Your CFO walks into your office 14 months before your planned IPO:
"We need 12 months of quarterly SOX access reviews starting next quarter. Our Big 4 auditors won't issue an opinion without it. That means four complete review cycles with audit-ready evidence. No gaps."
You've never run SOX-compliant access reviews. You ask what they need to see.
"Everything. Who reviewed every user's access to every financial system. When they reviewed it. What they decided. Proof that revocations actually happened. Management sign-off. Quarterly. For a year. Starting in 30 days."
The IPO timeline just became your deadline for building enterprise-grade access governance from scratch.
Table of Contents
- The Excel Problem That Fails Pre-IPO Audits
- Why SOX Requires Quarterly Reviews
- The Three Things Big 4 Auditors Actually Test
- The Real Problem: Governance Before Visibility
- How Visibility-First Changes the SOX Approach
- The Pre-IPO Evidence Collection Period
- What Happens When You Miss a Quarter Post-IPO
- The Three Requirements Pre-IPO Companies Underestimate
- Implementation Timeline: 30 Days to First Review
- Getting Started With SOX-Compliant Access Reviews
The Excel Problem That Fails Pre-IPO Audits
A compliance consulting firm walks IT teams through pre-IPO readiness every quarter. They see the same pattern:
"Currently we track reviews in Excel. We export user lists from each system, email them to managers, they reply with approvals, we create Jira tickets for revocations. We timestamp everything in a master spreadsheet."
The consultant asks:
"Can you prove to auditors that the complete set of users was reviewed? How do you know the export was accurate on the day you ran it? What if someone was added between export and review? How do you show managers actually saw all the data before approving?"
The Excel approach breaks down under Big 4 scrutiny. Auditors ask for system-generated logs, not manually assembled evidence. They want decision timestamps tied to specific reviewer identities. They test whether remediations actually occurred by comparing before/after system states.
Manual processes can't satisfy these requirements at scale. Public companies with 20+ financial applications, thousands of employees, and quarterly review mandates need automated workflows with immutable audit trails.
The evidence quality bar is higher than most companies expect. Excel files with manager email replies don't satisfy Big 4 auditors. You need immutable logs with timestamps, digital signatures, and before/after system states that can't be modified retroactively.
Why SOX Requires Quarterly Reviews
SOX doesn't explicitly mandate "quarterly access reviews" anywhere in the statute. Section 404 requires effective controls over financial reporting. Section 302 makes CEOs and CFOs personally certify those controls work.
The quarterly frequency comes from control framework logic. Public companies report earnings quarterly through 10-Q filings. If you only review access annually but report financials four times per year, your control frequency doesn't match your reporting frequency. Auditors flag this mismatch immediately.
Some companies try arguing for semi-annual reviews. Big 4 firms push back unless you have continuous monitoring systems that effectively provide quarterly-or-better validation. Even with compensating controls, quarterly remains the standard expectation.
The consequence of missing a quarter post-IPO isn't just an internal finding. It's a control deficiency disclosed in your next 10-Q filing. Investors read those disclosures. Stock prices typically drop 2-5% on material weakness announcements.
The Three Things Big 4 Auditors Actually Test
Complete Financial System Coverage
Your auditors sample 25-40 users per quarter and trace each one through your complete access review process. They're testing whether you reviewed ALL users with access to financial systems—not just convenient ones.
Financial systems include the obvious: ERP, general ledger, accounts payable.
And the less obvious: Database servers hosting financial data, Active Directory groups controlling access, cloud infrastructure running financial applications, service accounts with automated access to financial systems.
Miss the database admins who have direct SQL access to your general ledger? That's a finding.
A healthcare company preparing for IPO discovered this gap during their practice audit: "We reviewed our NetSuite ERP users quarterly. But we had 18 people with direct database access who never appeared in reviews. Our auditor flagged it immediately—these DBAs could modify financial data bypassing application controls."
The question auditors ask: "How did you determine this is the complete list of SOX-scoped systems?" You need a documented scoping methodology showing how you traced financial data flows from origin to general ledger.
Timely Remediation with Proof
Finding violations isn't enough. You must fix them within the quarter.
