How a global miner rebuilt their SOX management across every entity, and what other US organizations can learn

Sarbanes-Oxley (SOX) programs rarely fail because teams do not know what the controls are. They fail because execution gets lost across entities, sites, and process owners, and the “truth” ends up scattered across spreadsheets, Visio maps, and email threads.
That was the reality for one global diversified miner we worked with. Their controls framework existed, but day-to-day control execution tracking, testing follow-up and reporting were creating avoidable friction, especially at scale.
Company bio snapshot
- Industry: Diversified mining, global operations
- Regulatory driver: Sarbanes-Oxley (SOX) internal controls requirements
- Scope: Entity-wide controls framework, process maps, control execution tracking, testing, and remediation workflows
- Employees: 21,000+
The challenge: Sarbanes-Oxley (SOX) controls were scattered
If you’ve lived through a SOX cycle, you know the pattern. The RACMs exist. The process maps exist. The controls are “documented.”
But the reality of whether they’re being executed, by the right people, in every entity, on time, is buried across spreadsheets, inboxes, and version-controlled chaos.
That’s where this global diversified miner found itself. And it’s the same place a lot of US organizations end up when SOX has to work at scale.
They needed to:
- Create a single source of truth for RACMs and process maps
- Get out of spreadsheet survival mode and cut the admin drag of manual tracking
- Make ownership real, with clear accountability for every control across every entity
- Track control execution, not just control design on paper
- Make reporting usable, so testing status and follow-up could be seen instantly, not rebuilt for every committee cycle
Bottom line: they had to move from “we can prove this if we chase it down” to “we can run SOX like an operating system.”
The SOX management CoreStream GRC: bring process, risk and execution into one system
Once the miner was clear on the real problem, the solution was not another round of documentation. It was a structural change: connect process, risk, and control execution in one system so the framework could actually operate day to day.
CoreStream GRC was configured around 3 practical shifts:
1) One connected controls framework (no more disconnected artifacts)
Instead of Risk and Control Matrixes (RACMs) in one place and process maps in another, everything was linked:
- Processes, risks, and controls connected end-to-end
- Process maps tied directly to the controls framework, so the “why” and the “what” stayed aligned
- A complete audit trail of updates and changes, which matters in SOX environments where traceability is non-negotiable
2) Ownership you can see, not just assign
SOX accountability breaks when ownership is vague. Therefore, your software setup must make it explicit:
- Ownership assigned at the framework level (who owns the control)
- Ownership assigned at the monitoring level (who is responsible for testing, follow-up, and remediation tracking)
A good check is to ask yourself if you could answer the uncomfortable question fast: who is accountable for this control in this entity right now?
3) Workflow-driven execution, testing, and remediation (built for real life)
This is where Sarbanes-Oxley (SOX) stops being theoretical:
- Integrated workflows for control execution
- Structured workflows for control testing
- Built-in workflows for remediation and follow-up, so issues do not die in email thread
And because everything was live in one place:
- Real-time dashboards with filtering and drill-down replaced quarterly reporting scrambles
- Leaders could see progress, bottlenecks, and repeat issues without waiting for someone to compile it manually

Outcomes from using CoreStream GRC software: less spreadsheet drag, more SOX-ready clarity
With the single system of record in place, the miner achieved:
- A single source of truth for the control framework and process maps, replacing spreadsheets and disconnected Visio maps
- Improved efficiency in meeting Sarbanes-Oxley (SOX) requirements, with easier monitoring of control testing and remediation follow-up
- Clear accountability: ownership across the control framework and testing meant individuals were directly responsible for execution and closure
- Reduced administrative overhead in tracking items to completion and compiling management information, freeing time for higher-value work
This outcome mirrors what independent market feedback repeatedly highlights: when teams move off Excel-driven GRC, they stop spending days assembling reporting and start using live dashboards to run the program.
“Clients moving from Excel and PowerPoint into CoreStream GRC have seen immediate benefits: Days of manual report prep replaced by real-time dashboards and committee packs at the click of a button.”
Michael Rasmussen, GRC Pundit and GRC 2020 founder
Why good SOX management matters (especially for US organizations)
Sarbanes-Oxley (SOX) is not just something you “get through” once a year. In the US, it’s a live test of whether your controls program is actually running, or whether you’re just producing evidence on demand.
At a practical level, strong SOX management is the difference between:
- standardizing control expectations across every entity, not letting each team interpret controls their own way
- proving execution consistently, without last-minute chasing for evidence
- assigning ownership with zero ambiguity, so there’s no hand-waving when something slips
- surfacing issues early, before they turn into repeat findings, escalations, or uncomfortable audit committee conversations
That’s why this miner’s change matters. The idea was straightforward, but the execution is where most organizations fall apart:
Stop treating SOX like documentation management.
Start treating it like controls execution management.
Want to apply this to your SOX program?
If you’re dealing with any combination of:
- RACMs and process maps scattered across teams,
- control testing follow-up that lives in email,
- remediation that slips because ownership is unclear, or
- reporting that takes days instead of minutes,
then the pattern is the same.
CoreStream GRC can help you build a controls operating model that scales across entities, with workflow-driven execution tracking, testing, remediation, and real-time reporting.
Learn more about our controls management solution

-

CASE STUDY: GRC for the Public Sector
The public sector time‑saver: How one team reclaimed 100s of hours with automated reporting Public sector reporting has a reputation for being slow, manual, and fragile under pressure. This is not because teams lack commitment, but because the systems behind reporting were never designed for the level of scrutiny now expected. Monthly performance packs, Cabinet Office submissions,…
-

CASE STUDY: Betting & Gaming Regulatory Compliance
Regulatory clarity, delivered in 2 weeks for betting and gaming group Unfortunately when regulators want proof, “we have it in someone’s Visio file” is not an answer. A global sports betting and gaming group came to CoreStream GRC with an urgent regulatory requirement: they needed to prove they needed an implementation which understood how work actually flowed across jurisdictions and legal entities, and they needed to do…
-

CASE STUDY: Regulatory Compliance for Energy
When regulatory intelligence hits reality: what working with global energy and resources companies taught us about managing thousands of obligations If you work inside a global energy company, you already know this: regulation is not something you “check in on.” It runs through operations, assets, contractors, joint ventures, and trading activity every single day. Across…
FAQs for SOX controls management
Control design is the documented framework (RACMs, narratives, process maps). Controls execution is the day-to-day reality: who performs each control, when it happens, what evidence exists, and whether exceptions get remediated. Most SOX pain comes from execution being tracked across spreadsheets, email, and inconsistent local processes.
Because ownership and evidence get fragmented. Different entities interpret controls differently, testing follow-up lives in inboxes, and the “latest version” of RACMs and process maps becomes unclear. At scale, SOX fails less from missing controls and more from missing accountability, traceability, and repeatable workflows.
Yes, if the configuration connects process, risk, and control execution so updates happen as part of the work, not as an extra reporting step. The payoff is fewer manual trackers, less version confusion, and faster management information, because evidence, testing results, and remediation status sit in the same system.
Treat SOX like an operating model, not a documentation exercise. Standardize control expectations across entities, make accountability unambiguous, track execution and evidence continuously, and manage testing and remediation through workflows. That shift is what turns “we can prove this if we chase it down” into “we can show it instantly.”
Testing and remediation should be workflow-driven, with clear status, due dates, escalation paths, and evidence capture in one place. When remediation is tracked in email threads, issues stall and repeat findings become more likely. A structured workflow keeps exceptions moving until they are closed and provably closed.