Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Table of Contents
stylenone

...

Overview

What is the Risk Management Domain?

...

  • Key risk indicators

  • Monitoring frequency and methods

  • Threshold definitions and alerts

  • Trend analysis approaches

  • Escalation pathways

  • Reporting structures

Implementation Guidelines

Getting Started

  1. Begin by identifying and documenting key risk categories

  2. Select a high-priority risk and create a detailed risk profile

  3. Document the assessment methodology used to evaluate risks

  4. Map major control mechanisms and their effectiveness

  5. Define response strategies for priority risks

Best Practices

  • Ensure risk profiles have clear ownership and accountability

  • Base risk assessments on consistent and objective criteria

  • Update risk evaluations regularly as internal and external factors change

  • Connect risk elements to strategic decisions and operational capabilities

  • Involve multiple perspectives in risk analysis to avoid bias

  • Maintain a balance between risk control costs and potential impact

Common Pitfalls to Avoid

  • Creating overly complex risk categorization that dilutes management focus

  • Basing risk assessments on assumptions rather than evidence

  • Failing to connect risk analysis to strategic and operational domains

  • Not updating risk profiles as business context evolves

  • Focusing exclusively on risk avoidance while missing positive risk (opportunity)

  • Overlooking risk interdependencies and cascading effects

Schema Evolution Guidance

The Risk Management Domain schema is expected to evolve with emerging practices in risk management. Future extensions may include:

  • Enhanced predictive risk analytics

  • AI-assisted risk identification and assessment

  • Dynamic risk modeling capabilities

  • Operational resilience frameworks

  • Cyber and digital risk extensions

  • Integrated governance, risk, and compliance models

Organizations should plan for these evolutions by maintaining clean taxonomies and clear relationship models in their current implementation.

Conclusion

The Risk Management Domain extends the Orthogramic Metamodel with a robust framework for modeling and managing risk-related aspects of business architecture. By providing structured schemas for risk profiles, assessments, controls, responses, and monitoring approaches, it enables organizations to systematically align their capabilities, value streams, and strategies with risk management objectives.

The integration with the Strategic Response Model ensures that risk insights drive strategic decision-making and organizational change. This domain complements other domains by focusing on the uncertainty dimensions that affect organizational activities, providing critical context for strategic planning and operational execution.

Organizations can use this domain to develop a more comprehensive understanding of their risk landscape, implement effective controls, and ensure that strategic initiatives properly account for risk factors in design and execution.

