
Document Owner [________________________________]
Title [________________________________]
Effective Date [__/__/____]
Version [____]
Last Review Date [__/__/____]
Next Review Date [__/__/____]
Approved By [________________________________]
Board / Committee Approval Date [__/__/____]

Revision History

Version Date Author Summary of Changes
[____] [__/__/____] [________________________________] [________________________________]
[____] [__/__/____] [________________________________] [________________________________]
[____] [__/__/____] [________________________________] [________________________________]

2. EXECUTIVE SUMMARY

This Compliance Risk Assessment Matrix provides a structured, repeatable methodology for identifying, evaluating, and prioritizing compliance risks across the organization. It is designed to align with the COSO Enterprise Risk Management Framework (2017), ISO 31000:2018 risk management principles, and the DOJ's Evaluation of Corporate Compliance Programs (September 2024 update). The assessment evaluates inherent risk, control effectiveness, and residual risk to produce a prioritized risk register that informs resource allocation, remediation planning, and board reporting.

Summary of Findings (to be completed):

Category High Risks Medium Risks Low Risks Total
[________________________________] [____] [____] [____] [____]
[________________________________] [____] [____] [____] [____]
Total [____] [____] [____] [____]

3. PURPOSE AND SCOPE

3.1 Purpose

This document serves as the organization's primary tool for:

  • Systematically identifying compliance risks across all business units, geographies, and regulatory domains
  • Evaluating the likelihood and potential impact of each identified risk
  • Assessing the effectiveness of existing controls
  • Calculating residual risk after considering control effectiveness
  • Prioritizing risks for remediation and resource allocation
  • Supporting the organization's obligations under SOX Sections 302 and 404 (for public companies) to maintain effective internal controls
  • Demonstrating the existence of an effective compliance program as evaluated under the DOJ Evaluation of Corporate Compliance Programs (September 2024)
  • Informing board and audit committee oversight of compliance risk

3.2 Scope

☐ All business units and operating divisions
☐ All geographic jurisdictions in which the organization operates
☐ All regulatory domains applicable to the organization
☐ Third-party relationships (vendors, suppliers, agents, intermediaries)
☐ Emerging risks (AI/ML, cryptocurrency, ESG, supply chain)
☐ Other: [________________________________]

Out of Scope (specify any exclusions): [________________________________]


4. REGULATORY AND STANDARDS FRAMEWORK

This risk assessment methodology is informed by the following regulatory requirements and industry frameworks:

4.1 Sarbanes-Oxley Act (SOX) — Sections 302 and 404

Section 302 requires the CEO and CFO of public companies to certify that: (i) the report contains no material misstatements or omissions; (ii) financial statements are accurate in all material respects; (iii) internal controls are properly designed; and (iv) certifying officers have disclosed to the audit committee and auditors all significant deficiencies in internal controls and any fraud involving management or employees with a significant role in internal controls.

Section 404 requires management to assess and report on the effectiveness of internal controls over financial reporting. The company's independent auditor must attest to and report on management's assessment. This compliance risk assessment supports the broader internal controls environment by identifying compliance risks that could give rise to financial misstatement.

Practice Tip (SOX): The SEC has clarified that internal control over financial reporting includes controls over compliance with laws and regulations that could have a material effect on financial statements. FCPA violations, environmental liabilities, and employment claims are common examples of compliance risks with financial reporting implications. Ensure your compliance risk assessment feeds into the SOX 404 scoping process.

4.2 COSO Enterprise Risk Management Framework (2017)

The 2017 COSO ERM Framework, "Enterprise Risk Management — Integrating with Strategy and Performance," organizes ERM around five interrelated components:

  1. Governance and Culture — Board oversight, operating structure, core values, human capital, talent competencies
  2. Strategy and Objective-Setting — Business context analysis, risk appetite definition, strategic planning integration
  3. Performance — Risk identification, risk severity assessment, risk prioritization, risk response implementation
  4. Review and Revision — Substantial change assessment, risk and performance review, pursuit of ERM improvement
  5. Information, Communication, and Reporting — Information systems, risk communication, enterprise risk reporting

This risk assessment template is designed to align with Components 3 (Performance) and 4 (Review and Revision).

