COSO ERM Framework Explained: The 5 Components and 20 Principles
Table of Contents
Most ERM programs die on the shelf. A framework document gets written, the board approves it, someone files it under “governance,” and nothing changes operationally. COSO ERM 2017 doesn’t have to end up that way — but only if you understand what it’s actually asking you to do.
Here’s a plain-language breakdown of all 20 principles, how they connect, and what operationalizing them actually looks like.
TL;DR
- COSO ERM 2017 (“Enterprise Risk Management — Integrating with Strategy and Performance”) has 5 components and 20 principles
- The defining shift from the 2004 version: risk management is integrated into strategy-setting, not bolted on after the fact
- The 20 principles are distributed: 5 (Governance), 4 (Strategy), 5 (Performance), 3 (Review), 3 (Reporting)
- The framework fails in practice when it becomes a documentation exercise — implementation requires role clarity, risk appetite quantification, and consistent board engagement
Why COSO ERM Was Rewritten in 2017
The original COSO ERM framework was issued in 2004. It introduced a widely adopted “cube” visualization of eight components and was influential in shaping how organizations approached enterprise risk.
But by the mid-2010s, a pattern was clear: organizations were treating ERM as a compliance exercise, building elaborate risk registers that didn’t influence actual decisions. The COSO ERM 2017 revision directly addressed this by:
-
Elevating the link between risk and strategy. The new framework title — “Integrating with Strategy and Performance” — signals the intent. Risk management isn’t a separate function that reviews decisions; it’s woven into how decisions are made.
-
Reducing the component count from eight to five. The 2004 framework’s eight components (Objective Setting, Event Identification, Risk Assessment, Risk Response, Control Activities, Information & Communication, Monitoring, Internal Environment) were reorganized into a more intuitive five-component flow.
-
Adding explicit culture and governance emphasis. The 2017 update made Governance and Culture its own component, acknowledging that no set of processes works if the underlying behaviors and board engagement aren’t there.
The Architecture: 5 Components, 20 Principles
The COSO ERM 2017 framework is organized as a helix (not a cube) to convey that ERM is a continuous, iterative process — not a static control environment.
| Component | Principles | Core Question |
|---|---|---|
| Governance and Culture | 1–5 | Are the right people accountable for risk, and does the organization’s culture support honest risk discussion? |
| Strategy and Objective-Setting | 6–9 | Is risk considered when setting strategy, and is risk appetite clearly defined? |
| Performance | 10–14 | Are risks identified, assessed, prioritized, and responded to systematically? |
| Review and Revision | 15–17 | Is the ERM program itself monitored and improved over time? |
| Information, Communication, and Reporting | 18–20 | Does risk information reach the right people at the right time? |
Component 1: Governance and Culture (Principles 1–5)
Governance and Culture is the foundation. No matter how sophisticated your risk identification and assessment processes are, they fail if the governance structure is broken or the culture doesn’t support transparent risk reporting.
Principle 1: Exercises Board Risk Oversight
The board provides oversight of the organization’s strategy and carries out governance responsibilities to support risk management. This means the board actively participates in defining what risks are acceptable — not just receives management’s risk reports.
In practice: The board (or a dedicated risk committee) should review and approve the risk appetite statement, receive a regular risk report with metrics, and be engaged when the risk profile changes materially. At most mid-sized financial institutions, this translates to quarterly risk committee meetings with standing risk reporting.
Principle 2: Establishes Operating Structures
The organization establishes appropriate operating structures to pursue strategy and manage risk. This includes defining lines of accountability for risk ownership — who owns which risks, how escalation works, and how the Three Lines of Defense model operates.
In practice: A well-documented RACI for risk management isn’t bureaucracy — it’s how you prevent accountability gaps. “Everyone is responsible for risk” means no one is. Assign risk domain owners (credit risk → CFO, cyber risk → CISO, compliance risk → CCO) and make those assignments formal.
Principle 3: Defines Desired Culture
The organization defines the behaviors that characterize its desired risk culture. This goes beyond “risk is everyone’s responsibility” — it specifies what good risk behavior looks like and how it’s reinforced.
