ERP Transition and Audit Continuity
Rebuilding From the Inside Out
How internal audit functions can turn ERP disruption into a strategic advantage.
Key takeaways — read this first
- Most audit functions did not get a seat at the ERP implementation table. The recovery window starts at stabilization -- not at go-live.
- Data access is the first problem to solve. Intermediary data delivery is a structural constraint on audit quality, not a temporary inconvenience.
- Data completeness assurance -- migration integrity, master data governance, automated control reliability, and AI input quality -- is audit scope, not IT scope.
- The rebuild takes one to three years when managed deliberately. Each phase has distinct objectives. Skipping phases does not accelerate the timeline.
- The IIA 2024 Standards require disclosure to the audit committee when scope limitations materially constrain the function's ability to fulfill its mandate.
The window has already closed
Most audit functions did not get a seat at the ERP implementation table. The question now is how you rebuild from where you actually are.
Stabilization has ended. The harder question begins now.
Most audit functions did not get a seat at the ERP implementation table. By the time go-live happened, the governance framework was set, data structures had changed, access models were locked down, and audit was asked to be patient while the business stabilized. That patience was reasonable. Stabilization takes time and audit is not the priority during a system transition of that magnitude.
But stabilization ends. And when it does, many audit functions find themselves operating in a fundamentally changed environment -- with less direct data access than they had before, less visibility into what changed during the transition, and less executive engagement than the function needs to be effective. The ship has sailed on proactive involvement. The question now is how you rebuild from where you actually are.
How to know your function has lost its footing
The credibility erosion that follows an ERP transition rarely announces itself clearly. It accumulates. If several of these indicators are present simultaneously, the function is likely further behind than leadership realizes.
Data Completeness Assurance: Protecting the Transformation Investment
Independent assurance over migration integrity is not IT's job. It is audit's -- and it requires the same data access and analytical capability that every other post-ERP scope area demands.
An ERP migration is one of the largest capital investments an organization makes. The return on that investment depends entirely on one condition: the data that moves into the new system is complete, accurate, and correctly mapped. When that condition is not met, every capability the new system was built to deliver -- advanced analytics, AI-driven decision support, automated controls -- is operating on a compromised foundation.
Internal audit is uniquely positioned to provide independent assurance over that foundation. Not as an extension of the IT implementation team, but as an independent layer of validation that the investment is delivering what it was designed to produce. That distinction matters. IT builds and validates the system. Audit independently confirms that the data it contains can be relied upon -- for controls, for reporting, and for the AI-driven tools being built on top of it.
In a large-scale ERP migration, IT bandwidth is finite and stretched. Data completeness work -- systematic validation of migration integrity, master data governance, and ongoing data quality -- requires time and analytical attention that implementation teams rarely have available while managing go-live pressures simultaneously. The coverage gap that creates is real, and it is not a criticism of IT. It is the structural reality of transformation at scale.
An audit function with data analytics capability can fill that gap with rigor and independence. Four areas where audit's involvement directly protects the organization's investment:
Starting the recovery: what has to come first
Recovery from a position of reduced credibility is not the same as building credibility from scratch. The foundation already exists. What has eroded is the perception of audit's relevance and capability.
Credibility in a recovery context is rebuilt through demonstrated output, not through stated intent.
Rebuilding that perception requires demonstrating value before claiming it, which means sequencing the recovery effort carefully. The instinct to fix everything at once is understandable but counterproductive. A function that announces a comprehensive modernization initiative from a position of reduced credibility will be met with skepticism. The stronger approach is to identify one or two high-visibility areas where improved methodology or analytics can produce a finding or insight that leadership recognizes as something they could not have gotten from the old approach -- and build from there.
The intermediary data problem is not a temporary inconvenience
One of the most consequential and least visible consequences of post-ERP governance lockdowns is what happens to audit's data access.
In practice, intermediary data delivery creates structural friction for exploratory audit work.
In most transitions, the governance framework correctly restricts write access to protect data integrity. But read access for audit frequently gets caught in the same net -- not by design, but because audit's data needs were not part of the access design conversation. The result is a model where audit data requests route through a reporting or data delivery team. This team is often skilled and responsive. The problem is structural, not personal.
The question audit is asking at the start of an engagement is rarely the same question it is asking at the end -- because following the evidence is the point. When the intermediary team also does not own validation of the data it delivers, the problem compounds. Audit receives data, identifies quality issues, submits tickets, waits for resolution, receives revised data, and validates again. In a function already operating under time pressure and reduced credibility, this cycle is not just inefficient. It is a structural barrier to producing the quality of work that recovery requires.
The ICAEW identifies data quality as the single greatest risk to analytics-driven audit credibility. Trust built through analytical findings can be rapidly lost when the underlying data is unreliable. An audit function trying to rebuild credibility through better analytics cannot afford to build that work on an uncertain data foundation.
A realistic rebuild timeline: 1 to 3 years
Recovery and rebuilding takes one to three years when managed deliberately. Each phase has distinct objectives, an interim operating model, and expected outputs.
- Pull the full list of analytics workflows and procedures from pre-ERP audit files. Document each one: what it tested, what data it used, and whether that data source still exists in the new system.
- Map the new ERP's data structures for the top five audit risk areas. Document table names, field names, and where legacy data fields now live.
- Submit a formal data access request using IIA 2024 Standards language. Reference Standard 6.2 and the charter authorization requirement explicitly.
- Catalog every access gap precisely: which tables, which transactions, which process areas are inaccessible and why.
- Identify one high-visibility audit area where a rebuilt or new analytics approach could produce a credible finding -- and prioritize that for Phase 2.
- Initiate a data completeness scoping assessment: identify the highest-risk data domains for migration validation -- master data tables, automated control inputs, and AI-adjacent data layers -- and propose a formal data completeness assurance workplan to the CAE and audit committee.
- Negotiate the interim data access workflow explicitly with IT: audit submits field-level data specifications, IT delivers extracts, audit validates against source transactions and documents that validation in the working paper file.
- Complete two to three post-ERP engagements. For each, document what the data access constraints were, how they were worked around, and what the finding quality impact was. This documentation builds the business case for expanded access.
- Draft the continuous monitoring business case with specific ROI framing: detection lead time reduction, coverage expansion, and findings identified between cycles that a traditional approach would have missed.
- Begin the tool fit assessment: compare current tools against the new ERP architecture and identify which tools need to be rebuilt, replaced, or supplemented.
- Establish direct data access that does not require ticketing -- document the access pathway, the data owner, and the refresh cadence for each primary data source.
- Build and operationalize two to three continuous monitoring routines. Each routine should have a defined threshold, an exception owner, an escalation path, and a closure standard documented before the routine goes live.
- Distribute analytics execution: at least two team members should be able to run each monitoring routine independently. Document this in the working paper framework.
- Conduct a structured retrospective at month 30: compare findings volume, detection lead time, and coverage breadth against the pre-ERP baseline. Use this as the evidence base for the next resource and investment conversation.
- Establish ongoing data integrity monitoring routines for master data governance -- flagging duplicate records, unauthorized master data changes, missing required fields, and referential integrity failures on a defined cadence. Document these routines as permanent monitoring infrastructure, not transition-period work.
The access request that moves organizations
Frame the data access request as a professional obligation and an organizational risk issue, not a departmental preference.