Your Risk Control Matrix is Lying to You, Here's How to Fix It in One Prompt


Problem

Problem One - Generic and Irrelevant RCMs Most organizations recycle the same risk control matrix templates across processes and industries without customizing them to their actual business environment. This prompt solves that by capturing the company's specific industry, regulatory context, and process details right at the start, ensuring every single risk and control in the output is directly relevant to the organization and not borrowed from a generic checklist. Problem Two - Missing Critical Risks A common failure in audit planning is that teams miss key risks simply because they rely on last year's RCM or copy from a peer organization. This prompt forces exhaustive risk identification by scanning across all risk categories including financial, operational, compliance, IT, fraud, and reputational risks, ensuring no blind spots are left unaddressed. Problem Three - Incorrect Control Mapping Many RCMs mislabel controls, confusing preventive controls with detective ones or failing to assign proper ownership. This prompt generates clearly categorized control types with designated owners, frequencies, and nature, whether manual, automated, or semi-automated, so the control environment is accurately represented. Problem Four - No End-to-End Risk-to-Control Linkage A risk control matrix loses its value when risks float in isolation without being linked to controls, assertions, ratings, or indicators. This prompt builds a complete end-to-end mapping that connects each risk to its root cause, impact, existing control, residual rating, and Key Risk and Control Indicators, making the matrix a truly functional governance document. Problem Five - RCMs That Are Built Once and Forgotten Most RCMs are created during an audit engagement and then shelved. Because this prompt is input-driven, it can be re-run every time a process changes, a new regulation comes in, or a new risk emerges, making the RCM a living document rather than a static file. Problem Six - Weeks of Manual Effort Wasted Internal audit teams typically spend two to three weeks building a comprehensive RCM from scratch. This prompt delivers a board-ready, fully populated risk control matrix in a single output, saving significant time and freeing up audit resources for higher-value work like testing and analysis. Problem Seven - No Integration of KRIs and KCIs Most RCMs document risks and controls but fail to define what should be measured to monitor them on an ongoing basis. This prompt embeds Key Risk Indicators and Key Control Indicators directly into the matrix, giving management a ready-to-use monitoring framework alongside the risk documentation.

Prompt Input

You are a Senior Internal Audit and Risk Management Expert with deep expertise in building Risk Control Matrices across multiple industries. Your task is to build a comprehensive, board-ready Risk Control Matrix for my organization based on the information I provide below. Before generating the RCM, read and understand all the inputs carefully. Section One - Company and Industry Profile (Provide your company name, which is optional and can be written as Confidential. Then provide your industry or sector such as Banking, Manufacturing, Healthcare, Retail, Oil and Gas, or EdTech. Indicate your company size as Small, Mid-size, Large, or Listed Entity. Share the regulatory environment applicable to your organization such as SEBI, RBI, SOX, GDPR, ISO 27001, HIPAA, or None if not applicable. Finally mention the geography of your operations such as India, United States, or Multi-country.) Section Two - Process to Be Covered (Provide the name of the business process you want the RCM to be built for, such as Procure-to-Pay, Revenue Recognition, Payroll Processing, IT Access Management, Financial Reporting, or Inventory Management. List any sub-processes under it or write Auto-identify if you want the prompt to determine them. Mention the process owner or department such as Finance, HR, IT, or Supply Chain. Also indicate how frequently the process runs, whether it is Daily, Weekly, Monthly, or Transaction-based.) Section Three - Risk Preferences (Specify which risk categories you want covered, choosing from Financial, Operational, Compliance, IT, Reputational, and Strategic, or simply write All. State your organization's risk appetite as Low, Medium, or High. Briefly describe any known historical issues or incidents related to this process, or write None if there are no prior incidents. Indicate whether you want Fraud Risk to be specifically focused on by writing Yes or No.) Section Four - Control Preferences (Mention the control framework you want the RCM aligned to, such as COSO, COBIT, ISO 31000, Custom, or None. Specify which control types to include, whether Preventive, Detective, Corrective, or All. Describe the automation level of controls in your organization as Manual, Semi-automated, Fully Automated, or Mixed. Indicate how frequently controls should be tested, whether on a Continuous, Quarterly, or Annual basis.) Section Five - Output Format Preferences (State your preferred output format as Table, Narrative plus Table, or Excel-ready format. Indicate whether you want Risk Rating included by writing Yes or No. Specify whether Residual Risk should be shown. Confirm whether you want KRIs and KCIs included. State whether Audit Assertions mapping should be part of the output, which is particularly relevant for financial processes. Finally indicate whether you want Recommendations for Control Gaps to be included in the output.) Now using all the above inputs, generate a complete and exhaustive Risk Control Matrix. For each risk identified, provide the process and sub-process name, a unique Risk ID, a detailed risk description, the risk category, the inherent risk rating as High, Medium, or Low along with a justification, the root cause of the risk, the potential impact if the risk materializes, a description of the existing control, the control type as Preventive, Detective, or Corrective, the control nature as Manual, Automated, or Semi-automated, the control owner, the control testing frequency, the Key Control Indicator, the Key Risk Indicator, the applicable audit assertion where relevant, the residual risk rating after considering the control, whether a control gap exists, and specific recommendations to strengthen the control. Do not produce a generic or template-based output. Every risk identified must be specific to the process and industry provided in the inputs. Identify a minimum of fifteen to twenty risks for any major process. Flag all HIGH residual risks prominently. At the end of the matrix, add a summary section covering the Top Five Critical Risks, the Overall Process Risk Rating, and Three Priority Recommendations for Management Action.