In practice: Leaders model the behaviors they want. If management responds to bad news with blame rather than problem-solving, people stop escalating issues — which means risk accumulates silently until it becomes a crisis. Culture definition should be reflected in performance management, not just policy documents.
Principle 4: Demonstrates Commitment to Core Values
The organization demonstrates commitment to its core values, particularly when those values create tension with short-term performance pressures.
In practice: This is where many ERM programs break down under business pressure. The risk management function needs organizational authority — reporting line, escalation access, documented mandate — to push back when business units want to take on risk that exceeds defined appetite.
Principle 5: Attracts, Develops, and Retains Capable Individuals
The organization builds human capital aligned with its strategy and risk management needs. Risk management requires skilled people — not just a role title.
In practice: At fintechs and growth-stage companies, this principle gets violated most often when risk management is treated as a compliance checkbox rather than a core function. Understaffed, undertrained risk teams produce paper frameworks that don’t work. Investing in risk talent before the exam — not after the finding — is the practical implication.
Component 2: Strategy and Objective-Setting (Principles 6–9)
This component is the most distinctive feature of the 2017 revision. COSO explicitly connects risk management to strategic planning — risk isn’t analyzed after strategy is set, it’s integrated into the strategy-setting process itself.
Principle 6: Analyzes Business Context
The organization considers potential effects of the external and internal environment when setting strategy and objectives. This includes macroeconomic conditions, competitive dynamics, regulatory environment, and technology changes.
In practice: For financial services, this means incorporating regulatory trends (new OCC guidance, state AG enforcement patterns) into strategic planning — not just operational planning. If your strategic plan assumes a stable regulatory environment and that assumption turns out to be wrong, your risk profile is already off.
Principle 7: Defines Risk Appetite
The organization defines risk appetite as part of the strategy-setting process. Risk appetite is the broad statement of how much risk the organization is willing to accept in pursuit of its strategy.
This principle is critical — and often poorly executed. Common failure modes:
- Risk appetite that’s aspirational but unmeasurable (“We maintain a conservative risk posture”)
- Risk appetite set by the risk function without board approval
- Risk appetite that exists in a document but doesn’t connect to operational limits or KRI thresholds
What good risk appetite looks like: quantified by risk category (e.g., “credit loss ratio not to exceed X% of portfolio,” “regulatory findings: zero material findings in any calendar year,” “operational loss events: aggregate annual loss not to exceed $Y”), board-approved, and directly linked to the KRI monitoring system.
Principle 8: Evaluates Alternative Strategies
The organization evaluates alternative strategies and their risk implications before committing. This isn’t risk avoidance — it’s risk-informed decision-making.
In practice: When evaluating a new product launch, market expansion, or acquisition, the analysis should explicitly compare the risk implications of different paths — not just the financial return. The risk function should be at the table during strategic planning, not reviewing decisions after they’ve been made.
Principle 9: Formulates Business Objectives
The organization sets objectives at every level that align with the chosen strategy and risk appetite. Objectives should be measurable and time-bound, and risk considerations should be built in from the start.
In practice: A product team launching a new lending product should have risk-adjusted objectives (not just revenue targets) so that performance metrics don’t inadvertently incentivize risk-taking beyond appetite.
Component 3: Performance (Principles 10–14)
This component is the operational heart of ERM — the mechanics of risk identification, assessment, prioritization, response, and portfolio aggregation.
Principle 10: Identifies Risk
The organization identifies risks across the enterprise. This is the risk register function — systematically identifying what could prevent the organization from achieving its objectives.
Key distinction: COSO ERM explicitly includes upside risks (missed opportunities) alongside downside risks. A risk register that only captures threats misses this intent.
Principle 11: Assesses Severity of Risk
The organization assesses the severity of identified risks — typically through likelihood and impact scoring. This produces the risk heat map that forms the basis for prioritization.
