ERP Transition and Audit Continuity

Rebuilding From the Inside Out

How internal audit functions can turn ERP disruption into a strategic advantage.

Key takeaways — read this first
  • Most audit functions did not get a seat at the ERP implementation table. The recovery window starts at stabilization -- not at go-live.
  • Data access is the first problem to solve. Intermediary data delivery is a structural constraint on audit quality, not a temporary inconvenience.
  • Data completeness assurance -- migration integrity, master data governance, automated control reliability, and AI input quality -- is audit scope, not IT scope.
  • The rebuild takes one to three years when managed deliberately. Each phase has distinct objectives. Skipping phases does not accelerate the timeline.
  • The IIA 2024 Standards require disclosure to the audit committee when scope limitations materially constrain the function's ability to fulfill its mandate.
Post-go-live window
6 months
Stabilization and assessment phase
Rebuild timeline
1 to 3 years
From stabilization to continuous monitoring
Access standard
IIA 2024
Unrestricted access, Principle 6
Design opportunity
Intentional rebuild
Not reactive reconstruction
This framework uses SAP S/4HANA as its primary reference environment. The underlying principles apply across ERP platforms including Oracle, Microsoft Dynamics, and others. Platform-specific tool references can be adapted to equivalent capabilities in your environment.

The window has already closed

Most audit functions did not get a seat at the ERP implementation table. The question now is how you rebuild from where you actually are.

Stabilization has ended. The harder question begins now.

Most audit functions did not get a seat at the ERP implementation table. By the time go-live happened, the governance framework was set, data structures had changed, access models were locked down, and audit was asked to be patient while the business stabilized. That patience was reasonable. Stabilization takes time and audit is not the priority during a system transition of that magnitude.

But stabilization ends. And when it does, many audit functions find themselves operating in a fundamentally changed environment -- with less direct data access than they had before, less visibility into what changed during the transition, and less executive engagement than the function needs to be effective. The ship has sailed on proactive involvement. The question now is how you rebuild from where you actually are.

How to know your function has lost its footing

The credibility erosion that follows an ERP transition rarely announces itself clearly. It accumulates. If several of these indicators are present simultaneously, the function is likely further behind than leadership realizes.

Repeat findings
The same control gaps appear in successive engagements
This is not a sign that the business isn't listening. It is a sign that audit's recommendations are disconnected from how the business actually operates in the new system environment. Repeat findings signal methodological misalignment, not just management indifference.
Reduced executive access
Audit is no longer in the room
Meetings that used to include audit no longer do. This is not accidental. It reflects a gradual recalibration of how much value leadership believes audit is adding. When significant operational or technology decisions are being made without audit in the conversation, that perception has already shifted.
Late visibility into changes
Audit finds out after the design decisions are made
New pilots, process redesigns, system changes, and organizational initiatives are underway or complete before audit is aware. By the time audit is in the conversation, the window to influence controls has closed.
Data access constraints
The ability to self-direct data inquiry has been reduced
Analytics workflows that supported pre-ERP work no longer function in the same way. Data that used to be directly accessible now routes through intermediary teams. Validation cycles that used to take hours now take weeks. Audit's foundation for effective analytics-driven work has been materially undermined.
Declining finding significance
Engagements are producing fewer high-impact findings
This can reflect a genuinely improved control environment, but in a post-ERP period of elevated inherent risk, it more often reflects an audit methodology that has not kept pace with how the business now operates. When three or more of these conditions are present, the function is in a recovery situation -- not a maintenance problem.

Data Completeness Assurance: Protecting the Transformation Investment

Independent assurance over migration integrity is not IT's job. It is audit's -- and it requires the same data access and analytical capability that every other post-ERP scope area demands.

An ERP migration is one of the largest capital investments an organization makes. The return on that investment depends entirely on one condition: the data that moves into the new system is complete, accurate, and correctly mapped. When that condition is not met, every capability the new system was built to deliver -- advanced analytics, AI-driven decision support, automated controls -- is operating on a compromised foundation.

Internal audit is uniquely positioned to provide independent assurance over that foundation. Not as an extension of the IT implementation team, but as an independent layer of validation that the investment is delivering what it was designed to produce. That distinction matters. IT builds and validates the system. Audit independently confirms that the data it contains can be relied upon -- for controls, for reporting, and for the AI-driven tools being built on top of it.

In a large-scale ERP migration, IT bandwidth is finite and stretched. Data completeness work -- systematic validation of migration integrity, master data governance, and ongoing data quality -- requires time and analytical attention that implementation teams rarely have available while managing go-live pressures simultaneously. The coverage gap that creates is real, and it is not a criticism of IT. It is the structural reality of transformation at scale.