Risk Management Domain Schema

Cross-Domain Relationship Mappings

Risk-Strategy Relationship Schema

Code Block
{
  "$schema": "http://json-schema.org/draft-07/schema#",
  "title": "Risk-Strategy Relationship Schema",
  "description": "Schema for relationships between Risk Management domain and Strategy domain",
  "type": "object",
  "required": ["relationshipID", "riskID", "title", "relationshipType"],
  "properties": {
    "relationshipID": {
      "type": "string",
      "description": "Unique identifier for this relationship"
    },
    "riskID": {
      "type": "string",
      "description": "ID of the risk element"
    },
    "title": {
      "type": "string",
      "description": "Name of the strategy"
    },
    "relationshipType": {
      "type": "string",
      "description": "Nature of the risk influence on strategy",
      "enum": ["strategic-threat", "strategic-opportunity", "execution-risk", "enabler", "constraint", "context-factor", "success-factor", "other"]
    },
    "relationshipStrength": {
      "type": "integer",
      "description": "Strength of influence (1-5)",
      "minimum": 1,
      "maximum": 5
    },
    "riskFactors": {
      "type": "array",
      "description": "Risk factors influencing this strategy",
      "items": {
        "type": "string"
      }
    },
    "strategicImpact": {
      "type": "object",
      "description": "How risk impacts strategic elements",
      "properties": {
        "impactDescription": {
          "type": "string",
          "description": "Description of impact"
        },
        "impactSeverity": {
          "type": "string",
          "description": "Severity of impact",
          "enum": ["minimal", "moderate", "significant", "severe", "critical"]
        },
        "potentialOutcomes": {
          "type": "array",
          "description": "Possible strategic outcomes",
          "items": {
            "type": "string"
          }
        }
      }
    },
    "strategicObjectives": {
      "type": "array",
      "description": "Strategic objectives affected by risk",
      "items": {
        "type": "object",
        "properties": {
          "objectiveID": {
            "type": "string",
            "description": "ID of strategic objective"
          },
          "riskImpact": {
            "type": "string",
            "description": "How risk impacts this objective"
          },
          "importanceLevel": {
            "type": "string",
            "description": "Importance to objective",
            "enum": ["minor", "moderate", "significant", "critical"]
          }
        }
      }
    },
    "riskAdjustments": {
      "type": "array",
      "description": "Strategic adjustments made for risk",
      "items": {
        "type": "object",
        "properties": {
          "adjustmentDescription": {
            "type": "string",
            "description": "Description of adjustment"
          },
          "adjustmentType": {
            "type": "string",
            "description": "Type of adjustment",
            "enum": ["scope-change", "timeline-adjustment", "resource-increase", "goal-modification", "approach-change", "other"]
          },
          "effectiveness": {
            "type": "string",
            "description": "Effectiveness of adjustment",
            "enum": ["ineffective", "partially-effective", "effective", "highly-effective", "not-assessed"]
          }
        }
      }
    },
    "riskAppetite": {
      "type": "object",
      "description": "Strategic risk appetite",
      "properties": {
        "appetiteLevel": {
          "type": "string",
          "description": "Level of risk appetite",
          "enum": ["averse", "minimalist", "cautious", "open", "seeking"]
        },
        "appetiteJustification": {
          "type": "string",
          "description": "Reason for this appetite level"
        },
        "variationByObjective": {
          "type": "array",
          "description": "How appetite varies by objective",
          "items": {
            "type": "object",
            "properties": {
              "objectiveID": {
                "type": "string",
                "description": "ID of objective"
              },
              "specificAppetite": {
                "type": "string",
                "description": "Specific appetite for this objective",
                "enum": ["averse", "minimalist", "cautious", "open", "seeking"]
              }
            }
          }
        }
      }
    },
    "strategicMonitoring": {
      "type": "object",
      "description": "How risk is monitored in strategy",
      "properties": {
        "monitoringApproach": {
          "type": "string",
          "description": "How risk is tracked strategically"
        },
        "keyIndicators": {
          "type": "array",
          "description": "Strategic indicators being tracked",
          "items": {
            "type": "string"
          }
        },
        "reviewFrequency": {
          "type": "string",
          "description": "How often strategic risk is reviewed",
          "enum": ["monthly", "quarterly", "semi-annually", "annually", "event-driven"]
        }
      }
    },
    "contingencyPlans": {
      "type": "array",
      "description": "Strategic contingencies for risk events",
      "items": {
        "type": "object",
        "properties": {
          "scenarioDescription": {
            "type": "string",
            "description": "Risk scenario"
          },
          "contingencyApproach": {
            "type": "string",
            "description": "Planned response"
          },
          "triggerConditions": {
            "type": "string",
            "description": "What activates contingency"
          }
        }
      }
    }
  }
}