Common failure: scoring risks without reference to the control environment. A risk with robust, tested controls should have a lower residual score than the same risk with weak or untested controls. If your risk register doesn’t distinguish between inherent and residual risk, it’s incomplete.
| Risk Scoring Dimension | What It Captures |
|---|---|
| Inherent likelihood | Probability of occurrence without any controls |
| Inherent impact | Consequence if the risk materializes, ignoring controls |
| Control effectiveness | How well current controls reduce likelihood or impact |
| Residual likelihood | Probability after controls are applied |
| Residual impact | Consequence after controls are applied |
| Risk velocity | How quickly the risk could escalate if it materializes |
Principle 12: Prioritizes Risks
The organization prioritizes risks for management attention based on severity and strategic importance. Not all risks deserve the same response effort.
In practice: A tiered prioritization system — Critical, High, Medium, Low — should map directly to response requirements, monitoring frequency, and escalation protocols. Critical risks require active mitigation and board visibility; Low risks may be accepted with periodic monitoring only.
Principle 13: Implements Risk Responses
The organization selects and implements risk responses appropriate to the severity and nature of each risk. COSO identifies four response categories: Accept, Avoid, Reduce, and Share (transfer).
Response selection should be documented and connected to cost-benefit analysis — reducing a $50,000 residual risk to zero isn’t worth a $200,000 control investment. The residual risk after response should be within risk appetite; if it’s not, it requires escalation.
Principle 14: Develops Portfolio View
The organization aggregates individual risks into a portfolio view to assess overall risk exposure against risk appetite. This is the most underimplemented principle in practice — most organizations have risk registers but no portfolio-level view.
Why the portfolio view matters: individual risks may each be within appetite, but their correlation and concentration can produce aggregate exposure that exceeds appetite. A financial institution with moderate credit risk, moderate liquidity risk, and moderate operational risk isn’t necessarily safe — if all three deteriorate simultaneously under a stress scenario, the aggregate impact may be catastrophic.
Component 4: Review and Revision (Principles 15–17)
ERM is not a one-time exercise. This component addresses how the framework is monitored, evaluated, and improved over time.
Principle 15: Assesses Substantial Change
The organization identifies and assesses substantial changes — in the external environment, business model, or strategy — that could affect the risk profile.
Triggering events that should prompt an ERM review:
- Entry into a new product or market
- Significant acquisition or partnership
- Material regulatory change
- Key leadership change (especially in risk function)
- Major technology platform change
- Significant operational incident
Principle 16: Reviews Risk and Performance
The organization reviews ERM performance and results — whether the program is working as intended and whether risk management outcomes are aligning with objectives.
In practice: Annual ERM program reviews should assess: Are all risks identified? Are assessments calibrated correctly? Are risk responses reducing risk as expected? Is the board getting information that enables good governance decisions?
Principle 17: Pursues Improvement in ERM
The organization pursues continuous improvement in its enterprise risk management program. The ERM program should get better over time — more granular risk identification, better data for quantification, more integrated risk-strategy linkages.
Component 5: Information, Communication, and Reporting (Principles 18–20)
Risk management is only effective if the right information reaches the right people at the right time. This component addresses the information infrastructure underlying ERM.
Principle 18: Leverages Information and Technology
The organization leverages data and systems to support ERM. This means having the data and tools to identify, measure, and monitor risk — not just spreadsheets.
For most mid-market companies, this translates to: a risk register maintained in a system (not a stale Excel file on a shared drive), KRI dashboards with defined thresholds and automated alerting, and loss event tracking with trend analysis.
Principle 19: Communicates Risk Information
The organization communicates risk information across the entity. Risk information flows down (strategic direction and risk appetite to business units), up (operational risk data to leadership and board), and horizontally (between functions managing related risks).
A common failure mode: risk information flows only upward — management reports to the board, but risk insights and lessons from incidents don’t flow back to the business units that need them to improve controls.
Principle 20: Reports on Risk, Culture, and Performance
The organization reports on risk, culture, and ERM performance to key stakeholders. This includes board-level risk reporting, regulatory reporting where required, and transparency on risk culture and governance effectiveness.