4.3 ISO 31000:2018 — Risk Management Guidelines

ISO 31000:2018 provides principles and a generic framework for managing risk. Key principles reflected in this template include:

  • Risk management should be integrated into all organizational activities
  • Risk management should be structured and comprehensive
  • Risk management should be customized to the organization
  • Risk management should be inclusive (involving stakeholders)
  • Risk management should be dynamic (responsive to change)
  • Risk management should use the best available information
  • Risk management should be continually improved

4.4 NIST Cybersecurity Framework 2.0 (February 2024)

NIST CSF 2.0 is organized around six functions: Govern, Identify, Protect, Detect, Respond, and Recover. The Govern function (new in version 2.0) emphasizes cybersecurity governance, leadership accountability, and risk management strategy. Organizations should integrate cybersecurity risk into this compliance risk assessment to ensure a holistic view.

4.5 DOJ Evaluation of Corporate Compliance Programs (September 2024)

The DOJ's Criminal Division updated its Evaluation of Corporate Compliance Programs in September 2024. Prosecutors evaluate three fundamental questions:

  1. Is the compliance program well designed? — Risk assessment, policies and procedures, training, reporting mechanisms, third-party management
  2. Is the program being applied earnestly and in good faith? — Commitment by senior and middle management, autonomy and resources, incentives and disciplinary measures
  3. Does the compliance program work in practice? — Continuous improvement, investigation response, analysis of misconduct and remediation

The September 2024 update added significant focus on AI and emerging technology risk management, whistleblower protections, and data analytics in compliance.

Practice Tip (DOJ): The DOJ evaluates whether companies conduct regular, risk-based compliance assessments. A company with an effective compliance program — including a documented risk assessment — is more likely to receive a favorable resolution in an enforcement action, including reduced monetary penalties and less burdensome compliance obligations.

4.6 FCPA and Anti-Bribery Risk Factors

The FCPA prohibits corrupt payments to foreign officials (anti-bribery provisions, 15 U.S.C. 78dd-1 et seq.) and requires issuers to maintain accurate books and records and sufficient internal controls (accounting provisions, 15 U.S.C. 78m). Key risk factors for FCPA compliance risk assessment include:

  • Countries of operation (Transparency International CPI score)
  • Use of third-party intermediaries, agents, consultants, and joint venture partners
  • Government-facing transactions (permits, licenses, customs)
  • Industry sector (extractives, defense, healthcare, infrastructure)
  • Gift, travel, and entertainment practices
  • Charitable contributions and political donations
  • M&A due diligence (successor liability)
  • Volume and complexity of transactions

5. METHODOLOGY

5.1 Assessment Approach

This assessment follows a four-step methodology:

Step 1: Risk Identification. Identify all compliance risks through a combination of regulatory mapping, interviews with business owners, review of historical incidents and enforcement actions, and horizon scanning.

Step 2: Inherent Risk Scoring. Evaluate each risk on two dimensions — Likelihood and Impact — without considering existing controls. Inherent Risk = Likelihood x Impact.

Step 3: Control Effectiveness Assessment. Evaluate the design and operating effectiveness of controls mitigating each risk on a 1-5 scale.

Step 4: Residual Risk Determination. Apply control effectiveness to inherent risk to determine residual risk. Residual Risk = Inherent Risk adjusted for Control Effectiveness.

5.2 Risk Velocity

In addition to likelihood and impact, this assessment optionally evaluates risk velocity — the speed at which a risk event would affect the organization:

Velocity Rating Description Example
1 — Slow Impact unfolds over months to years Gradual regulatory change
2 — Moderate Impact unfolds over weeks to months Enforcement investigation ramp-up
3 — Fast Impact unfolds within days to weeks Data breach, whistleblower report
4 — Immediate Impact is instantaneous or near-instantaneous Sanctions violation, arrest, public disclosure

6. RISK TAXONOMY AND CATEGORIES

Organize identified risks under the following categories (customize as appropriate):

