Assurance vs. Governance: Setting Up 2nd-Line Oversight

コメント · 38 ビュー

Most of the time, the problem is not intent.

In many organizations, everyone says “governance is in place”—yet issues slip through, audits hurt, and leaders are still surprised by failures.

Most of the time, the problem is not intent. It’s confusion between Governance and Assurance, and a weak or symbolic second line of defense.

This article unpacks the difference and shows how to design practical 2nd-line oversight that actually works.

  1. Governance vs. Assurance – Clear, Simple Definitions

Let’s strip the jargon.

1.1 What is Governance?

Governance is how leadership:

  • Sets direction
  • Defines policies, principles, and risk appetite
  • Allocates decision rights and accountability
  • Oversees whether the organization is on track

In short:

Governance = “How we decide what’s acceptable, who is accountable, and how we steer the ship.”

Examples:

  • Approving an enterprise risk appetite
  • Defining a project governance framework (steering committees, stage gates, escalation)
  • Approving policies (security, finance, quality) and expecting adherence
  • Reviewing performance dashboards, risk reports, and audit outcomes

Governance is owned by the Board / Executive / senior leadership, and deployed through committees, policies, and frameworks.

1.2 What is Assurance?

Assurance is about evidence.

Assurance = “How we gain confidence that what should be happening is actually happening.”

Assurance asks:

  • Are policies being followed in reality?
  • Are controls designed well and working as intended?
  • Are we managing key risks within agreed appetite?
  • Is reported performance accurate and complete?

Assurance is typically provided by:

  • 2nd line: Risk, Compliance, Information Security, Quality, PMO, etc.
  • 3rd line: Internal Audit, external auditors.

Governance sets the expectations.
Assurance checks the truth and reports back.

  1. Three Lines of Defense – Where 2nd Line Sits

To design 2nd-line oversight properly, you need a shared mental model. The Three Lines of Defense model is the most widely used.

2.1 First Line – “Doing the Work”

  • Business units, operations, delivery teams, IT, project teams
  • Own and manage risks in their day-to-day activities
  • Implement controls, follow policies, operate processes

Ownership:

“We own the risk and the outcome.”

2.2 Second Line – “Oversight Challenge”

  • Risk Management, Compliance, Information Security, Quality, PMO, Data Privacy, etc.
  • Develop policies, frameworks, standards, and methodologies
  • Provide guidance, training, tools, and monitoring
  • Challenge and escalate where the first line is outside appetite or non-compliant

Ownership:

“We design the guardrails and check that you’re staying within them.”

2.3 Third Line – “Independent Assurance”

  • Internal Audit, sometimes external audit
  • Provides independent, objective assurance to the Board
コメント