-
Financial statements audits
Financial statement audits
-
Compliance audits
Compliance audits
-
Compilations and reviews
Compilations and audit
-
Agreed-upon procedures
Agreed-upon procedures
-
Tax compliance
Business Tax
-
Global mobility services
Through our global organisation of member firms, we support both companies and individuals, providing insightful solutions to minimise the tax burden for both parties.
-
Sales and use tax and indirect taxes
SUT/ VAT & indirect taxes
-
Tax incentives
Navigating the complex landscape of tax incentives in Puerto Rico can be challenging. Whether you're looking to benefit from the Export Services Act (Act 20), the Individual Investors Act (Act 22), or other incentives under Act 60, we provide tailored advice to help you maximize your tax benefits and ensure compliance. Let us help you unlock the potential of doing business in Puerto Rico.
-
Transfer Pricing
The laws surrounding transfer pricing are becoming ever more complex, as tax affairs of multinational companies are facing scrutiny from media, regulators and the public

-
Business consulting
Our business consulting services can help you improve your operational performance and productivity, adding value throughout your growth life cycle.
-
Business Risk Advisory
Risk is inevitable but manageable. We deliver relevant, timely and practical advices to aid organizations manage risk and improve business performance. We can help you identify, understand and manage potential risks to safeguard your business and comply with regulatory requirements.
-
Technology Advisory
We provide comprehensive solutions to safeguard your business and ensure operational resilience and compliance. Our expert team offers a range of technology advisory services designed to address your cybersecurity needs, enhance business continuity, and manage security effectively.
-
Transactional advisory services
Transactions are significant events in the life of a business – a successful deal that can have a lasting impact on the future shape of the organizations involved. Because the stakes are high for both buyers and sellers, experience, determination and pragmatism are required to bring deals safely through to conclusion.
-
Forensic and investigative services
At Grant Thornton, we have a wealth of knowledge in forensic services and can support you with issues such as dispute resolution, fraud and insurance claims.

As organizations increasingly migrate to and rely upon cloud-based solutions, internal audit (IA) is uniquely positioned to play a critical role in the adoption of a cloud security program. IA’s independence and objectivity can provide insights that enhance the ability for management and the board to oversee and control risks. IA bolsters cloud security by:
- assessing cloud security strategy and its alignment with risk and compliance
- understanding cloud security architecture, service types and associated risks and challenges
- identifying areas for improvement and communicating them to the board and management
- collaborating with the cloud service provider, IT, IS and leadership to translate enterprise risk management objectives
Cloud migration and related cybersecurity risks
Cloud computing has seen rapid adoption because of its speed, agility, and affordability. Benefits include a scalable infrastructure, flexibility in access to computing resources and reduced expenses associated with maintaining infrastructure like data sources, network components and, in some cases, even physical data centers.
However, the cloud also presents challenges. Studies suggest that more than 70% of companies had a cloud data breach in the previous 12 months, which has intensified the need for cloud security. A Sophos News survey revealed that organizations have been confronted with a variety of cloud data breaches. About 34% faced a malware attack, 29% had exposed data and 28% suffered a ransomware strike.
How IA provides perspective on cloud security
IA plays a critical role in assessing and enhancing your cloud security by:
- helping management understand cloud security architecture, with associated risks and challenges
- identifying areas for improvement and communicating them to management and the board
- supporting collaboration among the cloud service provider, IT, IS, and leadership
IA’s assistance is also vital in helping to bring leading practices to a cloud security strategy, with a focus on the risk and control elements primarily driven by people, process, and technology:
People
- address risks from a lack of skilled cloud security experts
- identify key dependencies on the cloud service provider and critical third-party providers
- evaluate clearly defined roles and responsibilities, ensuring that risks are collectively mitigated
Process
- evaluate alignment of cloud security against business goals and objectives
- assess non-standard processes introduced through migration to the cloud
- evaluate processes for risk mitigation as responsibilities transition from one business function to the other
- examine adoption of cloud controls, and how they impact risk and compliance efforts
Technology
- address risks related to privilege access, data storage, and security
- evaluate risks that protect against shared responsibilities from third-party service providers that provide cloud services
Focus on these cloud security areas
When your organization has accepted its responsibility to ensure strong cloud security, it can move forward to develop a program that identifies key focus areas and an action plan to audit those functions. Concentrate on the most important areas, including:
- cloud program governance: Policies, procedures and risk-based planning and assessment; for compliance with standards, regulations, legal, contractual, and statutory requirements
- policies and procedures: Identification and assessment of how identity inventory, password policies, and other information is managed
- application security: Secure application design and development, such as access code, logic, and secure coding practices
- data security: Data inventory, classification, storage, ownership, and privacy
- key management and encryption: Policies, procedures, roles and responsibilities, and encryption requirements on classified data
Management needs to ensure that the cloud security program is built into the overarching enterprise resiliency architecture. That means, environment aside, you need to ensure you are following the security controls and requirements that can help reduce the risk to your organization.
A strong cloud security audit program must develop a “cadence,” or a regular review cycle of cloud security, configuration, and other factors. In addition to an annual audit, cloud security should be reviewed with each change in strategy or with the introduction of a new application. As the cloud strategy evolves and major applications are being moved to the cloud, it’s important to perform a pre-implementation review.
Cloud security isn’t optional
Creating a strong cloud security program requires identification of not only key IA focus areas, but also a thorough understanding of your operational objectives, risks, and processes. It also requires the integration of program enhancements to prepare for inevitable risks
Grant Thornton library articles:
We are committed to keep you updated of all developments that may affect the way you do business in Puerto Rico. Please contact us for assistance in relation to this or any other matter, we will be glad to assist you.