6.1 Core Compliance Risk Categories

Category Description Key Regulations
Anti-Corruption / Anti-Bribery FCPA, UK Bribery Act, local anti-corruption laws 15 U.S.C. 78dd-1; Bribery Act 2010
Sanctions / Export Controls OFAC, EAR, ITAR restrictions 50 U.S.C. 4801; 31 CFR 500-599; 15 CFR 730-774
Antitrust / Competition Price fixing, market allocation, bid rigging Sherman Act (15 U.S.C. 1-7); Clayton Act
Data Privacy / Cybersecurity GDPR, CCPA/CPRA, state privacy laws, NIST GDPR; Cal. Civ. Code 1798.100; various state laws
Financial Crimes / AML Money laundering, fraud, BSA/AML BSA (31 U.S.C. 5311); USA PATRIOT Act
Securities / Financial Reporting Insider trading, disclosure, SOX 15 U.S.C. 78j(b); SOX 302/404
Employment / Labor EEO, wage/hour, workplace safety, immigration Title VII; FLSA; OSHA; IRCA
Environmental EPA regulations, state environmental law CAA; CWA; RCRA; CERCLA
Healthcare / PHI HIPAA, Stark, Anti-Kickback 42 U.S.C. 1320a-7b; 45 CFR 160-164
Consumer Protection / Marketing FTC Act, CAN-SPAM, TCPA, advertising 15 U.S.C. 45; 47 U.S.C. 227
Product Safety / Liability CPSC regulations, product recall 15 U.S.C. 2051
Tax Federal, state, international tax compliance IRC; FATCA; OECD BEPS

6.2 Cross-Cutting Risk Categories

Category Description
Third-Party / Supply Chain Risks arising from vendors, agents, intermediaries, subcontractors
AI / Machine Learning / Emerging Technology Algorithmic bias, autonomous systems, deepfakes, generative AI
ESG / Sustainability Greenwashing, climate disclosure, human rights in supply chain
Recordkeeping / Document Retention Litigation holds, retention schedules, destruction policies
Fraud / Abuse Internal fraud, procurement fraud, expense reimbursement abuse
Conflicts of Interest Related-party transactions, outside activities, financial interests
Whistleblower / Retaliation Reports of misconduct, investigation integrity, anti-retaliation

7. LIKELIHOOD SCORING RUBRIC

Score Rating Description Quantitative Guidance
1 Rare Event is unlikely to occur within the assessment period Less than 5% probability
2 Unlikely Event could occur but is not expected 5-20% probability
3 Possible Event may occur during the assessment period 20-50% probability
4 Likely Event is expected to occur during the assessment period 50-80% probability
5 Almost Certain Event is expected to occur multiple times during the assessment period Greater than 80% probability

Factors to consider when assessing likelihood:

  • Historical frequency of similar events (internal and external)
  • Regulatory enforcement trends and announced priorities
  • Industry peer enforcement actions
  • Complexity and volume of relevant transactions
  • Geographic exposure (high-risk jurisdictions)
  • Maturity of applicable compliance controls
  • Findings from internal audit or testing
  • Complaints, hotline reports, or whistleblower activity

8. IMPACT SCORING RUBRIC

Score Rating Financial Impact Regulatory Impact Operational Impact Reputational Impact
1 Minimal Less than $[____] Informal inquiry; no finding No disruption No media coverage
2 Minor $[____] to $[____] Formal inquiry; minor finding Minor disruption; resolved quickly Limited media coverage
3 Moderate $[____] to $[____] Consent order; moderate fine Moderate disruption; workaround required Regional media coverage
4 Major $[____] to $[____] Significant enforcement; material fine Major disruption; business unit affected National media; analyst concern
5 Severe Greater than $[____] Criminal prosecution; debarment; systemic failure Business continuity event; sustained disruption Sustained global coverage; material value destruction

Practice Tip: Customize the dollar thresholds in the impact rubric to reflect your organization's size, revenue, and risk appetite. A $1 million fine is "moderate" for a Fortune 500 company but "severe" for a small or mid-market firm.


