Score your organisation against each risk factor to identify high-priority remediation areas and build your audit defence strategy before a vendor notice arrives.

01
Vendor Audit History and Cycle Position High Risk
Have you been audited by Oracle, SAP, IBM, Microsoft or Broadcom in the last 36 months, or are you approaching the end of a 3–5 year audit cycle?
Expert Note

Tier-1 vendors audit enterprise customers on a 3–5 year cycle. Organisations approaching 5 years since their last Oracle or SAP audit face a statistically high probability of notification within the next 12 months. Review your audit history and model exposure before vendors contact you — proactive licence review is always cheaper than reactive audit response.

02
Regulatory Change Lag in Licence Alignment High Risk
Have GDPR, SOX, HIPAA or CCPA compliance projects added or changed software deployments without corresponding licence updates?
Expert Note

Regulatory projects — data residency requirements, audit logging expansions, identity management upgrades — frequently add workloads to existing licences without triggering procurement reviews. These undeclared deployments are prime findings in post-regulatory-change vendor audits. Cross-reference all major compliance projects against SAM entitlement records.

03
Repeating Audit Findings Not Remediated High Risk
Did your last vendor audit surface findings that have not been fully remediated and closed with a vendor sign-off?
Expert Note

Unresolved audit findings are the highest-risk indicator in vendor relationship management. Vendors track remediation commitments across audit cycles. Repeated findings in the same category — virtualisation, deployment counts, user access — indicate a systemic gap rather than a one-off error and attract harsher settlement terms in subsequent audits.

04
AI and GenAI Tool Governance Gap High Risk
Have AI/ML tools, Copilot products or GenAI platforms been deployed without formal licence review and entitlement verification?
Expert Note

AI governance is the fastest-growing area of software audit risk. Microsoft 365 Copilot, GitHub Copilot, Salesforce Einstein and Oracle AI Services all have specific entitlement requirements. Shadow AI deployments on personal credit cards or departmental budgets create undisclosed licence obligations that surface in audit discovery scans.

05
ERP and Database Upgrade Exposure High Risk
Have ERP upgrades (SAP S/4HANA migration, Oracle Cloud) introduced metric changes that affect your licence entitlement basis?
Expert Note

Migrating from SAP ECC to S/4HANA triggers a licence model conversion. Moving Oracle Database workloads to cloud environments changes processor metric calculations. Licence metric changes during upgrades are routinely under-assessed, creating six-figure audit exposures at go-live that could have been identified during planning.

06
Virtualisation and Cloud Licence Compliance High Risk
Are Oracle Database, IBM Db2 or SAP deployments on VMware, AWS or Azure correctly licensed under each vendor's virtualisation policy?
Expert Note

Oracle's virtualisation policy remains one of the most contentious in enterprise software. Deploying Oracle Database on VMware without "hard partitioning" requires licensing all physical cores in the cluster. Post-Broadcom VMware pricing changes have intensified this risk as organisations renegotiate VMware contracts and consider migration paths.

07
DevOps and Testing Environment Licensing Medium Risk
Are development, test and QA environments covered by appropriate licences or correctly excluded under vendor non-production policies?
Expert Note

Oracle, IBM and SAP all have specific policies for non-production environments. Oracle's Named User Plus metric requires individual licensing of developers accessing the database in test. IBM has specific DR environment provisions. Blanket assumptions that dev/test is free are incorrect for all three vendors and are a common source of audit findings.

08
Mobile and Remote Access Metric Changes Medium Risk
Have remote-work policies permanently increased the number of users accessing licensed systems since your last audit?
Expert Note

Pandemic-era remote work expansions permanently increased active user counts in many organisations without corresponding licence adjustments. Vendors audit named users or peak concurrent users based on directory data, not physical presence. Reconcile your user counts against current Active Directory or identity provider state before each major vendor engagement.

09
Third-Party and Subsidiary Access Medium Risk
Are third-party contractors, outsourced teams and subsidiary entities that access licensed software included in your entitlement counts?
Expert Note

Most enterprise licences cover employees of the named licensee. Third-party access — consultants, offshore developers, acquired subsidiaries — frequently falls outside the named-user grant. SAP indirect access audits have produced multi-million-pound settlements for exactly this pattern. Validate third-party access quarterly.

10
Maintenance and Support Lapse Risk Medium Risk
Are any software assets running without active maintenance support, outside vendor policy and without a documented exception?
Expert Note

Running unsupported software is both a security risk and an audit trigger. Oracle's Lifetime Support policy and SAP's extended maintenance programme create financial penalties for lapsed support. Some vendors audit more aggressively post-lapse as a commercial lever to force renewals at higher rates.

11
M&A Integration and Divestiture Compliance Low Risk
Have acquisitions or divestitures occurred without formal licence transfer, novation or entitlement reallocation?
Expert Note

M&A activity is the most common trigger for Oracle and SAP audits. Licence agreements define the named licensee; acquiring a company does not automatically extend licences to the acquired entity. Similarly, divesting a business unit that retains access to group licences creates ongoing compliance obligations that persist after deal close.

12
Software Deployment Documentation Quality Medium Risk
Is deployment data accurate enough to support an audit response within the 30-day notice period vendors typically allow?
Expert Note

Poor deployment documentation quality is a force-multiplier for audit findings. Vendors with contractual audit rights use their own discovery tools if licensees cannot produce accurate data. Vendor-run discovery almost always overstates usage — maintaining pre-built audit packs allows you to control the data narrative.

13
Audit Rights Clause Review Low Risk
Have you reviewed audit rights clauses in your tier-1 vendor agreements in the last 24 months?
Expert Note

Audit rights clauses vary significantly. Some grant vendors the right to use third-party auditors (BSA, KPMG, Deloitte) whose findings are contractually binding. Understanding what data you are obligated to provide and what remediation timeline applies shapes your audit defence strategy before a notice arrives.

14
Contract Interpretation Disputes Low Risk
Do you have unresolved licence metric or contract interpretation disputes with any vendor?
Expert Note

Open contract interpretation disputes indicate both parties see compliance risk in the agreement. Document all disputed interpretations, obtain written vendor positions and escalate to legal review. Unresolved disputes harden into audit findings when vendor relationships deteriorate.

15
Post-Audit Settlement Benchmarking Low Risk
Following any prior audit, were remediation costs benchmarked against market rates before settlement agreement?
Expert Note

Vendors present initial audit findings at list price. Industry practice is to negotiate settlements down by 30–60% using volume discounts, product substitutions and future-spend commitments. Accepting vendor findings without independent benchmarking leaves significant settlement value on the table.

Interpreting Your Assessment Results

0–5 Checks Met
High Audit Risk
Multiple high-risk factors present. Engage independent advisory support before responding to any vendor correspondence. Pre-emptive licence review is urgently recommended.
6–10 Checks Met
Moderate Exposure
Core compliance is in place but specific risk areas — virtualisation, third-party access or AI governance — need remediation. Address High-risk items within 90 days.
11–15 Checks Met
Audit-Ready Position
Strong audit readiness. Maintain pre-built audit packs, monitor regulatory change impact and review audit rights clauses at each contract renewal.

Received an audit notice — or want to get ahead of one?

Redress Compliance provides independent audit defence support and pre-audit licence reviews for Oracle, SAP, IBM and Microsoft.
Talk to an Expert →

Download: Software Audit Defence Kit

Audit response templates, licence metric checklists and settlement negotiation playbook for tier-1 vendor audits.
Download Free →