Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
stylenone

...

Risk Management Domain Attributes

Property

Description

Example

riskID

Unique identifier for the risk element

"RISK-CYBER-001"

title

The name or title of the risk

"Critical Data Breach Risk"

description

A detailed explanation of the risk

"The risk of unauthorized access to or exfiltration of sensitive customer data..."

riskCategory

Classification of risk type

"technology"

orgUnitTitle

Organization unit responsible for managing risk

"Information Security Department"

orgUnitRoles

Specific roles managing this risk

["Chief Information Security Officer", "Security Operations Manager"]

riskSource

Origin of the risk

"external"

riskOwner

Individual or role responsible for risk management

"Chief Information Security Officer"

riskProbability

Likelihood of risk occurrence

{"level": "moderate", "numericValue": 0.35}

riskImpact

Potential effect if risk is realized

{"level": "severe", "financialImpact": "$5-15 million"}

riskSeverity

Combined measure of probability and impact

{"level": "high", "score": 16}

riskTolerance

Acceptable level of this risk

{"toleranceLevel": "low", "thresholds": [{...}]}

riskStatus

Current status in management lifecycle

"mitigated"

mitigationStrategy

Approach to risk reduction

{"approachType": "reduce", "description": "Comprehensive cybersecurity program..."}

residualRisk

Risk remaining after controls

{"level": "moderate", "acceptableLevel": true}

controlEffectiveness

Effectiveness of current controls

{"level": "effective", "lastAssessment": "2025-03-15"}

reviewFrequency

How often risk is reassessed

"quarterly"

regulatoryImplications

Compliance aspects of this risk

[{"regulationType": "Data Protection", "regulationName": "GDPR"}]

strategicImplications

Impact on strategic objectives

{"overallImpact": "mixed", "affectedObjectives": [{...}]}

emergingFactors

Developing influences on this risk

[{"factorName": "AI-Enhanced Cyber Threats", "timeHorizon": "medium-term"}]

relatedRisks

Relationships to other risks

[{"riskID": "RISK-TECH-005", "relationshipType": "contributor"}]

keyRiskIndicators

Metrics used to monitor this risk

[{"indicatorName": "Security Incidents", "currentValue": "12"}]

Risk Assessment Element Schema

Property

Description

Example

assessmentID

Unique identifier for the risk assessment

"ASSESS-CYBER-2025-Q1"

assessmentTitle

Name of the specific risk assessment

"Annual Cybersecurity Risk Assessment"

description

Detailed explanation of the risk assessment

"Comprehensive assessment of cybersecurity risks including threats, vulnerabilities..."

orgUnitTitle

Organization unit conducting assessment

"Information Security Department"

assessmentMethod

Methodology used for assessment

"quantitative"

assessmentScope

Boundaries of the assessment

{"inScope": ["Enterprise applications", "Customer data systems"]}

assessmentContext

Business context for the assessment

"Supporting digital transformation initiative while ensuring data protection"

assessmentDate

When assessment was conducted

{"startDate": "2025-01-15", "completionDate": "2025-02-28"}

assessmentParticipants

People involved in assessment

[{"participantName": "Sarah Johnson", "participantRole": "CISO"}]

riskCriteria

Criteria for evaluating risks

{"probabilityCriteria": [{...}], "impactCriteria": [{...}]}

identifiedRisks

Risks discovered during assessment

[{"riskID": "RISK-CYBER-001", "riskTitle": "Critical Data Breach Risk"}]

riskRankings

Prioritization of risks

[{"riskID": "RISK-CYBER-001", "priority": "high"}]

assessmentFindings

Key outcomes and insights

[{"findingTitle": "Inadequate API security controls", "findingSeverity": "high"}]

assessmentRecommendations

Suggested actions

[{"recommendationTitle": "Implement API gateway", "recommendationPriority": "high"}]

assessmentOwner

Responsible party for assessment

"Chief Information Security Officer"

nextAssessment

Timing for follow-up

{"plannedDate": "2026-01-15", "triggerEvents": ["Major system change"]}

Risk Control Element Schema

Property

Description

Example

controlID

Unique identifier for the risk control

"CTRL-CYBER-008"

controlTitle

Name of the specific risk control

"Multi-factor Authentication"

description

Detailed explanation of the risk control

"Requiring two or more verification factors before granting system access"

orgUnitTitle

Organization unit responsible for this control

"IT Security Operations"

controlType

Type of control measure

"preventive"

controlCategory

Functional category of control

"technical"

controlMethod

How control operates

"automated"

controlObjective

What the control aims to achieve

"Prevent unauthorized access to systems and data through credential compromise"

implementationStatus

Current implementation state

"operational"

controlEffectiveness

How well control works

{"designEffectiveness": "effective", "operationalEffectiveness": "effective"}

controlOwner

Responsible party for implementation

"Identity & Access Management Manager"

controlCost

Cost of implementation and maintenance

{"implementationCost": 250000, "recurringCost": 80000, "costPeriod": "annually"}

controlDocumentation

Reference documentation

[{"documentName": "MFA Standard", "documentType": "standard"}]

controlTesting

How and when control is tested

{"testingMethod": "automated-monitoring", "testingFrequency": "monthly"}

controlledRisks

Risks addressed by this control

[{"riskID": "RISK-CYBER-001", "controlWeight": 5}]

relatedControls

Other linked control measures

[{"controlID": "CTRL-CYBER-012", "relationshipType": "complementary"}]

controlStandards

Standards applied to this control

[{"standardName": "NIST 800-53", "standardReference": "IA-2(1)"}]

exceptionsProcess

Process for handling control exceptions

"Requires CISO approval with business justification and compensating controls"

