Guidance IT/Security Practitioner SOX

SOX IT Audit Preparation: A 90-Day Plan

Last reviewed: April 29, 2026
Key Takeaways
  • Scope SOX controls specifically to systems that process or validate financial data; focus IT audit preparation on the five ITGC domains (access, change, segregation of duties, availability, backup).
  • Document current-state controls in a centralized inventory by Day 30, then build evidence archives organized by control with 3–4 samples showing consistent operation throughout the fiscal year.
  • Prioritize Section 302 compliance by implementing quarterly user access reviews and formal approval workflows; automated controls require less evidence than manual controls but require detailed configuration documentation.
  • Conduct internal practice walkthroughs of critical controls (access provisioning, change management) and ensure procedures match actual operations before auditors arrive.
  • Be transparent about gaps and remediation timelines in your SOX readiness summary; establish a designated compliance owner to sustain control operation and evidence collection beyond audit completion.

SOX IT Audit Preparation: A 90-Day Plan

Sarbanes-Oxley Act (SOX) compliance audits create significant pressure for IT and security teams. Unlike point-in-time assessments, SOX audits examine the design and operating effectiveness of controls over a full fiscal year. This 90-day preparation framework helps you build defensible, documented control environments that satisfy auditor expectations and reduce remediation findings.

Understanding Your SOX Scope

Start by confirming exactly which systems and processes your auditors will evaluate. SOX Section 404(b) requires auditors to attest to management's assessment of internal control over financial reporting (ICFR). This means IT controls matter only when they directly affect financial data accuracy, integrity, or availability. Systems that process, store, or validate financial transactions—including ERP platforms, general ledger systems, and bank interfaces—are in scope. Identify these systems now and document the data flows connecting them to financial statements.

Your audit scope typically includes IT general controls (ITGC) across user access management, change management, segregation of duties, system availability, and backup/recovery processes. Frame your preparation around these five categories rather than attempting to audit everything IT does.

Days 1–30: Assessment and Documentation

Begin with a control inventory. For each in-scope system, document existing controls across the five ITGC domains. Create a simple spreadsheet capturing: control name, objective, responsible team, evidence location, testing frequency, and known gaps. This inventory becomes your roadmap and demonstrates to auditors that you've thought systematically about your environment.

Conduct a gap analysis against the COSO Internal Control Framework, which auditors reference extensively. Specifically evaluate whether your user access controls align with Section 302 requirements for IT system authorization. Section 302 requires certification of internal control effectiveness, which depends on demonstrating that only authorized users can access financial systems. Document your current user provisioning, review, and deprovisioning processes. If you lack formal quarterly access reviews, add this immediately—auditors view this as a material gap.

Identify which controls operate manually versus automatically. Manual controls require more evidence to prove operating effectiveness (typically signed logs or approval records). Automated controls (database triggers, system-enforced segregation of duties) require less evidence but need configuration documentation. Prioritize automating high-risk controls where feasible.

Days 31–60: Control Strengthening and Evidence Building

Address findings from your gap analysis by implementing or formalizing controls. Focus on quick wins: documented change management procedures, formalized access request/approval workflows, and scheduled reconciliation reports. Don't attempt architectural overhauls during an audit cycle; focus on operating the controls you have more consistently.

Establish a centralized evidence repository. Auditors examine control evidence intensively—they need to verify that controls actually operated throughout the fiscal year. Create folders organized by control, with supporting documentation: approval emails, system logs, reconciliation reports, and testing results. For a control operating daily or monthly, retain 3–4 sample periods showing consistent execution.

Section 404(a) requires management to assess ICFR quarterly. If you haven't formalized IT risk assessments at this cadence, begin now. Document which IT risks affect financial reporting, their severity, and how controls mitigate them. This assessment narrative, paired with evidence of control testing, demonstrates management's active oversight of IT risks.

Conduct a practice walkthrough of high-risk controls with internal audit or IT leadership. Walk an access request from initiation through approval and system provisioning. Trace a system change from request through testing to production deployment. Identify where your actual process diverges from documented procedures, then correct the procedures or the process—they must align.

Days 61–90: Testing and Readiness

Perform detailed testing of 4–5 critical controls. Select controls that affect multiple financial processes or that auditors flagged in prior years. For each, document test objectives, sample the control evidence, and record results. Test user access controls by requesting a user listing from your core financial systems and verifying that access matches recent requests and approvals. Test change management by selecting 10–15 production changes and confirming each has documented approval, testing, and authorization.

Create a SOX readiness summary highlighting your control environment maturity, any remaining gaps, and your remediation timeline. Be transparent about limitations—auditors respect candid acknowledgment of evolving practices more than claims of perfection. If you're implementing a new control during the audit cycle, clearly document the design, implementation date, and evidence of operation post-implementation.

Prepare your IT team for auditor interviews. Brief key staff on the control narrative, the evidence location, and common auditor questions. Ensure your security and infrastructure leads can explain how system access controls operate and how change management actually works in your environment.

Ongoing Vigilance

SOX audits conclude, but control operation continues. Designate a compliance owner to oversee quarterly access reviews, monitor change logs, and refresh your evidence repository. This discipline prevents year-two audit surprises.