Second line of defense

What is the second line of defense (2LoD)?

The second line of defense (2LoD) is a foundational component of the Three Lines of Defense governance model widely used in financial services. While the first line owns and manages risks, the second line consists of independent oversight functions — typically Risk Management and Compliance — that establish policies, set risk appetites, and monitor the first line's adherence to regulatory requirements.

They do not own risk outright. Instead, they provide oversight and ensure accountability.

Who belongs to the second line?

Typical teams include:

  • Risk management (enterprise, operational, cybersecurity, model risk)
  • Compliance and supervision
  • AML/financial crime teams
  • Policy and governance functions
  • Legal (advisory-oriented roles)

These groups operate with independence from revenue-generating business units.

The three lines of defense model

Line of Defense Primary Role Independence Example Function
First Line Owns and manages risk

Low

Business and operational teams

Second Line

 

Oversees and challenges risk

 

Moderate/High

 

Risk and compliance

 

Third Line

Audits controls and frameworks

Highest

Internal audit

The second line acts as the link between business operations and internal audit.

Core responsibilities of the second line

  • Develop and maintain risk and compliance frameworks
  • Establish policies, standards, and controls
  • Conduct ongoing monitoring and oversight
  • Identify and escalate risk exposure
  • Provide reporting to executive leadership and the board

The goal: ensure the firm is proactively managing operational, communications, regulatory, and conduct risk.

Regulatory expectations

Regulators worldwide require firms to maintain strong oversight structures. For financial services:

  • SEC and FINRA expect independent compliance monitoring
  • Banking regulators reinforce risk governance through Basel III
  • CFTC and NIST frameworks shape cyber and operational resiliency
  • Supervisory policies must include clear accountability and documentation

Core expectations:

  • Independence from business functions
  • Effective monitoring and escalation
  • Auditable risk reporting and governance
  • Training and communication to frontline teams

Technology that supports the second line

Digital transformation is driving new requirements — and new tools:

  • Automated supervision and communications monitoring
  • Regulatory change management software
  • Risk analytics and reporting dashboards
  • Workflow tools for remediation, certifications, and issues management

Modern oversight requires complete, accurate, and actionable risk visibility.

Challenges for second-line teams

  • Expanding digital communication channels
  • Increasing regulatory scrutiny of oversight responsibilities
  • Fragmented data and inconsistent monitoring processes
  • Pressure to reduce cost while improving controls

Risk functions must continually evolve to remain effective.

Quick compliance checklist

  • How is responsibility for risk oversight clearly defined between the first, second, and third lines?
  • Are compliance and risk teams independent from revenue-generating functions?
  • Are risk policies, standards, and controls documented and accessible?
  • Are monitoring and escalation procedures in place and tested regularly?
  • Is there an audit trail for all risk assessments, reviews, and remediation actions?
  • Are employees trained on risk management and compliance responsibilities?

How can organizations strengthen their second line of defense?

Best practices include:

  • Clearly define ownership and accountability across all three defense lines
  • Provide adequate authority and resourcing for oversight functions
  • Align policies to current regulatory expectations
  • Leverage automation to eliminate manual monitoring gaps
  • Ensure high-quality risk reporting flows to leadership

A strong second line improves both compliance and business performance.

How Smarsh supports the second line of defense

Smarsh provides solutions that enhance oversight, monitoring, and reporting, helping second-line teams fulfill their regulatory and risk obligations:

  • Capture and archive communications across email, chat, voice, collaboration, and social platforms
  • Automated supervision workflows to detect compliance risks or policy breaches
  • WORM-compliant, immutable storage for audit-ready records
  • Robust reporting and dashboards for risk and compliance oversight
  • Cross-channel e-discovery and monitoring for audits, investigations, and regulatory requests
  • Support for hybrid and BYOD environments to ensure consistent supervision

→ Explore how Smarsh helps firms meet second line of defense requirements

FAQ

Contact Us

Tell us about yourself, and we’ll be in touch right away.

icon-angle icon-bars icon-times