9. CONTROL EFFECTIVENESS ASSESSMENT

9.1 Control Strength Scoring

Score Rating Description
1 Nonexistent No controls in place; risk is unmanaged
2 Weak Controls exist but are informal, inconsistent, or unreliable; significant gaps
3 Basic Controls are documented and partially effective; periodic testing; known gaps
4 Strong Controls are well-designed, consistently applied, regularly tested; minor gaps
5 Mature Controls are automated where feasible, continuously monitored, independently validated; embedded in culture

9.2 Control Assessment Dimensions

For each risk, assess controls across the following dimensions:

Dimension Assessment Questions
Design Are policies and procedures documented? Are they aligned with applicable law and regulation?
Implementation Are controls operating as designed? Is there evidence of consistent application?
Testing Are controls tested periodically (by compliance, internal audit, or external parties)? When was the last test?
Monitoring Are key risk indicators (KRIs) tracked? Is there real-time or near-real-time monitoring?
Remediation When deficiencies are identified, are they remediated promptly? Is there a tracking mechanism?
Training Is training provided to relevant personnel? Is it role-based for higher-risk positions? Is completion tracked?
Tone at the Top Does leadership demonstrate commitment to compliance? Are resources adequate?

10. RESIDUAL RISK CALCULATION AND HEAT MAP

10.1 Residual Risk Formula

Inherent Risk Score = Likelihood (1-5) x Impact (1-5) = Range 1-25

Residual Risk = Inherent Risk Score adjusted by Control Effectiveness:

Control Effectiveness Risk Reduction Factor
5 — Mature Reduce inherent risk by 70-80%
4 — Strong Reduce inherent risk by 50-60%
3 — Basic Reduce inherent risk by 30-40%
2 — Weak Reduce inherent risk by 10-20%
1 — Nonexistent No reduction (residual = inherent)

10.2 Heat Map Thresholds

Residual Risk Score Risk Level Color Action Required
16-25 Critical Red Immediate escalation to senior management / board; remediation plan within 30 days
10-15 High Orange Senior management attention; remediation plan within 60 days
5-9 Medium Yellow Management monitoring; remediation plan within 90 days
1-4 Low Green Routine monitoring; no immediate action required

10.3 Visual Heat Map

              IMPACT
           1    2    3    4    5
        +----+----+----+----+----+
    5   | M  | H  | H  | C  | C  |
L   4   | M  | M  | H  | H  | C  |
I   3   | L  | M  | M  | H  | H  |
K   2   | L  | L  | M  | M  | H  |
E   1   | L  | L  | L  | M  | M  |
        +----+----+----+----+----+

L = Low | M = Medium | H = High | C = Critical

11. RISK APPETITE AND TOLERANCE STATEMENT

11.1 Risk Appetite

Risk appetite is the amount of risk the organization is willing to accept in pursuit of its strategic objectives. The Board of Directors / governing body has established the following risk appetite for compliance risk:

Conservative — Organization seeks to minimize compliance risk; zero tolerance for material violations
Moderate — Organization accepts a moderate level of compliance risk with strong controls
Aggressive — Organization accepts elevated compliance risk in pursuit of growth (not recommended for regulated entities)

11.2 Risk Tolerance Thresholds

Risk Category Maximum Acceptable Residual Risk Level Escalation Threshold
Anti-Corruption / Anti-Bribery ☐ Low ☐ Medium [________________________________]
Sanctions / Export Controls ☐ Low ☐ Medium [________________________________]
Data Privacy / Cybersecurity ☐ Low ☐ Medium [________________________________]
Financial Crimes / AML ☐ Low ☐ Medium [________________________________]
Securities / Financial Reporting ☐ Low ☐ Medium [________________________________]
Employment / Labor ☐ Low ☐ Medium [________________________________]
Environmental ☐ Low ☐ Medium [________________________________]
Healthcare / PHI ☐ Low ☐ Medium [________________________________]
Other: [________________________________] ☐ Low ☐ Medium [________________________________]

12. ROLES AND RESPONSIBILITIES

Role Responsibilities
Chief Compliance Officer (CCO) Owns methodology; leads risk assessment; aggregates results; reports to board/committee
General Counsel Legal interpretation; regulatory mapping; enforcement trend analysis
Domain Risk Owners (Privacy, HR, Finance, Security, Operations) Provide risk inputs; own controls; implement remediation; participate in interviews
Internal Audit Independent testing and validation of controls; assess risk assessment methodology
Business Unit Leaders Identify emerging risks; participate in risk interviews; support remediation
Board / Audit Committee Review and approve risk assessment results; set risk appetite; oversee remediation
Ethics / Hotline Administrator Provide complaint and investigation data; report trends
External Counsel / Advisors Regulatory horizon scanning; enforcement benchmarking