What belongs in a mature board risk report:
- Portfolio risk heat map vs. prior period
- KRI status against appetite thresholds (green/yellow/red)
- Top 10 emerging risks
- Risk response execution status (what’s on track, what’s delayed)
- Material incidents or near-misses since last report
- Risk culture indicators (audit findings, escalations, control failures)
COSO ERM vs. ISO 31000
Organizations sometimes ask which framework to adopt. Here’s the practical comparison:
| COSO ERM 2017 | ISO 31000:2018 | |
|---|---|---|
| Scope | Enterprise risk, integrated with strategy | General risk management principles |
| Prescriptiveness | More detailed (20 principles) | High-level (principles and guidelines) |
| Best fit | Mid-to-large organizations, financial services, public companies | Any organization size or type |
| Certification | No formal certification | No formal certification |
| US market | Dominant in financial services, SOX-relevant | More common in international and manufacturing contexts |
| Board focus | Explicit board governance emphasis | Less prescriptive on governance structure |
For US financial institutions and any organization subject to SOX, COSO ERM is the de facto standard. ISO 31000 is better suited for organizations seeking a simpler, universally applicable framework.
Common COSO ERM Implementation Failures
The Framework Becomes a Document, Not a System
The most common failure. A well-designed COSO ERM framework document gets approved and then filed. It doesn’t connect to operational decisions, KRI monitoring doesn’t happen on schedule, and the board gets the same generic risk report every quarter regardless of what’s actually happening.
Fix: The framework is a design spec. The actual ERM system is the risk register maintained in real time, the KRI dashboard reviewed monthly, the escalation log, the quarterly risk committee meeting with substantive discussion.
Risk Appetite Is Undefined or Immeasurable
You can’t manage to an appetite you haven’t defined. “Conservative risk posture” tells a business unit nothing about what they’re actually allowed to do.
Fix: Quantify risk appetite by domain. Even rough bounds are better than none. “We tolerate up to X operational loss events per year aggregating no more than $Y” is a starting point. Refine from there.
The Risk Function Reports Into Finance or Legal, Not the Board
When the CRO reports into the CFO, the risk function is structurally subordinated to the function it’s supposed to provide independent oversight of. The board loses an independent view of the risk profile.
Fix: The CRO (or equivalent) should have direct board access and dotted-line or direct reporting to the board’s risk committee. This is a structural change that requires leadership commitment, not just documentation.
Risks Are Not Connected to Strategy
A risk register that catalogs operational, cyber, and compliance risks — but doesn’t include strategic risks or connect identified risks to strategic objectives — is incomplete. Regulators and auditors increasingly look for this integration.
Building a COSO-Aligned ERM Program: Implementation Timeline
Months 1–3: Foundation
- Define the ERM governance structure (risk committee charter, CRO mandate, board reporting protocols)
- Draft and approve the risk appetite statement
- Conduct initial risk identification across the organization (workshops by business unit)
- Build the risk register with inherent scoring
Months 4–6: Assessment and Response
- Complete control environment assessment (identify controls for top risks, evaluate effectiveness)
- Calculate residual risk scores
- Develop risk response plans for risks outside appetite
- Assign KRIs for top 20 risks with defined thresholds and owners
Months 7–9: Integration and Reporting
- Build the portfolio risk view (aggregate heat map)
- Implement KRI monitoring cadence (monthly or quarterly depending on risk velocity)
- Deliver first board risk report
- Complete first ERM program self-assessment
Months 10–12: Refinement
- Review program completeness against COSO 20 principles
- Identify gaps and assign owners for remediation
- Update risk appetite for next planning cycle
- Produce annual ERM report for board
For a more detailed look at governance structure and board reporting mechanics, see CFP Governance: Roles, Responsibilities, and Board Reporting and Operational Risk Management Framework Guide.
So What?
COSO ERM 2017 is the right framework for organizations that want risk management to actually influence decisions — not just satisfy an audit requirement. But it requires commitment at the board and CRO level, not just a compliance team building documents.
The 20 principles are a checklist of what a mature ERM program looks like. Most organizations are strong on some principles and weak on others. Start with an honest gap assessment — where are you actually operating vs. where the framework says you should be — and prioritize the gaps with the highest operational impact.
If you’re building or rebuilding your ERM program, the Enterprise Risk Management Framework provides a complete documentation structure: risk appetite templates, Three Lines of Defense structure, committee charter, and board risk reporting package — pre-mapped to COSO 2017 principles.