Risk-Capability Relationship Schema

Code Block
{
  "$schema": "http://json-schema.org/draft-07/schema#",
  "title": "Risk-Capability Relationship Schema",
  "description": "Schema for relationships between Risk Management domain and Capability domain",
  "type": "object",
  "required": ["relationshipID", "riskID", "title", "relationshipType"],
  "properties": {
    "relationshipID": {
      "type": "string",
      "description": "Unique identifier for this relationship"
    },
    "riskID": {
      "type": "string",
      "description": "ID of the risk element"
    },
    "title": {
      "type": "string",
      "description": "Name of the capability"
    },
    "relationshipType": {
      "type": "string",
      "description": "Nature of the relationship",
      "enum": ["risk-to-capability", "capability-to-risk", "mitigating-capability", "risk-generating-capability", "impacted-capability", "interdependent", "other"]
    },
    "relationshipStrength": {
      "type": "integer",
      "description": "Importance of this relationship (1-5)",
      "minimum": 1,
      "maximum": 5
    },
    "riskImpact": {
      "type": "object",
      "description": "How risk impacts capability",
      "properties": {
        "impactDescription": {
          "type": "string",
          "description": "Description of impact"
        },
        "impactSeverity": {
          "type": "string",
          "description": "Severity of impact",
          "enum": ["minimal", "moderate", "significant", "severe", "critical"]
        },
        "impactScenarios": {
          "type": "array",
          "description": "Specific impact scenarios",
          "items": {
            "type": "string"
          }
        }
      }
    },
    "capabilityControls": {
      "type": "array",
      "description": "Controls within capability addressing risk",
      "items": {
        "type": "object",
        "properties": {
          "controlDescription": {
            "type": "string",
            "description": "Description of control"
          },
          "controlEffectiveness": {
            "type": "string",
            "description": "How well control works",
            "enum": ["ineffective", "partially-effective", "effective", "highly-effective", "not-assessed"]
          },
          "implementationStatus": {
            "type": "string",
            "description": "Status of implementation",
            "enum": ["not-implemented", "planning", "in-progress", "implemented", "verified"]
          }
        }
      }
    },
    "capabilityGaps": {
      "type": "array",
      "description": "Capability gaps increasing risk",
      "items": {
        "type": "object",
        "properties": {
          "gapDescription": {
            "type": "string",
            "description": "Description of gap"
          },
          "riskContribution": {
            "type": "string",
            "description": "How gap contributes to risk"
          },
          "remediation": {
            "type": "string",
            "description": "Plan to address gap"
          }
        }
      }
    },
    "performanceMetrics": {
      "type": "array",
      "description": "Metrics for measuring risk impact on capability",
      "items": {
        "type": "object",
        "properties": {
          "metricName": {
            "type": "string",
            "description": "Name of metric"
          },
          "metricDescription": {
            "type": "string",
            "description": "What metric measures"
          },
          "currentValue": {
            "type": "string",
            "description": "Current measurement"
          },
          "targetValue": {
            "type": "string",
            "description": "Target value"
          }
        }
      }
    },
    "improvementInitiatives": {
      "type": "array",
      "description": "Initiatives to improve capability for risk management",
      "items": {
        "type": "object",
        "properties": {
          "initiativeDescription": {
            "type": "string",
            "description": "Description of initiative"
          },
          "expectedOutcome": {
            "type": "string",
            "description": "Anticipated result"
          },
          "status": {
            "type": "string",
            "description": "Current status",
            "enum": ["proposed", "approved", "in-progress", "completed", "canceled"]
          }
        }
      }
    },
    "dependencyRisks": {
      "type": "array",
      "description": "Risks arising from capability dependencies",
      "items": {
        "type": "object",
        "properties": {
          "dependencyType": {
            "type": "string",
            "description": "Type of dependency"
          },
          "dependentEntity": {
            "type": "string",
            "description": "What capability depends on"
          },
          "riskScenario": {
            "type": "string",
            "description": "Risk scenario created by dependency"
          }
        }
      }
    }
  }
}

Strategic Response Model Integration

Risk-Related Rationales Schema

...

Conclusion

The Risk Management Domain extends the Orthogramic Metamodel with a robust framework for modeling and managing risk-related aspects of business architecture. By providing structured schemas for risk profiles, assessments, controls, responses, and monitoring approaches, it enables organizations to systematically align their capabilities, value streams, and strategies with risk management objectives.

The integration with the Strategic Response Model ensures that risk insights drive strategic decision-making and organizational change. This domain complements other domains by focusing on the uncertainty dimensions that affect organizational activities, providing critical context for strategic planning and operational execution.

Organizations can use this domain to develop a more comprehensive understanding of their risk landscape, implement effective controls, and ensure that strategic initiatives properly account for risk factors in design and execution.

Example Implementation

Example: Cybersecurity Risk Profile Analysis

Code Block
{
  "riskID": "RISK-CYBER-001",
  "title": "Critical Data Breach Risk",
  "description": "The risk of unauthorized access to or exfiltration of sensitive customer and financial data through external cyberattack or internal compromise, resulting in regulatory sanctions, financial loss, and reputational damage.",
  "riskCategory": "technology",
  "orgUnitTitle": "Information Security Department",
  "orgUnitRoles": ["Chief Information Security Officer", "Security Operations Manager", "Data Protection Officer"],
  "riskSource": "external",
  "riskOwner": "Chief Information Security Officer",
  "riskProbability": {
    "level": "moderate",
    "numericValue": 0.35,
    "rationale": "Based on threat intelligence showing increased targeting of our industry, balanced against our enhanced security controls",
    "timeHorizon": "12 months"
  },
  "riskImpact": {
    "rationaleIDlevel": {
 "severe",
    "typefinancialImpact": "string$5-15 million",
 
