Phase 1:Planning Preparation

  Blog    |     March 12, 2026

Auditing a Supplier Order Management System (SOMS) requires a structured approach to evaluate its effectiveness, efficiency, compliance, and security. Here’s a step-by-step guide:

  1. Define Scope & Objectives

    • Identify processes covered (e.g., purchase orders, receipts, invoices, returns).
    • Set audit goals (e.g., control effectiveness, data accuracy, regulatory compliance).
    • Align with frameworks (e.g., COSO, COBIT, ISO 27001).
  2. Understand the System

    • Document SOMS architecture, integrations (ERP, WMS, TMS), and workflows.
    • Review policies: Procurement, inventory management, vendor management, and segregation of duties.
  3. Assess Risks

    • Key risks: Duplicate orders, unauthorized changes, data breaches, invoice fraud, inventory discrepancies.
    • Prioritize high-risk areas (e.g., payment processing, vendor onboarding).
  4. Gather Documentation

    System manuals, access logs, change records, audit trails, KPI reports, and past audit findings.


Phase 2: Fieldwork & Testing

A. Process Controls Testing

  1. Order Creation & Approval

    • Verify:
      • Proper authorization (e.g., approval hierarchy enforced).
      • Data completeness (vendor, item, quantity, price, delivery date).
      • Preventive controls (e.g., duplicate order detection).
    • Sample: Test 20-30 orders for compliance.
  2. Order Execution & Fulfillment

    • Trace POs to receipts (match against GRNs - Goods Receipt Notes).
    • Check timeliness of deliveries and deviations.
    • Assess communication logs with vendors.
  3. Invoice & Payment Matching 3-Way Match**

    • Validate:
      • Invoices match POs and GRNs.
      • Exceptions are reviewed/approved.
      • Payments align with terms.
    • Sample: Review 15-20 high-value invoices.
  4. Returns & Discrepancies

    • Test RMA (Return Merchandise Authorization) processes.
    • Ensure credit memos are processed accurately.

B. System & Data Integrity

  1. Data Accuracy

    • Reconcile SOMS data with ERP/WMS (e.g., inventory counts, open POs).
    • Check for data entry errors (e.g., incorrect vendor codes).
  2. Access Controls

    • Review user roles/permissions (principle of least privilege).
    • Test inactive accounts and segregation of duties (e.g., buyer ≠ approver).
  3. Audit Trails

    • Verify:
      • All actions (edits, approvals, logins) are logged.
      • Logs are tamper-proof and retained per policy.
  4. Change Management

    • Assess:
      • Formal change approval process.
      • Testing and rollback procedures for system updates.

C. Security & Compliance

  1. Cybersecurity

    • Test vulnerability scans, patch management, and encryption (data at rest/in transit).
    • Review incident response plans.
  2. Regulatory Compliance

    • Check adherence to:
      • GDPR/CCPA (data privacy).
      • SOX (financial controls).
      • Industry-specific rules (e.g., FDA for pharma).
  3. Vendor Management

    • Verify vendor onboarding (due diligence, contracts).
    • Monitor performance metrics (on-time delivery, quality).

Phase 3: Reporting & Follow-Up

  1. Document Findings

    • Classify issues by severity (e.g., critical, major, minor).
    • Include evidence (screenshots, logs, interviews).
  2. Recommend Improvements

    • Address gaps (e.g., automate 3-way match, enhance access controls).
    • Suggest best practices (e.g., AI for anomaly detection).
  3. Management Response

    • Discuss findings with stakeholders.
    • Validate action plans and timelines.
  4. Monitor Progress

    Track implementation of recommendations in follow-up audits.


Key Tools & Techniques

  • Data Analytics: Use ACL, IDEA, or SQL to analyze transaction patterns (e.g., rush orders, high-risk vendors).
  • Interviews: Engage users (buyers, warehouse staff, finance) to understand pain points.
  • Walkthroughs: Map end-to-end processes to identify control gaps.
  • Penetration Testing: Simulate attacks to test system resilience.

Common Pitfalls to Avoid

  • Ignoring Integrations: SOMS rarely operates in isolation; audit connected systems.
  • Overlooking Manual Workarounds: Staff often bypass systems—test these "shadow processes."
  • Neglecting User Training: Inadequate training leads to errors; assess training effectiveness.

By following this approach, you’ll ensure the SOMS delivers efficiency, compliance, and value while mitigating risks. Tailor the audit to your organization’s specific industry and size!


Request an On-site Audit / Inquiry

SSL Secured Inquiry