We specialize in compliance consultancy, due diligence, and audit services to help businesses meet regulatory standards with confidence. Our experienced team provides tailored solutions to identify and manage risks, ensuring you operate responsibly and securely in today’s complex landscape. We are committed to integrity, excellence, and empowering our clients with the insights they need for sustainable growth.
Copyright © COMPLIPAL all rights reserved.
Internal audit for AML controls that holds up
A regulator rarely asks for your AML policy because they are curious about the wording. They ask because they want to know whether your controls actually work – on a real file, on a real day, under real pressure. That is exactly why internal audit for aml controls matters. Done well, it is not a ceremonial review of documents. It is a disciplined test of whether your governance, risk assessment, due diligence, monitoring, and reporting would stand up to scrutiny when outcomes and accountability are on the line.
What internal audit for AML controls is really for
An AML programme can look polished while still failing in the places that create regulatory exposure: inconsistent risk ratings, weak evidence for source of funds, monitoring that does not reflect the business model, or SAR/STR decisions that cannot be explained later. Internal audit exists to surface these gaps early and to do it in a way that executives can act on.
At its best, an AML internal audit gives you three things: an independent view of control design, assurance that controls operate as intended, and a prioritised plan to raise compliance maturity without grinding the business to a halt. The trade-off is that meaningful testing can be disruptive if it is not scoped properly. A good audit respects operational realities while still being unapologetically evidence-led.
Where audits go wrong: common pitfalls that weaken assurance
Most issues we see are not caused by a lack of effort. They are caused by a mismatch between what the organisation thinks it is doing and what actually happens.
One common pitfall is treating the audit as a policy check. A beautifully drafted procedure does not compensate for incomplete files, unclear rationales, or staff workarounds. Another is sampling that is too small or too “clean” – for example, focusing only on straightforward retail clients while avoiding higher-risk corporate structures or cross-border exposure. A third is confusing activity with effectiveness. Lots of alerts, lots of EDD requests, lots of training completions can still coexist with poor risk decisions and weak governance.
The result is a report that feels reassuring but does not reduce regulatory risk. If you want your internal audit to be defensible, you need to test controls as they are experienced by front-line staff and as they appear in the audit trail.
Scoping an AML controls audit: start with your real risk profile
Scoping should follow risk, not calendar convenience. If you operate in a higher-risk sector (payments, fintech onboarding, corporate services, gaming, or any model with intermediaries and non-face-to-face relationships), your audit plan needs to reflect that. The same applies if you have had rapid growth, new products, new markets, or a change in onboarding channels.
A practical way to set scope is to anchor it to your Business Risk Assessment (BRA) and the parts of your control framework that should be doing the most work. If your BRA says you have meaningful exposure to complex ownership structures, for example, then your audit should spend time on UBO identification, verification, and the rationale for accepting residual risk.
It also depends on your maturity. If you are building a programme, a design-focused review may be appropriate first. If you have been operating for years, regulators will expect evidence of operational effectiveness and a credible second line that challenges decisions.
The controls that deserve the closest testing
An AML programme is a chain. Weakness at any link can undermine the whole.
Client risk assessment is usually the best place to start because it drives everything else: the depth of CDD, the monitoring scenario choice, and the frequency of review. Auditors should test whether risk ratings reflect documented facts, whether overrides are controlled, and whether the rationale would make sense to an external reviewer. If two similar clients are rated differently, can you explain why?
CDD and EDD file testing should go beyond “is the document present?” and into “is the evidence sufficient for the risk?” Source of funds and source of wealth are frequent failure points, especially where staff accept generic explanations without corroboration. The audit trail should show what was assessed, what was concluded, and why that conclusion was reasonable.
Ongoing monitoring is another area where firms can look busy while missing risk. A meaningful audit tests whether monitoring coverage matches the products and customer behaviour you actually see. It reviews alert quality, investigation standards, escalation thresholds, and how quickly you act. It also checks whether monitoring outcomes feed back into risk ratings and account reviews, rather than sitting in isolation.