Auditors test operating effectiveness. Controls don't just exist—they actually work.
Your Q2 review identified 47 access violations in April. Auditors verify all 47 were actually remediated by June 30. They request before/after evidence proving changes occurred. Violations lingering 60+ days after discovery become "control is not operating effectively" findings.
A banking institution ran into this during their PwC audit: "Our quarterly reviews identified access issues consistently. But remediation tickets sat in the IT backlog for months. When auditors tested Q2 in November, half the violations still existed. That became a significant deficiency requiring public disclosure."
The typical failure pattern: Reviews identify issues. IT creates Jira tickets. Tickets sit in the backlog. Nobody tracks completion. Auditors discover gaps months later during testing.
Management Attestation (Not Just IT Execution)
SOX requires management involvement, not just operational compliance by IT. Each review needs three levels of attestation:
Reviewers (managers, app owners) attest: "I reviewed all assigned access and confirmed appropriateness."
IT attests: "All approved remediations were executed as documented."
Management (VP/C-level) attests: "Access review for Q[X] was completed per SOX procedures. Results were reviewed. The process is operating effectively."
These aren't rubber stamps. Auditors interview signatories and test whether attestations are genuine. The VP who signed off can't explain what was reviewed or what violations were found? That's evidence of ineffective oversight.
The Real Problem: Governance Before Visibility
Traditional IGA platforms tell you to implement access reviews. But they assume you already know who has access to what.
For companies that grew fast and accumulated hundreds of applications organically, that assumption breaks down completely.
Your auditor asks a simple question: "Show me everyone with access to financial data."
You provide your ERP user list—847 users, all reviewed quarterly, evidence documented.
"What about database administrators with direct SQL access to the general ledger? What about the cloud infrastructure team with production server access? What about service accounts with automated access to financial systems?"
You check. 23 DBAs have direct database access—they can query and modify financial data without touching the ERP. 8 DevOps engineers have production server access—they can access database files directly. 14 service accounts have API access to financial systems—automated processes moving financial data between systems.
None appeared in your access reviews. Your reviews covered ERP application users. They missed everyone else with access to the same financial data through different paths.
A financial firm managing 200+ SaaS applications explained their challenge: "We spend over a week consolidating reports and validating everything. It's more than 30 days every quarter."
Another healthcare organization running 60 applications described similar pain: "Thirty-two of our apps aren't behind proper SSO. These are critical, regulated applications requiring more attention. We have to manually export lists, upload to databases, and manipulate data. It's all manually managed."
The pattern repeats across pre-IPO companies. You can't review access you don't know exists. Manual discovery processes miss applications purchased by finance teams, shadow IT deployed by engineering, database access outside application controls, service accounts created for integrations.
The Service Account Blind Spot
Your auditor asks for your complete user list for SOX-scoped systems. You provide employee accounts—reviewed quarterly, evidence documented.
"What about service accounts?"
You check. Your financial systems have 31 service accounts—integration credentials connecting your ERP to payroll, automation accounts running month-end close processes, batch processing accounts for bank reconciliation.
You can identify owners for 12 of them. The other 19 were created by former employees for projects nobody remembers. They have elevated privileges. They access financial data. They've never appeared in an access review.
Service accounts represent significant SOX risk because they typically have elevated privileges, long-lived credentials, no MFA protection, and no employment status to trigger offboarding. When the engineer who created an integration account leaves, the account persists indefinitely—ungoverned, unmonitored, unreviewed.
Auditors specifically test whether service accounts are included in SOX reviews. They're often the gap that creates findings.
How Visibility-First User Access Review Changes the SOX Approach
We built Zluri around a simple principle: Discovery first, governance second.
Multiple discovery methods find every application—SSO-integrated tools, direct integrations, browser extensions, desktop agents, expense data, contract management systems, HR systems, and more. This matters for SOX because auditors test completeness: "How do you know you reviewed all financial systems?"
Your answer can't be "we reviewed the systems we knew about."
It needs to be "we used systematic discovery to find all applications, identified which ones are in SOX scope based on data flow analysis, and reviewed 100% of those systems with documented evidence."