13. DATA SOURCES AND INPUTS

The following data sources should inform the risk assessment:

☐ Incidents, near-misses, and loss events
☐ Ethics hotline and complaint data (volume, categories, trends)
☐ Internal and external audit findings
☐ Regulatory examinations, inquiries, and correspondence
☐ Enforcement actions against the organization
☐ Enforcement actions against industry peers
☐ Product, geographic, and business line changes
☐ M&A activity and integration status
☐ Third-party due diligence results
☐ Key risk indicator (KRI) dashboards
☐ Employee survey results (culture, speak-up)
☐ Training completion rates and assessment scores
☐ Policy exception and waiver logs
☐ Litigation and claims data
☐ Regulatory change tracking (new laws, proposed rules)
☐ Industry benchmarking reports
☐ DOJ and SEC enforcement priorities and speeches
☐ AI and emerging technology deployment inventory


14. COMPLIANCE RISK REGISTER (MATRIX)

14.1 Risk Register Template

Risk ID Risk Category Risk Description Applicable Law / Regulation Business Unit / Geography Likelihood (1-5) Impact (1-5) Inherent Risk Score Control Strength (1-5) Residual Risk Score Residual Risk Level Risk Velocity Trend Owner Evidence / Testing Notes Remediation & Target Date Status
CR-001 Anti-Corruption Third-party agent payments in high-risk jurisdiction without adequate due diligence FCPA 15 U.S.C. 78dd-1 International Operations [____] [____] [____] [____] [____] [____] [____] ☐↑ ☐→ ☐↓ [________________________________] [________________________________] [________________________________] ☐ Open ☐ In Progress ☐ Closed
CR-002 Data Privacy Inadequate consumer consent mechanisms for CCPA/CPRA opt-out rights Cal. Civ. Code 1798.120 US Consumer [____] [____] [____] [____] [____] [____] [____] ☐↑ ☐→ ☐↓ [________________________________] [________________________________] [________________________________] ☐ Open ☐ In Progress ☐ Closed
CR-003 Sanctions Incomplete screening of new counterparties against OFAC SDN list 31 CFR 501 Global [____] [____] [____] [____] [____] [____] [____] ☐↑ ☐→ ☐↓ [________________________________] [________________________________] [________________________________] ☐ Open ☐ In Progress ☐ Closed
CR-004 Employment Misclassification of independent contractors FLSA; IRS 20-factor test; state laws US [____] [____] [____] [____] [____] [____] [____] ☐↑ ☐→ ☐↓ [________________________________] [________________________________] [________________________________] ☐ Open ☐ In Progress ☐ Closed
CR-005 Financial Reporting Material weakness in internal controls over financial reporting SOX 404; 15 U.S.C. 7262 Corporate [____] [____] [____] [____] [____] [____] [____] ☐↑ ☐→ ☐↓ [________________________________] [________________________________] [________________________________] ☐ Open ☐ In Progress ☐ Closed
CR-006 AI / Emerging Tech Algorithmic bias in automated hiring or credit decisions EEOC guidance; FTC Act; state AI laws Technology / HR [____] [____] [____] [____] [____] [____] [____] ☐↑ ☐→ ☐↓ [________________________________] [________________________________] [________________________________] ☐ Open ☐ In Progress ☐ Closed
CR-007 [________________________________] [________________________________] [________________________________] [________________________________] [____] [____] [____] [____] [____] [____] [____] ☐↑ ☐→ ☐↓ [________________________________] [________________________________] [________________________________] ☐ Open ☐ In Progress ☐ Closed
CR-008 [________________________________] [________________________________] [________________________________] [________________________________] [____] [____] [____] [____] [____] [____] [____] ☐↑ ☐→ ☐↓ [________________________________] [________________________________] [________________________________] ☐ Open ☐ In Progress ☐ Closed
CR-009 [________________________________] [________________________________] [________________________________] [________________________________] [____] [____] [____] [____] [____] [____] [____] ☐↑ ☐→ ☐↓ [________________________________] [________________________________] [________________________________] ☐ Open ☐ In Progress ☐ Closed
CR-010 [________________________________] [________________________________] [________________________________] [________________________________] [____] [____] [____] [____] [____] [____] [____] ☐↑ ☐→ ☐↓ [________________________________] [________________________________] [________________________________] ☐ Open ☐ In Progress ☐ Closed