An audit function with data analytics capability can fill that gap with rigor and independence. Four areas where audit's involvement directly protects the organization's investment:

Migration Integrity Validation
Did the data that left the legacy system arrive in the new ERP complete, accurate, and correctly mapped? Record count reconciliation, field-level validation, and exception reporting on records that failed, transformed unexpectedly, or arrived with null values in required fields. This is systematic, documentable, and repeatable -- and it is the audit test that answers the question the organization most needs answered at go-live: did the migration work?
Master Data Governance
Customer master, vendor master, item master, and pricing tables are the data foundation every transaction in the system depends on. In a multi-location distribution operation, master data errors do not affect one transaction -- they affect every transaction touching that record across every location until the error is caught and corrected. Audit's role is to provide independent assurance that master data governance controls are operating as designed, and that the data being relied upon for automated processes reflects the organization's actual customers, vendors, and pricing structures.
Automated Control Reliability
When the ERP takes over a process that was previously manual, the automated control is only as good as the data feeding it. A control that fires correctly in a clean data environment may produce false negatives, false positives, or silent failures when the underlying data contains gaps or mapping errors. Audit testing of automated control reliability -- confirming that controls are firing correctly, that exception handling is routing to the right owners, and that the data inputs those controls depend on are complete -- is a new and critical audit scope area in a post-migration environment.
AI Input Data Quality
AI-driven tools -- pricing recommendations, demand forecasting, sales analytics, automated quote generation -- are dependent on the same data layer the ERP migration was designed to clean and standardize. An AI system operating on incomplete or inaccurate data does not catch the error. It amplifies it, at scale, across every decision the tool influences. Audit assurance over the data inputs to AI-driven systems is an emerging scope area that directly protects the organization's AI investment -- and it requires the same data access and analytical capability that migration validation demands.
Data completeness assurance is not a temporary audit project. It is the scope expansion that aligns audit's coverage with where the organization's risk actually is during transformation. A CAE who proposes and leads this work is not expanding audit's territory. That is the scope expansion that aligns audit's coverage with where the organization's risk actually is during transformation.

Starting the recovery: what has to come first

Recovery from a position of reduced credibility is not the same as building credibility from scratch. The foundation already exists. What has eroded is the perception of audit's relevance and capability.

Credibility in a recovery context is rebuilt through demonstrated output, not through stated intent.

Rebuilding that perception requires demonstrating value before claiming it, which means sequencing the recovery effort carefully. The instinct to fix everything at once is understandable but counterproductive. A function that announces a comprehensive modernization initiative from a position of reduced credibility will be met with skepticism. The stronger approach is to identify one or two high-visibility areas where improved methodology or analytics can produce a finding or insight that leadership recognizes as something they could not have gotten from the old approach -- and build from there.

The parallel workstream: data access cannot wait
The data access conversation cannot wait for the credibility recovery to be complete, because the data access problem is actively constraining the quality of audit work. The 2024 IIA Global Internal Audit Standards are explicit: internal auditors must have unrestricted access to the data and records necessary to fulfill the audit mandate. This is a mandatory professional standard, not a preference. Framing the data access request in those terms -- as a professional obligation with disclosure implications if unresolved -- changes the nature of the conversation with IT governance and executive leadership. See the Data Access page for the full framework.

The intermediary data problem is not a temporary inconvenience

One of the most consequential and least visible consequences of post-ERP governance lockdowns is what happens to audit's data access.

In practice, intermediary data delivery creates structural friction for exploratory audit work.

In most transitions, the governance framework correctly restricts write access to protect data integrity. But read access for audit frequently gets caught in the same net -- not by design, but because audit's data needs were not part of the access design conversation. The result is a model where audit data requests route through a reporting or data delivery team. This team is often skilled and responsive. The problem is structural, not personal.

The question audit is asking at the start of an engagement is rarely the same question it is asking at the end -- because following the evidence is the point. When the intermediary team also does not own validation of the data it delivers, the problem compounds. Audit receives data, identifies quality issues, submits tickets, waits for resolution, receives revised data, and validates again. In a function already operating under time pressure and reduced credibility, this cycle is not just inefficient. It is a structural barrier to producing the quality of work that recovery requires.

The ICAEW identifies data quality as the single greatest risk to analytics-driven audit credibility. Trust built through analytical findings can be rapidly lost when the underlying data is unreliable. An audit function trying to rebuild credibility through better analytics cannot afford to build that work on an uncertain data foundation.

A realistic rebuild timeline: 1 to 3 years

Recovery and rebuilding takes one to three years when managed deliberately. Each phase has distinct objectives, an interim operating model, and expected outputs.

