Risk Assessment
Definition
Risk assessment is a structured process for identifying, analyzing, and evaluating information security risks so an organization can make consistent decisions about what to fix, accept, transfer, or avoid. It typically starts by defining scope (systems, data, locations, and business processes), then listing relevant assets and the threats and vulnerabilities that could affect them. Each identified risk is then analyzed to estimate likelihood and impact using agreed criteria (for example, a qualitative scale such as low/medium/high or a numerical score). The result is compared to risk acceptance criteria to decide whether the risk is tolerable or requires treatment. Good risk assessments also assign a risk owner, document assumptions and evidence, and record the chosen treatment approach and target dates. The output is commonly maintained in a risk register and used to prioritize security controls, justify budget, guide architecture decisions, and demonstrate due diligence during audits. Risk assessment is not a one-time exercise; it should be updated when there are meaningful changes such as new products, major incidents, mergers, regulatory shifts, or material technology and supplier changes.
Real-World Examples
Startup product launch review
Before releasing a new customer portal, a small team assesses risks like weak authentication, misconfigured access permissions, and insufficient logging, then prioritizes fixes before launch.
Scaleup cloud architecture change
During a migration to a new cloud environment, the security team evaluates risks from exposed storage, overly broad network rules, and third-party integrations, documenting likelihood/impact and owners.
Enterprise third-party risk evaluation
An enterprise assesses a critical supplier’s access to internal systems, identifying risks such as excessive privileges and weak incident reporting, and sets contractual and technical treatment actions.
Incident-driven reassessment
After a phishing incident, the organization reassesses the likelihood and impact of account compromise and updates risk scores, treatment plans, and evidence in the risk register.
In information security, a risk assessment is the method an organization uses to identify security risks, estimate likelihood and impact using defined criteria, and determine which risks need treatment versus which can be accepted. The key is that the approach is repeatable, documented, and produces auditable records such as risk criteria, risk owners, and results in a risk register.
A practical approach is: define scope and context, identify assets and data, list threats and vulnerabilities, describe risk scenarios, rate likelihood and impact using agreed scales, calculate a risk level, compare to acceptance criteria, assign a risk owner, record treatment decisions, and document evidence and assumptions. Repeat the process on a schedule and whenever significant changes occur.
A sound risk assessment process includes defined risk criteria (how likelihood and impact are measured), consistent evaluation methods, and documented results. It should be repeatable, able to determine which risks need treatment, and produce records that show how decisions were made and approved.
The best template is one that matches your environment and is easy to maintain: it should capture scope, asset/process, risk scenario, existing controls, likelihood, impact, risk score, risk owner, decision (treat/accept/transfer/avoid), treatment actions, target dates, and evidence links. A simple spreadsheet can work for small teams, while larger organizations may prefer a structured risk register format with workflow and review tracking.
Risk criteria define how you rate likelihood and impact and how scores map to risk levels (for example, what “high impact” means). Risk acceptance criteria define what level of risk is tolerable without further treatment and who can approve acceptance. Both should reflect business objectives, legal and contractual obligations, and the organization’s risk appetite, and they should be documented and consistently applied.
Likelihood is typically estimated based on exposure, threat capability, control strength, and historical incidents, while impact considers confidentiality, integrity, availability, financial loss, operational disruption, and reputational harm. Many teams use a 3x or 5x matrix (likelihood x impact) with clear definitions for each level to keep scoring consistent across assessors and over time.
Risk assessment is the process of identifying and evaluating risks and deciding whether they are acceptable. Risk treatment is what you do about the unacceptable risks: selecting controls and actions, implementing them, and confirming they reduce risk to an acceptable level. Treatment decisions and residual risk should be recorded and owned by accountable stakeholders.
You should update it on a defined cadence (commonly at least annually) and whenever major changes occur, such as new systems, significant releases, supplier changes, restructures, or security incidents. The right frequency depends on the pace of change and risk appetite, but auditors generally expect evidence that updates are triggered by meaningful business or technology changes.
Effective risk assessments involve cross-functional input: security for methodology and controls, IT/engineering for technical realities, business owners for impact and priorities, and relevant support functions such as legal, procurement, and operations. Each risk should have a clearly named risk owner who can approve acceptance or sponsor treatment actions.
Auditors typically expect documented risk criteria and acceptance criteria, a repeatable methodology, records of identified risks with scores and owners, treatment decisions and plans, approval of accepted risks, and evidence of review and updates over time. They may also look for links to supporting artifacts such as incident records, architecture changes, vulnerability results, and control implementation evidence.
| Version | Date | Author | Description |
|---|---|---|---|
| 1.0.0 | 2026-02-26 | WatchDog Security GRC Wiki Team | Initial publication |