Finance Engineering · Issue 2

It's 2026. You Shouldn't Have to Wait a Quarter to Know If a Control Failed.

Why the silo-based ICFR framework that every listed Indian company still runs is no longer cautious, it's just slow, and what a connected framework actually looks like.

April 2026
8 min read
ICFR · Ind AS
ByAccEase

Pick any listed company in India today and ask the CFO a simple question: of the 300-odd ICFR controls in your framework, how many operated successfully this week, how many failed, and which ones are you looking at right now?

Almost nobody can answer. Not because the controls are weak, but because the architecture that surrounds them was designed for a world where quarterly was the fastest anyone could go. Evidence gets collected at period-end. Testing happens during audit. Deficiencies surface months after the transactions that triggered them. The CFO learns that a segregation-of-duties control failed in April when the statutory auditor flags it in July.

In 2026, this is not cautious. It is slow.

The core idea

Detection fast enough is prevention. The distinction between preventive and detective controls collapses when failures surface the same day.

The silo was a workaround, not a design choice

ICFR never wanted to be siloed. It became siloed because the data lived in silos. Revenue controls sat with the revenue team because only they had access to the order-to-cash system. Treasury controls sat with treasury because only they could pull the bank reconciliations. Procurement controls sat with procurement because only they could show you the PO-to-invoice match. The internal audit team wasn't central. They were a courier service, moving evidence from one silo to the auditor's inbox.

Every inefficiency in ICFR today is a downstream symptom of this structure. Repeated requests for the same evidence. Controls tested once a quarter instead of continuously. Deficiencies identified long after the transactions that triggered them. Auditors re-performing work because they can't trust the sample. A control matrix that nobody outside the internal audit team actually reads.

The silo made sense when the alternative was hiring more people. It does not make sense in a year where the ERP, the bank, the HRMS, and the contract repository all expose APIs and the cost of watching every transaction instead of sampling 25 of them is effectively zero.

What “real time” actually means for controls

When a CFO hears “real-time controls,” the instinctive pushback is that not every control needs to run every second. That's fair. A quarterly balance sheet review doesn't need to be continuous. But that is not what real time means here.

Real time means three things, and a serious framework needs all three.

1
Status without asking

You know the status of every control without asking anyone. The three-way match control isn't a folder of screenshots. It is a live count of how many POs matched cleanly, how many had exceptions, and which exceptions are still open. The revenue cutoff control isn't a quarterly test. It is a running check on every invoice dated near period-end. The question “did this control operate” has an answer that is visible on a dashboard, not produced by an email chain.

2
Failures surface the day they happen

Failures surface when they happen, not when someone goes looking. If a user with conflicting roles posts a journal entry today, the CFO does not find out about it in the next audit cycle. It is flagged the same day. The distinction between “preventive” and “detective” controls starts to collapse, because detection fast enough is prevention.

3
Controls stop being owned in isolation

A revenue recognition control, a customer credit limit control, and a collections control are not three separate things. They are three views of the same underlying risk. A spike in credit-limit overrides often correlates with aggressive revenue recognition timing, which correlates with a deterioration in DSO. In a siloed framework, each of these is a separate testing exercise owned by a separate team. In a connected framework, they are a single risk signature that anyone in the finance function can see.

Why the audit conversation is shifting anyway

Any CFO who has sat through a recent audit committee meeting has noticed the tone change. Statutory auditors are asking for direct system access instead of sample files. Internal auditors are being asked to produce interim findings, not just annual reports. Audit committees are starting to ask “what is our live control health” instead of “when does the next test cycle end.”

A company still running ICFR out of an Excel tracker is going to find itself answering questions it doesn't have the infrastructure to answer. Not because the controls are weak, but because the evidence is the wrong shape. Silo-based ICFR produces static artifacts, a PDF here, a screenshot there, a deficiency log updated twice a year. The expectation is shifting to queryable data: show me the last 90 days of this control's exceptions, sorted by severity, filtered by business unit.

The companies that move first set the standard their auditors expect from everyone else. The companies that move last get told, politely, that their audit fee is going up because their data is hard to work with.

What a connected ICFR framework actually looks like

The shift is architectural, not cosmetic. Adding a dashboard on top of an Excel tracker produces a slightly prettier Excel tracker.

A connected framework has four properties. Controls are mapped to the systems that generate the underlying data, not the departments that own the process. Evidence is pulled automatically on a schedule that matches the risk, not the calendar. Exceptions are routed to owners with live context, a link to the transaction, the control, and the historical pattern, not a PDF attachment. And the whole thing produces a single view of the control environment that the CFO, the audit committee, and the external auditor can all see at the same time.

None of this is theoretical. The underlying infrastructure is available today. What is scarce is the willingness inside the finance function to stop defending the silo.

The uncomfortable part for CFOs

The reason most ICFR functions haven't made this shift isn't technical. It's organizational. The current structure has constituencies. Control owners who don't want their work to become visible in real time. Internal audit teams whose value proposition is being the courier. External auditors who have priced their work around the cost of assembling evidence, not analyzing it.

Every one of these concerns is legitimate, and every one of them will adapt. But the CFO who waits for consensus before moving will spend the next three years in meetings while a competitor's finance function operates at a different clock speed, closing faster, responding to audit queries in hours instead of weeks, and catching deficiencies before they become restatements.

The question is no longer whether ICFR becomes continuous and connected. It is whether the finance function leads that transition or has it imposed by the auditor, the regulator, or the next activist investor who notices the gap.

In 2026, not knowing in real time which of your controls passed and which failed isn't cautious. It isn't conservative. It is a choice to operate slower than you need to, and it shows up everywhere, in the close timeline, in the audit fee, in the restatement risk, and eventually in the valuation.

From AccEase

AccEase builds continuous, connected ICFR and Ind AS 116 compliance infrastructure for listed Indian companies. If this is a conversation you are having internally, we should talk.

All issues