Frequently Asked Questions
What is the COSO ERM framework? COSO ERM (Enterprise Risk Management — Integrating with Strategy and Performance) is a 2017 governance framework from the Committee of Sponsoring Organizations of the Treadway Commission. It provides 20 principles across 5 components that guide how organizations integrate risk management into strategy-setting and day-to-day operations. It’s the dominant ERM framework in US financial services and public company contexts.
What are the 20 COSO ERM 2017 principles? Governance and Culture: (1) Board Risk Oversight, (2) Operating Structures, (3) Desired Culture, (4) Core Values, (5) Human Capital. Strategy and Objective-Setting: (6) Business Context, (7) Risk Appetite, (8) Alternative Strategies, (9) Business Objectives. Performance: (10) Risk Identification, (11) Risk Assessment, (12) Risk Prioritization, (13) Risk Response, (14) Portfolio View. Review and Revision: (15) Substantial Change, (16) Risk and Performance Review, (17) ERM Improvement. Information, Communication, and Reporting: (18) Information and Technology, (19) Risk Communication, (20) Risk Reporting.
Is COSO ERM required by regulation? COSO ERM is not directly mandated by law, but it’s widely referenced by regulators. The SEC’s guidance on risk oversight expects public company boards to have a process consistent with COSO ERM principles. Banking regulators (OCC, Federal Reserve) reference ERM frameworks when evaluating governance programs. For SOX compliance, COSO ICFR (the Internal Control framework) is directly referenced; COSO ERM is used for the broader risk governance layer.
What is risk appetite under COSO ERM? Risk appetite is the broad amount of risk an organization is willing to accept in pursuit of its strategy. Principle 7 of COSO ERM requires this to be defined during strategy-setting (not after), quantified where possible, approved by the board, and linked to operational risk tolerance levels and KRI thresholds. A risk appetite statement without quantitative bounds for key risk categories is incomplete.
How long does ERM implementation take? A basic ERM program — governance structure, risk register, risk appetite statement, quarterly board reporting — can be established in 3–6 months. A mature program with integrated KRI monitoring, stress testing, portfolio-level aggregation, and strategic risk integration typically takes 12–24 months to fully operationalize.
Related Template
Enterprise Risk Management Framework (ERMF)
Complete ERM documentation: risk appetite, 3 Lines of Defense, committee charter, and board reporting.
Frequently Asked Questions
What is the COSO ERM framework?
What are the 5 components of COSO ERM 2017?
How many principles are in COSO ERM 2017?
What is the difference between COSO ERM and COSO ICFR?
Who should use the COSO ERM framework?
What is a risk appetite statement under COSO ERM?
Rebecca Leung
Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.
Related Framework
Enterprise Risk Management Framework (ERMF)
Complete ERM documentation: risk appetite, 3 Lines of Defense, committee charter, and board reporting.
Keep Reading
Early Warning Indicators for Liquidity Stress: What to Monitor & How to Set Triggers
Discover how to implement and monitor Early Warning Indicators (EWIs) for liquidity stress, referencing key regulatory guidance from the OCC, Federal Reserve, and BCBS. Learn to set effective triggers to protect your institution from financial instability.
Apr 25, 2026
Operational RiskIdentifying & Prioritizing Contingent Funding Sources: A Practical Ranking Framework
Learn how to rank and prioritize contingent funding sources for your CFP — from Fed discount window to FHLB advances, repo, and brokered deposits. Actionable framework with regulatory citations.
Apr 18, 2026
Operational RiskLiquidity Stress Testing for Your CFP: Scenarios, Assumptions & Methodology
Master liquidity stress testing for your Contingency Funding Plan (CFP). Learn about scenario design, critical assumptions, and methodology to meet regulatory expectations and build financial resilience.
Apr 17, 2026
Immaterial Findings ✉️
Weekly newsletter
Sharp risk & compliance insights practitioners actually read. Enforcement actions, regulatory shifts, and practical frameworks — no fluff, no filler.
Join practitioners from banks, fintechs, and asset managers. Delivered weekly.