Risk Response Element Schema

Property

Description

Example

responseID

Unique identifier for the risk response

"RESP-CYBER-003"

responseTitle

Name of the specific risk response

"Enhanced Data Protection Program"

description

Detailed explanation of the risk response

"Comprehensive program to strengthen data security controls and practices"

orgUnitTitle

Organization unit responsible for this response

"Information Security Department"

responseStrategy

Approach to handling risk

"reduce"

responseDescription

Detailed explanation of response approach

"Implementing technical controls, process improvements, and awareness training"

targetedRisks

Risks being addressed

[{"riskID": "RISK-CYBER-001", "targetRiskLevel": "low"}]

responseOwner

Responsible party

"Chief Information Security Officer"

responsePriority

Priority level

"high"

responseStatus

Current implementation status

"in-progress"

responseTimeline

Implementation schedule

{"startDate": "2025-01-01", "targetEndDate": "2025-06-30"}

responseSuccess

Criteria for successful response

{"successCriteria": [{"criterionName": "Security control implementation"}]}

responseResources

Resources required

{"budget": 750000, "personnel": [{"role": "Security Engineer"}]}

responseReporting

How progress is reported

{"reportingFrequency": "monthly", "reportingMethod": "Executive dashboard"}

responseReview

Process for reviewing effectiveness

{"reviewMethod": "Independent assessment", "reviewFrequency": "quarterly"}

costBenefitAnalysis

Analysis of response value

{"implementationCost": 750000, "recurringCosts": 250000, "returnOnInvestment": "325%"}

implementedControls

Controls implemented as part of response

[{"controlID": "CTRL-CYBER-008", "implementationStatus": "implemented"}]

lessonsLearned

Insights from response implementation

[{"lessonDescription": "Early stakeholder engagement critical to success"}]

Risk Monitoring Element Schema

Property

Description

Example

monitoringID

Unique identifier for the risk monitoring activity

"MON-CYBER-002"

monitoringTitle

Name of the specific risk monitoring activity

"Cybersecurity Risk Monitoring Program"

description

Detailed explanation of the risk monitoring activity

"Continuous monitoring of key risk indicators and control effectiveness"

orgUnitTitle

Organization unit responsible for this monitoring

"Security Operations Center"

monitoredRisks

Risks being monitored

[{"riskID": "RISK-CYBER-001", "monitoringPriority": "high"}]

keyRiskIndicators

Indicators being tracked

[{"indicatorName": "Security Incidents", "currentValue": "12"}]

monitoringFrequency

Frequency of monitoring activities

{"reviewCycle": "continuous", "justification": "Critical risk requiring real-time visibility"}

monitoringMethods

Approaches used for monitoring

[{"methodName": "SIEM Analytics", "automationLevel": "fully-automated"}]

earlyWarningSystem

System for early detection of risk changes

{"alertMechanisms": ["Automated alerts", "Dashboard indicators"]}

monitoringResponsibilities

People responsible for monitoring

[{"role": "SOC Analyst", "responsibilities": ["Monitor alerts", "Initial triage"]}]

reportingStructure

How monitoring results are reported

{"reportTypes": [{"reportName": "Weekly Security Status", "reportFrequency": "weekly"}]}

technologySystems

Systems supporting monitoring

[{"systemName": "Security Information & Event Management", "systemFunction": "Log analysis"}]

dataManagement

How monitoring data is managed

{"dataSources": ["Firewall logs", "IDS alerts", "Authentication logs"]}

historicalPerformance

History of monitoring effectiveness

{"successRate": "93% of incidents detected by monitoring systems"}

Schema Evolution Guidance

The Risk Management Domain schema is expected to evolve with emerging practices in risk management. Future extensions may include:

  • Enhanced predictive risk analytics

  • AI-assisted risk identification and assessment

  • Dynamic risk modeling capabilities

  • Operational resilience frameworks

  • Cyber and digital risk extensions

  • Integrated governance, risk, and compliance models

...

Systems supporting monitoring

[{"systemName": "Security Information & Event Management", "systemFunction": "Log analysis"}]

dataManagement

How monitoring data is managed

{"dataSources": ["Firewall logs", "IDS alerts", "Authentication logs"]}

historicalPerformance

History of monitoring effectiveness

{"successRate": "93% of incidents detected by monitoring systems"}