Once you have complete visibility, access reviews become straightforward:
Automated reviewer assignment routes work to appropriate independent reviewers. Managers review their teams. App owners review privileged access. Finance reviews SOX-scoped systems. Fallback reviewers handle coverage gaps when primaries are unavailable.
Contextual review data shows last login dates, assigned roles, license types, department, employment status. Reviewers spot dormant accounts (no login in 90+ days) and over-privileged access (admin rights for standard users) immediately.
Bulk actions let reviewers approve 200 standard users in seconds. Focus manual review on the 15 users flagged as high-risk or dormant.
Closed-loop remediation executes approved revocations via API within minutes. Before/after evidence gets captured automatically. No Jira tickets sitting incomplete for weeks.
Immutable audit trail logs every decision with reviewer identity, timestamp, business justification. System-generated logs can't be modified retroactively the way Excel spreadsheets can.
The difference becomes stark when auditors request evidence for Q2 during Q4 interim testing.
Manual process: "We'll compile that and send it next week."
Automated process: Export complete evidence package within minutes.
The Pre-IPO Evidence Collection Period
Most companies underestimate the timeline. You can't compress the 12-month evidence collection period. You either have four quarters of clean evidence or you don't.
Smart companies start SOX preparation 24 months before planned IPO:
Months 1-6: Gap assessment, policy development, technology implementation. This is when you select your access governance platform. Manual spreadsheet processes won't satisfy Big 4 auditors for public companies—they need system-generated audit trails that can't be modified retroactively.
Months 7-18: The 12-month evidence collection period. Q1 review launches—this is when the audit clock officially starts. Any gaps here delay your IPO. Q2 demonstrates consistency. Q3 establishes a pattern. Q4 completes the year. Auditors heavily test Q4 and typically sample from all four quarters.
Months 19-24: External auditor testing, remediation of findings, clean SOX 404(b) attestation, S-1 filing, IPO.
Companies that wait until 12 months before IPO to start building SOX controls end up delaying their public offering. There's no shortcut for the evidence timeline. None.
A compliance advisor working with pre-IPO companies explained the common mistake: "Teams think they can implement access reviews six months before IPO and backfill evidence. Auditors want to see the actual control operating over time, not reconstructed documentation. We've seen companies delay IPOs by six months because they started evidence collection too late."
What Happens When You Miss a Quarter Post-IPO
Pre-IPO, you miss a quarter and can remediate before the auditors test. Post-IPO, missed quarters must be disclosed publicly.
March 15. Your Q1 access review should have launched January 2. It didn't—IT was focused on a system migration. By the time anyone noticed, Q1 was over.
Your options: Disclose the control deficiency in your 10-Q filing, or conduct an immediate comprehensive review and document why the standard process didn't execute. Either way, your audit committee needs to know. Your auditors will increase testing scope. Your stock may drop on the disclosure.
Here's how the consequences cascade:
Immediate impact: Control deficiency reported to the audit committee. Must be disclosed in 10-Q filing under "Controls and Procedures." Stock typically drops 2-5% on control deficiency disclosures.
Auditor response: Increase testing scope for Q4. Additional audit fees ($50K-$150K). May impact year-end audit opinion if not remediated.
Remediation path: Conduct immediate comprehensive review. Document root cause and corrective action. Demonstrate sustained improvement for 2-3 quarters before deficiency can be closed.
Don't let this happen. Automate scheduling. Build redundancy. Treat quarterly reviews as non-negotiable P1 work.
The Three Requirements Pre-IPO Companies Underestimate
We've worked with dozens of pre-IPO companies implementing SOX-compliant access reviews. The same three requirements cause delays and findings consistently:
1. The Completeness Requirement
"We'll review our main financial systems" doesn't work. Auditors test whether you included database servers, cloud infrastructure, service accounts, and identity providers—everyone with access to financial data, not just application users.
Systematic discovery prevents scope gaps. You need to find all applications first, trace financial data flows, identify everyone with access through any path, then review 100% of that scope with documented evidence.
2. The Remediation Timeline
Finding violations is easy. Executing revocations across 30+ applications within the quarter is hard.
