Back to Blog

20 Things People Forget in Audits (Until It’s Too Late)

A practical list of 20 common audit blind spots, from hidden email chains to vendor contracts. Avoid the panic and get your checklist ready.

The worst moment in an audit isn't when the auditor finds a major fraud. It’s when they ask for something incredibly simple—like a signature on a policy from three years ago—and you realize it doesn't exist.

You did the work. You followed the rules. But you can't prove it.

I’ve seen confident teams crumble because they focused so hard on the complex "big picture" compliance that they missed the boring, administrative debris that actually trips you up. We often assume that because we do the right thing, the evidence will naturally be there. It rarely is.

Here is a list of 20 specific, often-missed items that have caused headaches for teams who thought they were 100% ready.

The "Obvious" Documentation (That Everyone Assumes Exists)

These are the things you shrug off because "of course we have that." Do you?

1. The "Read and Understood" Signatures

You have a great policy manual. You emailed it to everyone. But do you have a timestamped log showing that every single employee (including the CEO) clicked "I agree"? If you can't prove they read it, the policy effectively doesn't exist for the auditor.

2. Updated Organization Charts

Auditors use org charts to understand segregation of duties. If your chart shows "John" in IT but he moved to Finance six months ago, you’ve just flagged a potential conflict of interest before the audit even starts.

3. Meeting Minutes for "Routine" Decisions

You decided to change a vendor or update a risk threshold in a weekly standup. Great. Where is the record? "We talked about it" is not evidence. Simple bullet-point minutes save lives.

4. Job Descriptions Matching Actual Roles

If a user has admin access because they are a "System Administrator," but their HR job title is "Support Specialist," an auditor will flag this as excessive privilege.

The Digital Paper Trail

IT audits are brutal because computers don't lie, but they do hide things in deep logs.

5. Terminated Employee Access Logs

This is the classic failure. You fired someone on the 15th. Did their access cut off on the 15th, or did IT get the ticket on the 17th? That 48-hour gap is a "control failure."

6. Evidence of Backup Restoration

Everyone shows logs that backups ran. Auditors want to see a log proving you successfully restored a file from a backup in the last year. A backup you haven't tested is just a hope.

7. Exception Approvals

You have a policy that says "No USB drives." But the marketing team uses them. You verbally said "it's fine." Without a documented exception form signed by management, that "fine" is a "violation."

8. The "Shadow IT" Inventory

You listed all your servers. Did you list the random SaaS tool the sales team put on a corporate credit card? If it holds customer data, it's in scope.

Vendor and Third-Party Blind Spots

You are responsible for the risks your vendors introduce.

9. Signed Vendor Contracts (Not Just Drafts)

I’ve seen legal folders full of "Contract_v3_FINAL_revision.docx". The auditor wants the PDF with the wet signature or the DocuSign certificate. The draft means nothing.

10. Vendor Compliance Certificates

You use a cloud provider because they are SOC2 compliant. Great. Do you have a copy of their current report saved? Referencing their website isn't enough; you need to show you reviewed it.

11. The "Right to Audit" Clause

Does your contract actually say you can check their work? If an issue comes up and you can't investigate the vendor, you own the risk.

Process vs. Reality

This is where the human element breaks the checklist.

12. The "Workaround"

The procedure says "Manager approves PO, then Finance pays." In reality, Finance pays urgent bills and gets approval later. If the procedure doesn't match the practice, you fail—even if the practice is efficient.

13. Training Records for Contractors

You trained your employees. Did you train the temp agency staff who have the same system access?

14. Physical Security Logs

You have badge readers. But do you have a visitor log for the guy who came to fix the coffee machine? If he walked through the server room area, he needs to be on a list.

15. Asset Disposal Records

You threw away old laptops. Do you have the serial numbers and a certificate of destruction for the hard drives? "We smashed them with a hammer" is a good story, but a bad audit response.

The Nitty-Gritty Details

16. Version Control on Policies

Policy v1.0 was updated to v1.2. The header says v1.2, but the footer says v1.0. This sloppy versioning makes auditors question if any of your documents are accurate.

17. Disaster Recovery Call Trees

You have a DR plan. It lists phone numbers. Are those numbers current? If the VP of Engineering changed their number last year and nobody updated the doc, the control fails.

18. "Draft" Watermarks

Don't present final evidence that still has a "DRAFT" watermark on it. It looks unprofessional and suggests the document was never formally adopted.

19. Sample Selection Bias

When you self-audit, don't just pick the clean examples. If you only check the "easy" files, you’ll be blindsided when the auditor picks the messy, complicated project from Q3.

20. The "Why" Behind the Control

Staff can follow a checklist but not understand why they are doing it. If an auditor interviews an employee and asks "Why do you sign this?", and they say "I don't know, my boss makes me," that suggests a weak culture of compliance.

How to Stop Forgetting Things

The problem isn't that you don't know these things matter. The problem is that audits involve hundreds of these small details, and your brain can't hold them all. You need a system that is smarter than your memory.

This is where the Audit Checklist Creator helps. Instead of staring at a blank spreadsheet, you can input your specific scenario—like "internal audit for IT access controls" or "vendor risk management review"—and it generates a structured checklist for you.

For example, if you tell it you are doing a "Terminated Employee Access Review," it won't just say "Check access." It will break it down:

  • Verify HR termination date matches IT ticket date.
  • Check Active Directory disable timestamp.
  • Verify SaaS account revocation (Slack, Zoom, Salesforce).
  • Confirm building badge deactivation.
  • Check return of physical assets.

It turns a vague anxiety ("Did we miss something?") into a tangible list you can cross off.

When a Checklist Won't Help

While a checklist captures the what, it can't fix the who.

If your organization has a culture where people are afraid to report mistakes, no checklist will save you. People will hide the evidence, backdate signatures (which auditors can detect, by the way), or create fake paper trails.

An audit is fundamentally a test of trust. If your team treats it like a "gotcha" game, you will eventually lose. The goal of finding these missing items isn't to trick the auditor—it's to prove that your business is actually under control.

FAQ

How far back do I need to look for evidence?
Standard practice is usually the last 12 months, or since the last audit. However, for "permanent" things like contracts or policies, they need to be valid now, regardless of when they were signed.

What if I find a gap right before the auditor arrives?
Don't hide it. Document it, open a remediation ticket, and show the auditor the plan. "We found this gap last week and here is our plan to fix it by Tuesday" is a passing grade. "We hope you don't find this" is a failing grade.

Does "signing" a document need to be a physical signature?
Not usually. Electronic signatures (DocuSign, etc.) or even email approvals ("I approve the attached PDF") are generally accepted, as long as the email chain is preserved intact.

Conclusion

Panic during an audit comes from the unknown. It comes from the nagging fear that there is a folder somewhere with an unsigned contract or a server with a default password.

You can't eliminate every risk, but you can eliminate the "stupid" mistakes. Go through this list. Check the visitor logs. Verify the backup restorations. Hunt down those missing signatures. When the auditor asks for them, and you hand them over within 5 minutes, you build a level of trust that makes the rest of the audit go much smoother.

Preparation isn't just about passing; it's about sleeping well the night before.