15. REMEDIATION AND ACTION PLANNING

15.1 Remediation Priority Framework

Priority Criteria Expected Response Time
P1 — Critical Residual risk is Critical; potential for imminent regulatory action, criminal liability, or material financial loss Remediation plan within 30 days; implementation within 90 days
P2 — High Residual risk is High; control gaps require prompt attention Remediation plan within 60 days; implementation within 180 days
P3 — Medium Residual risk is Medium; improvement opportunities exist Remediation plan within 90 days; implementation within 1 year
P4 — Low Residual risk is Low; monitor and maintain Address during next scheduled review cycle

15.2 Remediation Action Tracker

Action ID Related Risk ID Action Description Priority Owner Start Date Target Completion Actual Completion Status Notes
[________________________________] [________________________________] [________________________________] ☐ P1 ☐ P2 ☐ P3 ☐ P4 [________________________________] [__/__/____] [__/__/____] [__/__/____] ☐ Not Started ☐ In Progress ☐ Complete ☐ Overdue [________________________________]
[________________________________] [________________________________] [________________________________] ☐ P1 ☐ P2 ☐ P3 ☐ P4 [________________________________] [__/__/____] [__/__/____] [__/__/____] ☐ Not Started ☐ In Progress ☐ Complete ☐ Overdue [________________________________]
[________________________________] [________________________________] [________________________________] ☐ P1 ☐ P2 ☐ P3 ☐ P4 [________________________________] [__/__/____] [__/__/____] [__/__/____] ☐ Not Started ☐ In Progress ☐ Complete ☐ Overdue [________________________________]
[________________________________] [________________________________] [________________________________] ☐ P1 ☐ P2 ☐ P3 ☐ P4 [________________________________] [__/__/____] [__/__/____] [__/__/____] ☐ Not Started ☐ In Progress ☐ Complete ☐ Overdue [________________________________]
[________________________________] [________________________________] [________________________________] ☐ P1 ☐ P2 ☐ P3 ☐ P4 [________________________________] [__/__/____] [__/__/____] [__/__/____] ☐ Not Started ☐ In Progress ☐ Complete ☐ Overdue [________________________________]

16. REPORTING DELIVERABLES

The following deliverables should be produced from this risk assessment:

16.1 Board / Audit Committee Report

☐ Executive summary of top risks
☐ Heat map (visual)
☐ Year-over-year trend analysis
☐ Remediation status update
☐ Changes in risk appetite or tolerance
☐ Emerging risks and horizon scan

16.2 Management Report

☐ Full risk register with scoring
☐ Detailed remediation tracker with owners and deadlines
☐ KRI dashboard
☐ Control testing results
☐ Resource requests and budget implications

16.3 Regulatory and Examiner Materials

☐ Risk assessment methodology documentation
☐ Evidence of annual review and board approval
☐ Remediation evidence for prior-period findings
☐ Training completion and testing results


17. REVIEW CADENCE AND TRIGGERS

17.1 Scheduled Reviews

Review Type Frequency Next Scheduled
Full risk assessment Annual [__/__/____]
Risk register update Semi-annual [__/__/____]
KRI review Quarterly [__/__/____]
Board reporting Quarterly or semi-annual [__/__/____]

17.2 Event-Driven Triggers

The risk assessment must be updated upon:

☐ Regulatory inquiry, examination, or enforcement action
☐ Material incident, data breach, or compliance failure
☐ New market, product, or geographic entry
☐ M&A activity (acquisition, divestiture, joint venture)
☐ Significant control failure or audit finding
☐ Material change in applicable law or regulation
☐ Organizational restructuring
☐ DOJ or SEC enforcement action against industry peer
☐ Whistleblower complaint involving systemic compliance issue
☐ Significant third-party risk event