    "descriptionnonFinancialImpacts": "Unique identifier for the rationale"
 [
      {
        "impactType": "reputational",
   },     "rationaleTitledescription": {"Severe damage to brand trust and customer confidence"type": "string",,
        "descriptionseverity": "high"Title
or summary of the rationale"  },
  },    {
"description": {       "typeimpactType": "stringregulatory",
        "description": "DetailedSubstantial explanationfines supportingunder adata strategicprotection response"
    }regulations",
    "triggerReference": {
      "typeseverity": "stringhigh",
      "description": "Primary trigger this rationale responds to"
},
      {
   },     "triggerReferencesimpactType": {"operational",
        "typedescription": "arrayService disruption during incident response",
        "descriptionseverity": "Optional multiple triggers this rationale addresses",medium"
      "items":}
{    ],
    "typerationale": "string"
      }
 Based on analysis of recent industry breaches and our specific data exposure"
  },
    "riskIDsriskSeverity": {
 
    "typelevel": "arrayhigh",
    "score": 16,
    "descriptioncalculationMethod": "Risks this rationale relates to",5x5 risk matrix combining probability and impact values"
   },
  "itemsriskTolerance": {
    "toleranceLevel": "low",
    "typethresholds": "string"[
      }{
    },    "metricName": "linkedDomains": {Security incidents involving PII",
        "typethresholdValue": "array0",
        "descriptionresponseRequired": "Business architecture domains influenced or justified by this rationale",
Immediate executive notification and investigation"
      },
     "items": {
        "typemetricName": "stringFailed security tests",
        "enumthresholdValue": ["Risk", "Strategy">5%",
"Capability", "Product", "Service", "Value_Stream", "Performance", "Information", "Organization", "Initiative", "Customer", "MarketresponseRequired",: "Finance"]Security remediation within 48    }
    },
    "rationaleType": {hours"
      }
 "type": "string",  ],
    "descriptionrationale": "TheGiven regulatory justificationrequirements typeand forpotential thisreputational rationaleimpact",
   },
  "enumriskStatus": ["Risk_Preventionmitigated",
  "Risk_Mitigation", "Risk_Transfer", "Risk_Acceptance", "Control_Enhancement", "Response_Planning", "Opportunity_Exploitation", "Compliance_Management"]
    },
    "rationaleOrientation": {
      "type": "string",
 mitigationStrategy": {
    "approachType": "reduce",
    "description": "Comprehensive cybersecurity program including advanced threat protection, security monitoring, encryption, access controls, and security awareness training",
    "descriptionexpectedOutcome": "WhetherReduce thelikelihood rationaleof issuccessful respondingbreach towhile existingmaintaining conditions or anticipating future conditionsdetection capabilities",
      "enumimplementationStatus": ["Reactive", "Proactive"]
 "implemented"
  },
 
  "riskInsightSourceresidualRisk": {
      "typelevel": "stringmoderate",

     "descriptionacceptableLevel": "Source of risk insights supporting this rationale",
 true,
    "enumdescription": ["Risk_Assessment", "Incident_Analysis", "Control_Monitoring", "Audit_Finding", "Industry_Intelligence", "Scenario_Analysis", "Expert_Judgment"]
    }Remaining risk primarily related to zero-day vulnerabilities and sophisticated threat actors",
    "anticipatedOutcomesadditionalControls": {[
      "type": "arrayInvestigating additional advanced endpoint protection",
      "description": "For proactive rationales, the expected benefits or outcomes",
   Enhancing threat hunting capabilities"
    ]
  },
  "itemscontrolEffectiveness": {
        "typelevel": "stringeffective",
      }
    }"lastAssessment": "2025-03-15",
    "alternativesConsideredimprovementNeeds": {[
      "type": "array",
      "description": "Other risk approaches that were evaluated but not selected",
 Strengthen third-party security assessment process",
      "Enhance cloud security monitoring"
    "items":]
{  },
  "reviewFrequency": "quarterly",
  "typelastReviewDate": "object2025-04-01",
     "nextReviewDate": "2025-07-01",
  "propertiesregulatoryImplications": [
{    {
      "alternativeIDregulationType": {"Data Protection",
           "typeregulationName": "stringGDPR",
      "implications": "Breach notification requirements and potential fines up "description": "Identifier for the alternative"to 4% of global revenue",
      "complianceStatus": "compliant"
    },
    {
      "alternativeDescriptionregulationType": {"Financial",
       "regulationName": "PCI-DSS",
      "typeimplications": "string",Requirements for securing payment card  data",
      "descriptioncomplianceStatus": "compliant"Description
of the alternative approach" }
  ],
  "strategicImplications": {
  },  "overallImpact": "mixed",
    "affectedObjectives": [
 "riskImplications": {    {
        "typeobjectiveID": "stringSTRAT-DIGITAL-003",
   