The typical failure: Reviews identify 47 violations in April. IT creates Jira tickets. Tickets sit in backlog behind feature work and incident response. By June 30, half remain unresolved. Auditors test in November and find Q2 remediations incomplete.
Closed-loop automation is the only way to meet quarterly deadlines consistently. Approved revocations execute immediately via API. Before/after evidence captures automatically. No tickets sitting incomplete for weeks.
3. The Evidence Quality Bar
Excel files with manager email replies don't satisfy Big 4 auditors. They need:
- System-generated logs (not manually compiled spreadsheets)
- Immutable audit trails (can't be modified retroactively)
- Timestamped decisions tied to specific reviewer identities
- Before/after system states proving remediations occurred
- Digital signatures for management attestations
When you hand auditors evidence exports with these characteristics, their testing goes faster and findings decrease. When you hand them compiled spreadsheets and forwarded emails, they increase testing scope and scrutiny.
Implementation Timeline: 30 Days to First Review
Traditional enterprise IGA platforms cost $500K-$1M+ and take 6-12 months to implement. For pre-IPO companies on tight timelines, that's too slow.
A compliance advisor working on SOX implementations explained the standard timeline problem: "Clients ask us about access reviews when they're 14 months from IPO. If we tell them SailPoint takes nine months to deploy, they're already behind schedule. They need something that works in weeks, not quarters."
We deploy in 30 days:
Week 1—Discovery: Connect to identity providers, HR systems, and finance tools. Multiple discovery methods find all applications including shadow IT and direct database access. Initial sync completes with baseline application inventory.
Week 2—Scoping: Define SOX financial systems based on data flow analysis. Identify all access paths to financial data—applications, databases, infrastructure, service accounts. Configure risk classification and review frequency.
Week 3—Configuration: Set up reviewer assignments for each SOX-scoped system. Managers review their teams. App owners review privileged access. Security reviews high-risk access. Designate fallback reviewers for coverage gaps.
Week 4—Pilot & Production: Execute first pilot review for 2-3 high-priority systems. Generate evidence package. Internal audit reviews for gaps. Production rollout—all SOX-scoped systems enter quarterly schedule with automated workflows.
This compressed timeline matters because you need 12 months of evidence. Starting discovery in Month 1 means Q1 review can launch by Month 2, giving you the full year of documented controls before IPO.
Getting Started With SOX-Compliant Access Reviews
SOX compliance protects your IPO timeline, your executives' personal liability, and your public company reputation. Quarterly access reviews with complete discovery, independent workflows, and audit-ready evidence are what gets you there.
What You Need for SOX-Compliant Access Reviews
Complete scope discovery through multiple methods ensures you find all systems with access to financial data—not just ERP applications, but database servers, cloud infrastructure, service accounts, and identity providers. You prove complete coverage to auditors with systematic discovery documentation.
Quarterly scheduling launches SOX-scoped reviews automatically. January Q1, April Q2, July Q3, October Q4. Reviews launch on time every quarter with automated reminders and escalation workflows. No risk of missing a quarter because someone forgot to initiate the review.
Independent reviewer workflows route work to appropriate reviewers automatically. Managers review their teams' access. Application owners review privileged access. Security reviews high-risk access. IT orchestrates but doesn't make all decisions—proper segregation of duties.
Contextual review data shows reviewers everything they need to make informed decisions: last login date, assigned role, department, employment status, license type. Dormant accounts and over-privileged access get flagged automatically.
Closed-loop remediation executes approved revocations automatically via API where supported. For applications without APIs, automated tickets route to app owners with all context. Before/after evidence captures automatically. Remediation completes within minutes or hours, not weeks.
Immutable audit trail logs every review decision with timestamp and reviewer identity. System-generated logs can't be modified after the fact. Auditors export complete evidence packages showing who reviewed what, when decisions were made, and what actions were taken.
Management attestation workflows capture required sign-offs at each level—reviewers, IT, and management. Digital signatures prove attestations are genuine. Auditors can verify the complete approval chain.
Evidence export for auditors generates SOX compliance evidence packages on-demand. Complete with reviewer assignments, individual decisions, remediation logs, before/after proof, and sign-off documentation. Formatted for Big 4 audit procedures.
