Compliance

Crypto Audit Preparation Checklist

Crypto audit preparation checklist — documentation assembly, transaction evidence collection, control testing records, valuation support, auditor expectations, common findings, and SOC 2 vs financial audit comparison for digital asset organizations.

Updated

Crypto audit preparation requires assembling transaction evidence, control documentation, and valuation support into a structured audit binder that satisfies the specific examination standards auditors apply to digital asset organizations. A crypto subledger produces the reconciled transaction records, cross-source matching evidence, and journal entry documentation that financial auditors and SOC 2 assessors examine — reducing the manual evidence assembly effort from weeks to hours when the underlying data pipeline captures audit-grade transaction detail from the point of ingestion.

Transaction Evidence

Complete transaction records with hash, timestamp, asset, amount, FMV, cost basis, and classification for every crypto event.

Reconciliation Proof

Cross-source matching between on-chain records, exchange data, custodian reports, and subledger entries.

Valuation Support

Fair market value documentation with pricing source, methodology, and Level 1/2/3 classification per ASC 820.

Control Evidence

Access reviews, approval records, segregation validation, and change management documentation.

What Does Crypto Audit Preparation Involve?

Crypto audit preparation is the process of assembling, organizing, and validating the documentation and evidence that independent auditors examine during a financial statement audit or SOC 2 engagement. Preparation begins 8 to 12 weeks before the scheduled audit fieldwork and covers 4 evidence domains: transaction records, reconciliation proof, valuation support, and control documentation.

The preparation process follows a structured timeline with defined milestones. Each milestone produces specific deliverables that auditors expect to receive at the start of fieldwork. Organizations that deliver a complete, organized audit binder on the first day of fieldwork reduce the duration and cost of the audit engagement — auditors spend less time requesting supplementary documentation and more time executing substantive testing.

First-time crypto audits require additional preparation. Organizations undergoing an initial audit invest 4 to 6 additional weeks documenting policies, formalizing procedures, and establishing the evidence collection mechanisms that sustain ongoing audit readiness.

1

Scoping and gap assessment (weeks 1-2)

Define the audit scope — entity boundaries, reporting periods, applicable standards (FASB ASU 2023-08, IFRS, SOC 2 criteria), and material account thresholds. Conduct a gap assessment against the prior audit or readiness checklist to identify missing documentation and evidence.

2

Evidence collection and assembly (weeks 3-6)

Collect transaction records from all sources (blockchains, exchanges, custodians, DeFi protocols). Generate reconciliation reports matching internal subledger data against external sources. Assemble valuation documentation with pricing sources and methodology for each material asset position.

3

Control testing and documentation (weeks 7-9)

Test internal controls across all domains — access management, segregation of duties, change management, key management, and reconciliation procedures. Document test results, identify deficiencies, and complete remediation before fieldwork begins.

4

Binder assembly and pre-audit review (weeks 10-12)

Organize all evidence into the structured audit binder. Conduct an internal pre-audit review against the auditor request list. Resolve gaps, verify document completeness, and prepare management assertions for auditor delivery.

What Documentation Must Organizations Assemble Before an Audit?

Auditors request documentation across 6 categories at the start of every crypto audit engagement. Missing documentation from any category delays fieldwork and increases the risk of qualified audit opinions.

The 6 documentation categories are:

  1. Governance and policy documentation — Board minutes, risk appetite statements, digital asset policies, key management procedures, incident response plans, and business continuity documentation. Auditors verify that governance structures exist and operate as documented.
  2. Account and wallet inventory — Complete listing of all blockchain addresses, exchange accounts, custodial relationships, and DeFi protocol positions controlled by the organization. Each entry includes the account identifier, asset types held, custody classification (hot/cold/custodial), and the individual or team responsible.
  3. Transaction records — Full transaction history for the audit period with 7 required data elements per transaction: unique identifier, timestamp, asset type and amount, counterparty, classification, fair market value, and cost basis allocation.
  4. Reconciliation evidence — Documented proof that internal records match external sources. Reconciliation evidence includes matching reports, exception logs, investigation records, and resolution documentation.
  5. Valuation methodology and support — Documentation of fair market value determination for each material crypto asset position, including pricing source identification, Level 1/2/3 classification under ASC 820, and methodology for illiquid or thinly traded assets.
  6. Control evidence — Access review records, approval workflow logs, change management documentation, key management ceremony records, and segregation of duties validation results.

How Should Organizations Prepare Transaction Evidence for Auditors?

Transaction evidence preparation requires extracting, validating, and organizing the complete transaction history for the audit period from all crypto data sources. Auditors evaluate transaction evidence against 3 audit assertions: completeness (all transactions are recorded), accuracy (recorded amounts and classifications are correct), and occurrence (recorded transactions represent real events).

Organizations prepare transaction evidence through 4 sequential steps:

  1. Source extraction — Extract transaction data from all sources: blockchain transaction logs (via node queries or block explorer APIs), exchange trade and transfer histories (via API or CSV export), custodian transaction reports, and DeFi protocol interaction logs. Each source provides a complete, unedited record of activity for the audit period.
  2. Subledger reconciliation — Match every extracted transaction against the corresponding subledger record. Document matched transactions, investigate unmatched items, and resolve discrepancies. The reconciliation output produces the matching evidence auditors examine during substantive testing.
  3. Classification validation — Verify that each transaction carries the correct classification (trade, transfer, staking reward, fee, airdrop, DeFi interaction). Classification determines the accounting treatment — income recognition, cost basis allocation, or expense classification. Misclassified transactions distort financial statements.
  4. Period cutoff verification — Confirm that transactions are recorded in the correct accounting period. Blockchain confirmation delays, exchange settlement timing, and cross-timezone operations create cutoff risks. Transactions occurring near period boundaries (month-end, quarter-end, year-end) require timestamp verification against block confirmation times.