        "descriptionimpactDescription": "Risk implicationsconsiderations ofrequire thisadjustment alternative"to cloud migration timeline",
       }, "impactSeverity": "moderate"
      },
 "reasonForRejection": {    {
        "typeobjectiveID": "stringSTRAT-CUSTOMER-002",

           "descriptionimpactDescription": "Why this approach wasn't selected"
      Enhanced security measures could create friction in customer experience",
   }     "impactSeverity": "minor"
  }    }
  }  ]
  },
    "reasoningPatternemergingFactors": [
    {
      "typefactorName": "stringAI-Enhanced Cyber Threats",
      "description": "TheIncreasing logicalsophistication structure of theattacks rationale",using AI to evade  detection",
 "enum": ["Risk_Based", "Control_Effectiveness", "Cost_Benefit", "Compliance_Based", "Threat_AssessmentpotentialImpact",: "Vulnerability_Based", "Impact_Analysis"]
    },
    "evidenceBase": {Could increase probability of successful breach",
      "typetimeHorizon": "stringmedium-term",
      "descriptionmonitoringApproach": "TheThreat intelligence foundationsubscription forand thequarterly rationale"assessment"
    },
    {
 "enum": ["Risk_Data", "Control_Testing", "Incident_History", "External_Intelligence", "Compliance_Requirements", "Expert_OpinionfactorName",: "Quantitative_Analysis"]Extended Supply Chain Exposure",
 },     "businessValueTypedescription": {"Increasing integration with third-party systems expanding  "type": "stringattack surface",
      "descriptionpotentialImpact": "TheNew naturevectors offor value creation or preservationdata compromise",
      "enumtimeHorizon": ["Loss_Preventionimmediate", "Damage_Limitation", "Reputation_Protection", "Compliance_Assurance", "Operational_Resilience", "Strategic_Protection", "Opportunity_Enabling"]
      "monitoringApproach": "Third-party security assessment program"
    },
  ],
  "riskImpactAssessmentrelatedRisks": [
    {
      "typeriskID": "objectRISK-TECH-005",
      "descriptionrelationshipType": "Assessment of risk implicationscontributor",
      "propertiesrelationshipStrength": {
4,
       "impactTypedescription": {"Legacy System Maintenance Risk contributes to cybersecurity vulnerabilities"
   "type": "string", },
    {
      "descriptionriskID": "Type of risk impact",
   RISK-COMP-002",
      "enumrelationshipType": ["financialconsequence",
      "operationalrelationshipStrength": 5,
"strategic", "reputational",      "compliancedescription",: "multiple"]Data breach would trigger Regulatory Compliance Risk"
  },  }
  ],
   "impactSeveritykeyRiskIndicators": {[
    {
      "typeindicatorName": "stringSecurity Incidents",
   
      "description": "SeverityNumber of security impactincidents ifdetected notper addressedmonth",

         "enumcurrentValue": ["minimal", "moderate", "significant", "severe", "critical"]
        },
 "12",
      "impactLikelihoodthreshold": {
   "25",
      "typetrend": "stringstable",
   