Your quarterly reviews will reveal patterns—orphaned accounts from incomplete offboarding, over-provisioned new hires, contractor access persisting beyond engagement dates, service accounts with unclear ownership. These point to upstream provisioning and lifecycle management opportunities.
But first, get the quarterly SOX evidence that unblocks your IPO.
See SOX-compliant access reviews → Book Demo
See self-serve demo → Check Access Reviews Product Tours
Frequently Asked Questions
What is SOX compliance and who does it apply to?
SOX (Sarbanes-Oxley Act) applies to all publicly traded companies in the United States. Section 404 requires effective internal controls over financial reporting. Section 302 makes CEOs and CFOs personally certify those controls work. Pre-IPO companies must demonstrate SOX compliance before going public.
Why are quarterly access reviews required for SOX?
SOX doesn't explicitly mandate quarterly reviews, but control framework logic requires it. Public companies report earnings quarterly through 10-Q filings. If you review access annually but report financials quarterly, your control frequency doesn't match your reporting frequency. Big 4 auditors flag this mismatch and expect quarterly reviews as standard practice.
What systems are in scope for SOX access reviews?
Any system that stores, processes, or transmits financial data. This includes ERP and general ledger applications, but also database servers hosting financial data, cloud infrastructure running financial applications, Active Directory groups controlling access, and service accounts with automated access to financial systems.
What evidence do Big 4 auditors require?
Auditors require system-generated logs (not manually compiled spreadsheets), immutable audit trails that can't be modified retroactively, timestamped decisions tied to specific reviewer identities, before/after system states proving remediations occurred, and digital signatures for management attestations.
What happens if we miss a quarterly review post-IPO?
Missed quarters must be disclosed publicly in your 10-Q filing under "Controls and Procedures." Stock prices typically drop 2-5% on control deficiency disclosures. Auditors will increase testing scope and may charge additional fees ($50K-$150K). The deficiency must be remediated and sustained improvement demonstrated for 2-3 quarters before it can be closed.
How long before IPO should we start SOX preparation?
Smart companies start 24 months before planned IPO. Months 1-6 for gap assessment, policy development, and technology implementation. Months 7-18 for the 12-month evidence collection period (four complete quarterly review cycles). Months 19-24 for external auditor testing, remediation, and S-1 filing.
What's the difference between SOX 404(a) and 404(b)?
Section 404(a) requires management to assess and report on internal control effectiveness. Section 404(b) requires external auditor attestation of those controls. Emerging growth companies may be exempt from 404(b) initially, but most pre-IPO companies pursuing institutional investment implement both.
Do service accounts need to be included in SOX reviews?
Yes. Service accounts with access to financial systems must be reviewed quarterly like human accounts. Auditors specifically test for this gap. Service accounts often have elevated privileges and persist after their creators leave the company, making them significant SOX risk.
Can we use Excel for SOX access reviews?
Excel-based processes typically fail Big 4 auditor scrutiny for public companies. Auditors want system-generated logs that can't be modified retroactively, timestamped decisions tied to reviewer identities, and before/after proof of remediations. Manual spreadsheet compilation can't provide these evidence characteristics at scale.
How long does implementation take?
Traditional enterprise IGA platforms take 6-12 months. We deploy in 30 days through phased discovery, scoping, configuration, and pilot review. This compressed timeline matters because you need 12 months of quarterly evidence before IPO—the faster you start generating evidence, the sooner your audit clock begins.
What if we're already behind on our IPO timeline?
If you're less than 18 months from planned IPO and haven't started SOX preparation, you may need to delay your public offering. The 12-month evidence collection period cannot be compressed—auditors want to see four complete quarterly review cycles demonstrating sustained control operation. Start immediately to minimize delay.
How do auditors test access review effectiveness?Auditors sample 25-40 users per quarter and trace each through your complete review process. They verify the user appeared in the review scope, was reviewed by an appropriate independent reviewer, had a documented decision with timestamp and justification, and any required remediation was executed with before/after proof.



.png)