What Control Evidence Do Auditors Expect for Digital Assets?

Control evidence demonstrates that the organization’s internal control framework operates as designed throughout the audit period. Auditors evaluate control evidence differently for financial audits and SOC 2 examinations, but both require documented proof of control execution.

Financial auditors assess controls to determine the extent of substantive testing. Strong control evidence reduces the sample sizes and detail testing required. Weak or missing control evidence forces auditors to expand substantive procedures — increasing audit duration and cost.

SOC 2 auditors evaluate control evidence as the primary subject of the examination. Every control objective in the SOC 2 scope requires evidence demonstrating design suitability (Type I) and operating effectiveness over time (Type II).

Control Evidence Package
  • Access management records — user provisioning requests, approval documentation, quarterly access review outputs, and terminated user deprovisioning logs with timestamps
  • Segregation of duties matrix — documented role assignments showing separation of transaction initiation, authorization, reconciliation, and reporting functions
  • Key management records — HSM audit logs, signing ceremony documentation, key rotation evidence, and multisig configuration records
  • Change management logs — code review approvals, deployment records, testing evidence, and rollback documentation for every production change
  • Reconciliation outputs — automated matching reports, exception investigation records, and resolution documentation for each reconciliation cycle
  • Incident response records — detection timestamps, classification decisions, containment actions, communication logs, and post-incident review reports
  • Approval workflow logs — transaction authorization records showing initiator, approver, timestamp, and authorization basis for transactions exceeding defined thresholds

How Should Organizations Handle Crypto Valuation Evidence?

Valuation evidence supports the fair market value reported on financial statements for each crypto asset position. Auditors evaluate valuation evidence against the fair value measurement hierarchy defined in ASC 820, which classifies valuation inputs into 3 levels based on observability.

Level 1 assets (actively traded on principal markets) require documentation identifying the principal market, the price source, and the timestamp of the valuation observation. Bitcoin and Ethereum quoted on regulated exchanges such as Coinbase, Kraken, or Bitstamp produce Level 1 fair values. The organization documents which exchange serves as the principal market and the methodology for selecting the closing price (last trade, volume-weighted average, or bid-ask midpoint).

Level 2 assets (observable inputs from similar assets or less active markets) require documentation of the valuation technique, the comparable assets used, and any adjustments applied. Governance tokens traded on decentralized exchanges with moderate liquidity may qualify as Level 2 when pricing is derived from observable DEX pool activity.

Level 3 assets (unobservable inputs requiring significant judgment) demand the most extensive documentation. Illiquid tokens, LP positions, and DeFi protocol positions without active markets require valuation models with documented assumptions, sensitivity analysis, and management sign-off. Auditors scrutinize Level 3 valuations most intensively because they depend on management judgment rather than market observation.

What Are Common Audit Findings for Crypto Organizations?

Audit findings identify control deficiencies, misstatements, or documentation gaps discovered during the examination. The 5 most frequent findings for crypto organizations reflect the operational complexity of digital asset management.

The 5 most common findings are:

  1. Incomplete transaction records — Missing on-chain transactions (particularly DeFi interactions, airdrops, and dust transactions), unrecorded exchange trades, or gaps between custodian reports and subledger data. Incompleteness findings are the most consequential because they affect the completeness assertion upon which the entire audit opinion depends.
  2. Unsupported valuations — Fair market value calculations without documented pricing sources, methodology selection rationale, or Level 1/2/3 classification. Unsupported valuations frequently occur for DeFi positions, LP tokens, and governance tokens where standard pricing feeds are unavailable.
  3. Inadequate segregation of duties — Single individuals controlling both transaction initiation and authorization, or both transaction processing and reconciliation. Segregation findings are particularly common in organizations with fewer than 15 employees.
  4. Missing reconciliation evidence — No documented proof of cross-source data matching for the audit period. Organizations performing reconciliation informally (visual inspection rather than documented matching procedures) lack the evidence auditors require.
  5. Undocumented key management — No formal policy governing private key generation, storage, rotation, and destruction. Key management findings carry elevated risk ratings because private key compromise enables irreversible asset loss.

How Does Audit Preparation Differ for SOC 2 vs Financial Audits?

SOC 2 examinations and financial statement audits serve different purposes, apply different standards, and evaluate different evidence. Organizations pursuing both engagements prepare evidence packages that address the distinct requirements of each.

Financial Audit
Recommended SOC 2 Examination
Examines financial statement accuracy
Examines operational control effectiveness
Applies GAAP/IFRS accounting standards
Applies AICPA Trust Services Criteria
Tests asset valuations and transaction completeness
Tests control design and operating effectiveness
Evaluates controls to determine substantive testing scope
Evaluates controls as the primary examination subject
Produces an audit opinion on financial statements
Produces a report on control suitability and effectiveness
Required for public companies and many regulated entities
Voluntary — required by institutional counterparties

Financial audit preparation emphasizes transaction evidence, valuation support, and accounting treatment documentation. The auditor’s primary concern is whether the financial statements present a true and fair view of the organization’s crypto asset positions and transaction activity under the applicable accounting standards.

SOC 2 preparation emphasizes control evidence across all scoped Trust Services Criteria. The auditor’s primary concern is whether controls are suitably designed (Type I) and operate effectively over time (Type II). Transaction-level detail matters for SOC 2 only insofar as it demonstrates processing integrity controls.

Automate Your Crypto Accounting

Coincile handles data collection, reconciliation, cost basis tracking, and journal entry generation — so finance teams close faster with fewer errors.