      "descriptionmonitoringFrequency": "Likelihooddaily"
of impact if not addressed"},
    {
      "enumindicatorName": ["very-low", "low", "moderateVulnerability Remediation Time",
"high", "very-high"]     "description": "Average time to },remediate critical vulnerabilities",
      "confidenceLevelcurrentValue": {
  "1.8 days",
       "typethreshold": "integer3 days",
      "trend": "improving",
      "descriptionmonitoringFrequency": "weekly"Confidence
  in assessment (1-5)", },
    {
      "minimumindicatorName": 1,"Phishing Simulation Success  Rate",
      "maximumdescription": 5"Percentage of employees clicking on simulated phishing emails",
 }       }
    },"currentValue": "4.2%",
      "dateCreatedthreshold": {"5%",
      "typetrend": "stringstable",
      "formatmonitoringFrequency": "date",
monthly"
    }
  ],
  "descriptiondependencies": [
 "The date the rationale{
was first recorded"     },"dependencyType": "Critical",
      "lastRevieweddomainType": {"Capability",
      "typeentityID": "stringCAP-SECOPS-001",
      "formatdescription": "date",
Security Operations capability"
    },
    {
"description": "The most recent date of rationale review"
 "dependencyType": "Important",
  },     "effectivenessRatingdomainType": {"Information",
      "typeentityID": "integerINFO-DATA-003",
      "description": "Optional evaluation of rationale effectiveness (1-5)",
Customer Data Security Classification Framework"
    }
  ],
  "minimumdocumentationReferences": 1, [
    {
      "maximumdocumentName": 5"Information Security Policy",
  },     "authordocumentLocation": { "Policy repository (IS-POL-001)",
      "typedocumentType": "stringpolicy",
      "descriptiondocumentDate": "2024-12-15"The
person or team who documented},
the rationale"   {
 },     "orgUnitTitledocumentName": { "Annual Cybersecurity Risk Assessment",
      "typedocumentLocation": "stringRisk repository (RISK-RPT-2025-01)",
      "descriptiondocumentType": "assessment"The,
organisational unit that owns or authored the rationale"documentDate": "2025-02-28"
    },
  ]
}

Risk Management Domain Schema

Cross-Domain Relationship Mappings

Info

Add to JSON Schema

Convert these Cross domain JSON schema snippets to tables

Risk-Strategy Relationship Schema

Code Block
{
  "relatedRationales$schema": {
   "http://json-schema.org/draft-07/schema#",
  "typetitle": "arrayRisk-Strategy Relationship Schema",

     "description": "ReferencesSchema for torelationships otherbetween relatedRisk rationales",Management domain and Strategy domain",
  "itemstype": {
"object",
       "typerequired": ["stringrelationshipID", "riskID", "title", "relationshipType"],
  "properties": }{
    }"relationshipID": {
 } } 