18. DEFINITIONS

Term Definition
Inherent Risk The level of risk before considering the effectiveness of existing controls
Residual Risk The level of risk remaining after considering the effectiveness of existing controls
Control Effectiveness The degree to which existing controls reduce the likelihood or impact of a risk event
Risk Appetite The amount and type of risk the organization is willing to accept in pursuit of its objectives
Risk Tolerance The acceptable variation in performance relative to the achievement of objectives
Key Risk Indicator (KRI) A quantifiable metric used to monitor changes in risk levels over time
Risk Velocity The speed at which a risk event would affect the organization once it materializes
Heat Map A visual representation of risk scores, typically using color coding to indicate severity
COSO Committee of Sponsoring Organizations of the Treadway Commission
ERM Enterprise Risk Management
Material Weakness A deficiency, or combination of deficiencies, in internal control over financial reporting such that there is a reasonable possibility that a material misstatement will not be prevented or detected on a timely basis
Significant Deficiency A deficiency, or combination of deficiencies, in internal control that is less severe than a material weakness yet important enough to merit the attention of those responsible for oversight

19. PRACTICE TIPS

For Solo Practitioners and Small Law Firms Advising Clients:

  1. Start with what matters most. Not every client needs a 200-row risk register. Focus on the top 10-15 compliance risks based on the client's industry, size, geography, and regulatory profile. Expand as the program matures.

  2. Use enforcement actions as a teaching tool. When explaining risk ratings to boards or management, cite recent enforcement actions in the client's industry. Concrete examples of fines, monitorship terms, and debarment consequences are more persuasive than abstract likelihood scores.

  3. Align with the DOJ framework. If a client could face DOJ prosecution (and most companies could, for FCPA, antitrust, fraud, or other federal offenses), structure the risk assessment to address the three questions in the DOJ's Evaluation of Corporate Compliance Programs. This document becomes Exhibit A in any future negotiation.

  4. Document your methodology. The DOJ and SEC do not prescribe a single methodology, but they expect consistency and defensibility. Document why you scored each risk the way you did, what data you considered, and who participated.

  5. Connect compliance risk to financial risk. For public company clients, ensure compliance risks with potential financial reporting impact are communicated to the SOX 404 assessment team. An FCPA liability, environmental cleanup obligation, or employment class action can be material.

  6. Track trends over time. A single-year snapshot is useful; a multi-year trend analysis is far more powerful. Show the board how risks are increasing, decreasing, or remaining stable — and why.

  7. Address AI risk. The DOJ's September 2024 update specifically asks whether companies assess risks associated with AI and emerging technology. If your client uses AI in operations, compliance, or customer-facing applications, it should appear in the risk register.

  8. Ensure the assessment is not static. The DOJ evaluates whether compliance programs evolve. An identical risk assessment submitted year after year, with no changes, suggests the program is paper-only.


20. SOURCES AND REFERENCES


This template is designed for compliance officers, general counsel, and risk management professionals. It should be customized to reflect the organization's specific industry, regulatory environment, size, and risk profile. The methodology and scoring should be reviewed and approved by senior management and the board before initial deployment.

Ezel AI
Hi! Need help customizing this document? I can tailor every section to your specific case in minutes.
AI Legal Assistant
Ezel AI
Hi! Need help customizing this document? I can tailor every section to your specific case in minutes.

Insert Image

Insert Table

Watch Ezel in action (sample case)

All changes saved
Save
Export
Export as DOCX
Export as PDF
Generating PDF...
compliance_risk_assessment_matrix_universal.pdf
Ready to export as PDF or Word
AI is editing...
Chat
Review

Customize this document with Ezel

  • Deep Legal Knowledge
    Understands case law, statutes, and legal doctrine.
  • Court-Ready Formatting
    Proper captions, certificates of service, and local rule compliance.
  • AI-Powered Editing on Your Timeline
    Edit as many times as you need. Tailor every section to your specific case.
  • Export as PDF & Word
    Download your finished document in professional PDF or DOCX format, ready to file or send.
Secure checkout via Stripe
Need to customize this document?

About This Template

Compliance documents are what regulated businesses use to prove they follow the rules that apply to their industry, whether that is privacy, anti-money-laundering, consumer protection, or sector-specific requirements. Regulators look for consistent policies, up-to-date records, and clear evidence of employee training. The cost of getting compliance paperwork right is almost always smaller than the cost of an enforcement action, fine, or public disclosure.

Important Notice

This template is provided for informational purposes. It is not legal advice. We recommend having an attorney review any legal document before signing, especially for high-value or complex matters.

Last updated: April 2026