Access Resources

Access a growing library of internal audit resources such as audit programs, templates, and insightful eBooks. Our resources section includes freely available documents shared by fellow community members and resources offered for purchase. You can rate and review each resource and share your perspective in the comments. Not finding what you’re looking for? Please reach out to the community requesting a resource in the main Home feed. Did you know you can easily add one of your internal audit resources and decide if it’s freely available or offered at a price you set? Please navigate to Share or Sell Resources to learn more.

Shared Resources

Everyone can share their own original internal audit resources such as questionnaires, checklists, and audit tools with community members. We’re jointly building an extensive library to see how each of us audits a given subject. You can rate and review each resource and share your perspective in the comments. Reach out to the community requesting a resource you’re looking for or add one of your own. You decide if you’d like to share your documents for free or offer them at a price you set.

Shared Resources

Risk Mitigation Strategy Monitoring

Reposting this on behalf of our community member Jen who kindly shared this document with everyone. This document provided comprehensive risk mitigation strategy monitoring. The template is designed by specifically for a NGO project.

Read More→

Agile Auditing FAQ Document

This document was prepared by Karl Sousa and EJ Manalang as part of the Agile Auditing virtual event they led here on Auditopia on August 3, 2021. It lists some FAQ on the topic and answers to questions from community members that we didn’t get to address in the event.

Read More→

SAP SOD on P2P Process Document Flow

This worksheet shared by Claire Worledge was used in the virtual event “Segregation of Duties Audits in SAP”, where we did hands-on practical exercises to check for Separation Of Duties issues in the Purchase To Pay document flow in SAP systems. When we check for SOD issues in a document flow, we not only look at risks relating to who has access to what; but we look at who has actually done what during the period. But even more than that, when we look at a document flow, we can see risks relating to specific documents in terms of user access. For example, I create a purchase order, and then I create a goods receipt for that purchase order and then I create an invoice for that goods receipt, and even the payment for the invoice. When we identify such cases, we are identifying risks that are much more “real” than only looking at who has a separation of duties conflict based on their access.

Read More→

Excel Model to Compute Who Has Violated User Access In SAP

This spreadsheet shared by Claire Worledge was used as the first practical exercise in the virtual event on Thursday July 22nd, 2021 “Segregation of Duties Audit in SAP”. In this spreadsheet we see the methodology followed in order to check who has violated user access, based on the general ledger header table. Normally, this process would be done in a data mining tool (ACL, IDEA, SQL, Alteryx, QLIK), however, here we show it in Excel, for the purpose of understanding the process and to help those of you that don’t have access to any of the above tools.

Read More→

Share a Free Resource

Support your fellow community members by sharing one of your internal audit resources.


Please email the document to info at audittopia dot com and we’ll make it freely available to everyone.

Offer a Paid Resource

Offer your original resources to the community at a price you set

(≧ $10). Auditopia will pay your earnings  through Stripe after deducting a 20% share to cover the transactional costs.


If you’re responding to a resource request, please leave a comment in the request pointing to the resource you’re adding.

Create Free Account
[ultimatemember form_id="117"]

Contact Us