Risk-Related Strategic Responses Schema

Code Block
{   "$schematype": "http://json-schema.org/draft-07/schema#string",
 
"title": "Risk-Related Strategic Responses Schema",   "description": "SchemaUnique identifier for risk-related strategic responses in the Strategic Response Model", this relationship"
    },
    "riskID": {
      "type": "objectstring",
      "requireddescription": ["responseID", "responseTitle", "responseDescription", "triggerReferences", "rationaleReferences"],
  "properties": {"ID of the risk element"
    },
    "responseIDtitle": {
      "type": "string",
      "description": "AName uniqueof identifier for the strategic responsestrategy"
    },
    "responseTitlerelationshipType": {
      "type": "string "string",
      "description": "Nature of the risk influence on strategy",
      "descriptionenum": ["strategic-threat", "A concise title summarizing the strategic response"strategic-opportunity", "execution-risk", "enabler", "constraint", "context-factor", "success-factor", "other"]
    },
    "responseTyperelationshipStrength": {
      "type": "stringinteger",
      "description": "The classificationStrength of the responseinfluence (1-5)",
      "enumminimum": ["Risk_Prevention"1,
"Risk_Mitigation", "Risk_Transfer", "Risk_Acceptance", "Control_Enhancement", "Incident_Response", "Business_Continuity", "Compliance_Program", "Risk_Governance"]maximum": 5
    },
    "responseDescriptionriskFactors": {
      "type": "stringarray",
      "description": "Risk factors "A detailed explanation of the strategic response, its objectives, and scope"influencing this strategy",
      "items": {
        "type": "string"
      }
    },
    "riskIDsstrategicImpact": {
      "type": "arrayobject",
      "description": "RiskHow elementsrisk thisimpacts responsestrategic addresseselements",
      "itemsproperties": {
        "typeimpactDescription": "string"{
      }     },
 "type": "string",
  "triggerReferences": {       "typedescription": "array",Description of impact"
    "description": "An array of triggerIDs that initiated this strategic response", },
        "itemsimpactSeverity": {
          "type": "string",
      }     },
 "description": "Severity of impact",
  "rationaleReferences": {       "typeenum": ["arrayminimal", "moderate",      "description": "An array of rationaleIDs providing justification for this response","significant", "severe", "critical"]
        },
        "itemspotentialOutcomes": {
          "type": "stringarray"
 ,
    }     },     "performanceIndicatorReferencesdescription": {"Possible strategic   outcomes",
  "type": "array",       "descriptionitems": {
 "Metrics or KPIs that will be used to measure the success of the strategic response","type": "string"
        "items": { }
       "type": "string" }
      }
    },
    "riskOutcomesstrategicObjectives": {
      "type": "array",
      "description": "SpecificStrategic riskobjectives managementaffected outcomes resulting from this responseby risk",
      "items": {
        "type": "object",
        "properties": {
          "outcomeDescriptionobjectiveID": {
            "type": "string",
            "description": "DescriptionID of riskstrategic outcomeobjective"
          },
          "targetRiskLevelriskImpact": {
            "type": "string",
            "description": "DesiredHow risk levelimpacts afterthis responseobjective",
            "enum": ["very-low"},
"low", "moderate", "high", "very-high"]       "importanceLevel":  {
 },           "measurementApproachtype": {"string",
            "typedescription": "stringImportance to objective",
            "enum": ["minor", "descriptionmoderate":, "significant"How outcome will be measured", "critical"]
          }
        }
      }
    },
    "implementedControlsriskAdjustments": {
      "type": "array",
      "description": "RiskStrategic controlsadjustments implementedmade byfor this responserisk",
      "items": {
        "type": "object",
        "properties": {
          "controlNameadjustmentDescription": {
            "type": "string",
            "description": "NameDescription of controladjustment"
          },
          "controlDescriptionadjustmentType": {
            "type": "string",
            "description": "Description of control"Type of adjustment",
            "enum": ["scope-change", "timeline-adjustment", "resource-increase", "goal-modification", "approach-change", "other"]
          },
          "controlTypeeffectiveness": {
            "type": "string",
            "description": "TypeEffectiveness of controladjustment",
            "enum": ["preventiveineffective", "detectivepartially-effective", "correctiveeffective", "directivehighly-effective", "other"not-assessed"]
          },
        }
  "implementationStatus": {   }
    },
    "typeriskAppetite": "string",{
      "type": "object",
      "description": "StatusStrategic ofrisk implementationappetite",
      "properties": {
     "enum": ["planned", "in-progress", "implementedappetiteLevel", "effective", "ineffective"]: {
           }"type": "string",
        }  "description": "Level of risk appetite",
}     },     "affectedDomainsenum": {
      "type": "array",
      "description": "A list of business architecture domains impacted by this response"["averse", "minimalist", "cautious", "open", "seeking"]
        },
        "itemsappetiteJustification": {
          "type": "string",
        "enum": ["Risk", "Strategy", "Capabilitydescription",: "Product", "Service", "Value_Stream", "Performance", "Information", "Organization", "Initiative", "Customer", "Market", "Finance"]Reason for this appetite level"
          },
    },     "implementationPlanvariationByObjective": {
          "type": "objectarray",
          "description": "Plan outlining how the response will be executed",
      "properties": {How appetite varies by objective",
          "phaseApproachitems": {
            "type": "stringobject",
            "descriptionproperties": {
"Phasing of implementation"         },   "objectiveID": {
    "keyActivities": {           "type": "arraystring",
                "description": "MajorID implementationof activitiesobjective",
          "items": {   },
         "type": "string"    "specificAppetite": {
     }         },  "type": "string",
     "resources": {           "typedescription": "stringSpecific appetite for this objective",
                "descriptionenum": ["averse"Resources required for implementation"
 , "minimalist", "cautious", "open", "seeking"]
      },        }
"governanceStructure": {           "type": "string",}
           "description": "Governance over implementation"}
        }
      }
    },
    "riskMonitoringstrategicMonitoring": {
      "type": "arrayobject",
      "description": "OngoingHow risk monitoringis approaches",monitored       "items": {
        "type": "object",
 in strategy",
      "properties": {
          "monitoringMethodmonitoringApproach": {
            "type": "string",
 
          "description": "MethodHow forrisk monitoring"is tracked strategically"
        },
 
        "keyIndicators": {
 
          "type": "array",

           "description": "IndicatorsStrategic indicators being monitoredtracked",

           "items": {
              "type": "string"