Suspicious transaction reporting (STR/SAR) processes should be tested for governance and defensibility. Auditors are not there to second-guess every MLRO judgement, but they should test whether decisions are timely, documented, and made against a clear internal standard. A weak narrative or an undocumented decision not to report is difficult to defend.
Finally, do not neglect sanctions screening and PEP management. These are often treated as a technology problem. Internal audit should verify data quality, tuning decisions, false positive handling, and evidence that backlogs and exceptions are controlled.
How to run testing that produces credible findings
Effective internal audit for aml controls uses a combination of walkthroughs, sampling, and control re-performance. Walkthroughs reveal where procedures are misunderstood or bypassed. Sampling shows whether execution is consistent. Re-performance shows whether a control would catch what it claims to catch.
File sampling should reflect your risk profile. If you only sample low-risk cases, you will miss where judgement is most needed. A balanced sample typically includes high-risk files, complex legal persons, cross-border exposure, and cases with risk overrides or delayed CDD. Where the business is large, stratified sampling is usually more defensible than purely random selection.
Testing should also include management information (MI) and governance evidence. If you claim your second line monitors onboarding quality, your audit should check what is reported, how issues are tracked, and whether recurring themes are addressed. Minutes, action logs, and escalation records matter because they show accountability, not just intention.
A word on technology: automated controls are not automatically reliable. Audit testing should confirm how rules are configured, who can change them, and how changes are approved and documented. If key controls sit with a vendor, that does not remove your responsibility to evidence oversight.
Reporting that executives can act on (and regulators respect)
A strong audit report does not drown stakeholders in observations. It explains what the issue is, why it matters, where it sits in the control framework, and what should change.
Findings should distinguish between design gaps (the control is missing or inadequate), operating gaps (the control exists but is not followed), and governance gaps (the organisation cannot show it is managing the risk). This distinction matters because remediation is different in each case. Training will not fix a design gap. A new procedure will not fix a culture of undocumented overrides.
Recommendations should be actionable and proportionate. Regulators expect improvement, but they also expect realism. If a recommendation would materially slow onboarding, the report should state the operational impact and propose options – for example, tightening triggers for EDD, improving evidence standards for higher-risk segments, or automating parts of the workflow so quality does not depend on memory.
Turning audit into continuous improvement
Internal audit creates value when it changes behaviour, not when it creates a folder of reports. That means clear ownership of actions, deadlines that reflect risk, and follow-up testing.
A useful discipline is to link remediation to the risk decisions your business makes. If you accept higher-risk clients, your controls need to show higher certainty and better evidence. If you want faster onboarding, your controls need to be more standardised and less dependent on individual judgement. Audit helps you make these trade-offs explicitly and document why your approach is defensible.
It also helps to treat regulatory change as a standing agenda item. Requirements evolve, supervisory expectations shift, and typologies change. Your audit plan should be refreshed accordingly, particularly in sectors with rapid product innovation or third-party reliance.
When an independent partner makes sense
Some organisations have internal audit coverage but need deeper AML specialism, sector context, or additional capacity during periods of change. Others want an independent view ahead of a regulatory inspection, a licence application, or a remediation deadline.
Where external support is appropriate, it should still feel integrated with your governance. The goal is not to outsource accountability. The goal is to get clear, evidence-based findings and practical remediation steps that your teams can implement without guesswork. If you need that kind of AML-focused internal audit support, Complipal works as a long-term partner, translating regulatory expectations into control improvements that are realistic, measurable, and defensible.
A closing thought
The most useful internal audit outcome is confidence you can explain your decisions – why you onboarded, why you rated the risk the way you did, why you monitored the way you did, and what you did when something looked wrong. If you can evidence those answers consistently, you are not just prepared for the next review. You are building the kind of operational integrity that protects reputation and supports sustainable growth.
Recent Post
How to Conduct Source of Funds Checks
March 22, 2026AML Risk Assessment Methodology Explained
March 20, 2026AML Risk Assessment Methodology Guide
March 18, 2026Categories