Prompt Output

The Risk Control Matrix The core output will be a fully populated risk control matrix covering a minimum of fifteen to twenty risks for the process specified. Each risk entry will contain all eighteen data points including risk description, category, inherent rating, root cause, impact, control description, control type, control nature, owner, frequency, KRI, KCI, audit assertion, residual risk rating, gap identification, and recommendations. The matrix will be specific to the industry and process provided and will not contain any generic or recycled content. Risk Categorization and Rating Every risk in the output will be tagged under a specific category such as Financial, Operational, Compliance, IT, or Fraud. Each risk will carry an inherent risk rating of High, Medium, or Low supported by a one-line business justification that explains why that rating has been assigned in the context of the specific industry and process. Control Descriptions Controls documented in the output will be specific, actionable, and process-relevant. Vague statements such as "management review" or "approval exists" will be replaced with precise descriptions that explain who performs the control, what exactly is reviewed or approved, at what frequency, and what evidence is produced. Each control will also be clearly tagged as Preventive, Detective, or Corrective and marked as Manual, Automated, or Semi-automated. Key Risk and Control Indicators For every risk and control pair in the matrix, the output will include a measurable Key Risk Indicator and a measurable Key Control Indicator. These will be defined in a way that management or the internal audit team can directly use them for ongoing monitoring without needing to define metrics separately. Residual Risk Assessment After documenting the existing control for each risk, the output will provide a residual risk rating that reflects the effectiveness of the control in mitigating the inherent risk. Where the residual risk remains High despite the existence of a control, that row will be prominently flagged to draw immediate management attention. Audit Assertions Mapping For all financial and reporting-related processes, the output will include a mapping of each risk to the relevant audit assertion it threatens, including Completeness, Accuracy, Existence, Valuation, Cut-off, Rights and Obligations, or Presentation and Disclosure. This makes the RCM directly usable for external and internal audit planning. Control Gap Identification and Recommendations Wherever a control is absent, weak, poorly designed, or not operating effectively, the output will flag a control gap and provide a specific, practical recommendation to address it. Recommendations will not be generic best practices but will be tailored to the process, industry, and risk context described in the input. Fraud Risk Callouts If fraud risk focus is selected as Yes in the input, the output will include a dedicated set of fraud risk scenarios relevant to the specific process and industry. Each fraud scenario will be accompanied by red flag indicators, the fraud triangle element it exploits, and recommended anti-fraud controls. Executive Summary Section At the end of the full matrix, the output will include a summary section written for senior management and audit committee consumption. This section will highlight the Top Five Critical Risks identified in the process, assign an Overall Process Risk Rating, and provide Three Priority Recommendations that management should act on immediately to strengthen the control environment.

LLM Name: Claude