What a Defensible Approval Workflow Actually Looks Like

 

Districts that fail audits often do so because their workflows cannot prove control. Find out what control looks like and how to achieve it.

Hero Banner
Tom Rossi

 Published May 2026

Districts that continually fail audits usually have a process problem. They struggle because their workflows cannot prove control.

In my article "What GASB 84 Really Changed About Student Activity Fund Management," I argue that GASB 84 is fundamentally a process mandate, not a reporting upgrade. The districts that keep failing audits are not failing because they chose the wrong fund classification. They are failing because their workflows cannot prove control.

The natural next question, then, is: What does control actually look like in practice? That is what this article is about. 

Note that the word defensible matters. I am not describing a perfect system or an expensive one. I am describing a system that can answer an auditor's questions before the auditor has to ask them.

When auditors review student activity funds, they are not reading through your files hoping to find errors. They are testing your system.

What an Auditor Is Actually Looking For 

When auditors review student activity funds, they are not reading through your files hoping to find errors. They are testing your system. They pull samples. They trace transactions. They look for exceptions and gaps. The question they are really asking is whether your process is followed every time. And more often than not, a finding is a result of the system not being followed. 

A defensible workflow is one that passes that test on any transaction, selected at random, on any given day. 

Where Control Has to Happen 

Most student activity fund transactions move through four stages: a request is initiated, someone approves it, a payment is made, and the funds are reconciled. A defensible workflow puts a control point at each stage. 

Stage 1: Request Before Action. Someone — a club advisor, a coach, a student officer — needs to spend money. In a defensible system, that request is submitted formally before anything happens. It includes the amount, the purpose, and the fund it should come from.  

Stage 2: Approval Before Money Moves. The appropriate person reviews the request and approves or denies it, with a record of that decision.  

Stage 3: Payment Tied to Approval. Whether a check is cut, a card is used, or cash changes hands, the payment should be traceable back to an approved request.  

Stage 4: Reconciliation That Closes the Loop. Transactions need to be reviewed against supporting documentation, receipts, invoices, deposit records, and approvals on a defined, recurring schedule. Monthly is better than quarterly, but consistent beats theoretical. A quarterly reconciliation that actually happens is stronger than a monthly process everyone ignores. 

Who Is Doing What? The Role of Role Confusion 

One of the most common breakdowns I see is role confusion — not because people are careless, but because a clearly defined role has been lost over time. 

A defensible workflow assigns specific actions to specific roles and makes those assignments explicit. The club advisor submits requests. The principal approves them. The bookkeeper processes payments. The district business office reviews activity across all schools. Those are not the only ways to structure it, but whatever the structure is, it needs to be visible, understood, and enforced by the system itself. 

When roles are unclear, people improvise. They find the person who is available. They skip a step because the usual approver is out. They handle something themselves to avoid slowing a process down. Every one of those workarounds is a control failure, even when the underlying transaction is perfectly legitimate. 

The workflow is about protecting good people. When a bookkeeper can show that every payment they processed has prior approval from the right person, they are protected. When they cannot, they are exposed — even when they did everything they were supposed to do. 

Documentation as a Chain of Custody 

A filing cabinet full of receipts is recordkeeping. A defensible workflow is a chain of custody. There is a meaningful difference. 

Chain of custody means that for any transaction, the district can reconstruct who initiated it, who approved it, when each step happened, and what documentation supported the request — without asking anyone to remember. The record tells the story. 

That requires documentation to be attached to the transaction as the process happens. Some documents will naturally come after payment. A receipt may be uploaded later and still be valid. 

But the approval record cannot be recreated later. 

An approval after the fact is not documentation. It is evidence that the control failed. It turns the process into a workaround, and workarounds do not hold up well under review. 

Districts that get this right treat documentation as a process step, not an administrative burden. The request creates the record. The approval strengthens the record. The payment completes the record. By the time money moves, the district should already be able to prove why it was allowed. 

How the Process Enforces Control 

A well-designed system makes the right thing easy and the wrong thing hard. It does not just record what happened; it shapes what can happen. 

In practice, that means money cannot move before approval. Requests follow the district’s actual approval structure, so a payment that requires a principal’s authorization cannot bypass the principal. Timestamps are preserved. Records are retained. The process is not just documented after the fact; it is controlled before the transaction happens. 

What technology should not do is substitute for judgment. The system enforces the process. People still have to make reasonable decisions about what to approve and what to question.  

Defensible control also requires district-level visibility. The business office needs real-time access to what is being requested, approved, delayed, and spent across every school. If activity stalls at one school, the district should see it. If a fund is at risk of being overdrawn, the district should know before money moves. That is the difference between recording transactions and managing the process. 

The Test I Use 

Here is a practical test for any workflow you are evaluating or building. 

Imagine a brand new bookkeeper starts on a Monday. No training from the person who left. No inherited binder of unwritten rules. Just access to your system. 

Can they figure out what they are supposed to do? Can they tell which requests need approval before they process them? Can they see what is pending, what is overdue, and what needs their attention? 

If the answer is no, the system is depending too much on people and not enough on design. A defensible workflow works because of how it is built, not because of who is running it. 

The Standard Is Not Perfection — It's Proof 

I am not describing a system that catches every mistake or prevents every misuse. I am describing a system that, when something goes wrong, can show exactly where the breakdown was, who was responsible, and what the process required at that point. 

That is what defensible means. Not perfect. Provable. 

Districts that build toward that standard do not just satisfy auditors. They build something their own people can trust — because the process is clear, the expectations are written into the system, and nobody has to guess the next step because the workflow tells them. That is the difference between compliance as a year-end exercise and compliance as an operating standard. 

The next question is simple: can your district prove control?

  

   

Advance Your Leadership With SFO®

The Certified Administrator of School Finance and Operations® (SFO) credential demonstrates your expertise in school business leadership, strategic financial management, and operational excellence. Explore certification resources, confirm your eligibility, and take the next step toward strengthening your professional impact.

START YOUR SFO JOURNEY
Global message icon