Phase 1 -- Months 1 to 6 post go-live
Stabilization and Assessment
Organizations going through ERP transitions need time to stabilize. Audit should use this window productively, not passively. Map the new system's data structures. Document which legacy analytics apply and which need to be rebuilt or retired. Submit the formal data access request with professional standards language. Catalog access gaps specifically so the request is precise, not general.
Key tasks
  • Pull the full list of analytics workflows and procedures from pre-ERP audit files. Document each one: what it tested, what data it used, and whether that data source still exists in the new system.
  • Map the new ERP's data structures for the top five audit risk areas. Document table names, field names, and where legacy data fields now live.
  • Submit a formal data access request using IIA 2024 Standards language. Reference Standard 6.2 and the charter authorization requirement explicitly.
  • Catalog every access gap precisely: which tables, which transactions, which process areas are inaccessible and why.
  • Identify one high-visibility audit area where a rebuilt or new analytics approach could produce a credible finding -- and prioritize that for Phase 2.
  • Initiate a data completeness scoping assessment: identify the highest-risk data domains for migration validation -- master data tables, automated control inputs, and AI-adjacent data layers -- and propose a formal data completeness assurance workplan to the CAE and audit committee.
Expected outputs: Data gap assessment, formal access request submitted, preliminary engagement plan for the first post-stabilization audit
Phase 2 -- Months 7 to 18
Interim Access and Resumed Engagements
This is where engagements resume under constrained access conditions. The interim workflow should be negotiated explicitly: audit submits field-level data specifications, the delivery team produces extracts, and audit retains the right to validate against source transactions using whatever direct access exists. Audit documents this validation as part of the working paper file. Simultaneously, the business case for expanded direct access -- including native SAP reporting tools and read-only access to validated data models -- moves through approval. In companies that move deliberately, expect this to take longer than you want.
Key tasks
  • Negotiate the interim data access workflow explicitly with IT: audit submits field-level data specifications, IT delivers extracts, audit validates against source transactions and documents that validation in the working paper file.
  • Complete two to three post-ERP engagements. For each, document what the data access constraints were, how they were worked around, and what the finding quality impact was. This documentation builds the business case for expanded access.
  • Draft the continuous monitoring business case with specific ROI framing: detection lead time reduction, coverage expansion, and findings identified between cycles that a traditional approach would have missed.
  • Begin the tool fit assessment: compare current tools against the new ERP architecture and identify which tools need to be rebuilt, replaced, or supplemented.
Expected outputs: Two to three post-ERP engagements completed, access expanded beyond initial limitations, continuous monitoring business case drafted
Phase 3 -- Months 18 to 36
Continuous Monitoring Infrastructure
By this stage, the goal is a functioning continuous monitoring capability for the highest-risk process areas, data access that no longer requires ticketing through an intermediary, and audit analytics workflows that can be operated across the team. Native SAP tools such as Business Integrity Screening -- which provides out-of-the-box automated controls for procure-to-pay, order-to-cash, and record-to-report processes with anomaly detection and machine learning -- represent the leading-edge option for organizations operating on S/4HANA. These tools draw from the system's own validated data model, eliminating the extraction and validation problem entirely while producing output compatible with Microsoft Power BI for reporting.
Key tasks
  • Establish direct data access that does not require ticketing -- document the access pathway, the data owner, and the refresh cadence for each primary data source.
  • Build and operationalize two to three continuous monitoring routines. Each routine should have a defined threshold, an exception owner, an escalation path, and a closure standard documented before the routine goes live.
  • Distribute analytics execution: at least two team members should be able to run each monitoring routine independently. Document this in the working paper framework.
  • Conduct a structured retrospective at month 30: compare findings volume, detection lead time, and coverage breadth against the pre-ERP baseline. Use this as the evidence base for the next resource and investment conversation.
  • Establish ongoing data integrity monitoring routines for master data governance -- flagging duplicate records, unauthorized master data changes, missing required fields, and referential integrity failures on a defined cadence. Document these routines as permanent monitoring infrastructure, not transition-period work.
Expected outputs: Continuous monitoring active for one to two high-risk process areas, direct data access established, analytics capability distributed beyond a single team member
The specific SAP tool activation steps for this phase -- Fiori workspace configuration, BIS activation, and GRC module deployment -- are covered in the Execution Playbook.

The access request that moves organizations

Frame the data access request as a professional obligation and an organizational risk issue, not a departmental preference.

The disclosure obligation creates urgency without escalation.
The 2024 IIA Standards require the chief audit executive to disclose to the audit committee any interference in determining the scope of internal auditing or performing audit work. Unresolved data access limitations that materially constrain audit's ability to fulfill its mandate qualify as scope limitations under this standard. That is not a threat. It is a procedural requirement that leadership should understand before the disclosure becomes necessary.
Recovery is not a single decision. It is a sequence of smaller ones, made before the window narrows further. The function that rebuilds intentionally comes out of this period stronger. The one that waits for perfect conditions rarely does.