           }
          },
 
        "frequencyreviewFrequency": {
 
          "type": "string",
 
          "description": "How often strategic risk monitoringis occursreviewed",
            "enum": ["continuousmonthly", "dailyquarterly", "weekly", "monthly", "quarterlysemi-annually", "annually", "event-driven"]
          }
        }
      }
    },
    "expectedOutcomes": {
      "type": "string",
      "description": "A description of the anticipated results or benefits from implementing the response"
    },
    "responsibleOrgUnits"contingencyPlans": {
      "type": "array",
      "description": "Organisation unitsStrategic accountablecontingencies for executing the strategic responserisk events",
      "items": {
        "type": "stringobject",
        }"properties": {
     },     "startDatescenarioDescription": {
            "type": "string",
 
    "format": "date",       "description": "TheRisk plannedscenario"
start date for implementing the strategic response"
    },
          "endDatecontingencyApproach": {
            "type": "string",
      "format": "date",
      "description": "ThePlanned plannedresponse"
completion date for the strategic response"     },
          "statustriggerConditions": {
            "type": "string",
            "description": "The current status of the strategic response",
": "What activates contingency"
          }
     "enum": ["Planned", "In_Progress", "Completed", "Deferred", "Cancelled"] }
      },
    "lastUpdated":}
{  }
}

Risk-Capability Relationship Schema

Code Block
{
  "type$schema": "stringhttp://json-schema.org/draft-07/schema#",
  "title": "Risk-Capability Relationship Schema",
  "formatdescription": "date",
      "description": "The date when the strategic response record was last updated"
    },Schema for relationships between Risk Management domain and Capability domain",
  "type": "object",
  "required": ["relationshipID", "riskID", "title", "relationshipType"],
  "properties": {
    "residualRiskAssessmentrelationshipID": {
      "type": "string",
      "description": "AssessmentUnique ofidentifier riskfor remaining after response implementationthis relationship"
    },
    "strategicThemesriskID": {
      "type": "arraystring",
      "description": "AnID array of strategicthe prioritiesrisk thatelement"
this initiative supports",  },
    "itemstitle": {
        "type": "string"
      }
    }

 }
}

Example Implementation

Example: Cybersecurity Risk Profile Analysis

Code Block
{     "riskIDtype": "RISK-CYBER-001string",
      "titledescription": "CriticalName Dataof Breachthe Risk",capability"
    },
    "descriptionrelationshipType": "The{
risk of unauthorized access to or exfiltration of sensitive customer and financial data through external cyberattack or internal compromise, resulting in regulatory sanctions, financial loss, and reputational damage.",
  "riskCategory": "technology",
  "orgUnitTitle": "Information Security Department",
  "orgUnitRoles": ["Chief Information Security Officer", "Security Operations Manager", "Data Protection Officer"],
  "riskSource": "external",
  "riskOwner": "Chief Information Security Officer",
  "riskProbability": {
    "level": "moderate""type": "string",
      "description": "Nature of the relationship",
      "enum": ["risk-to-capability", "capability-to-risk", "mitigating-capability", "risk-generating-capability", "impacted-capability", "interdependent", "other"]
    },
    "relationshipStrength": {
      "type": "integer",
      "description": "Importance of this relationship (1-5)",
      "minimum": 1,
      "maximum": 5
    },
    "numericValueriskImpact": 0.35, {
      "rationaletype": "object"Based,
on threat intelligence showing increased targeting of our industry, balanced against our enhanced security controls", "description": "How risk impacts capability",
      "timeHorizonproperties": "12 months"{
     },   "riskImpactimpactDescription": {
          "leveltype": "severestring",
          "financialImpactdescription": "$5-15 million",Description of impact"
        "nonFinancialImpacts": [},
        "impactSeverity": {
          "impactTypetype": "reputationalstring",
          "description": "Severe damage to brand trust and customer confidence",Severity of impact",
          "enum": ["minimal", "moderate", "significant", "severitysevere":, "highcritical"]
        },,
        "impactScenarios": {
          "impactTypetype": "regulatoryarray",
          "description": "SubstantialSpecific finesimpact underscenarios",
data protection regulations",
        "severityitems": "high" {
         },   "type": "string"
  {        }
"impactType": "operational",        }
  "description": "Service disruption during incident}
response",    },
    "severitycapabilityControls": "medium"{
      }
 "type": "array",
  ],     "rationaledescription": "BasedControls onwithin analysiscapability ofaddressing recentrisk",
industry breaches and our specific data exposure"items": {
 },
  "riskSeverity": {     "leveltype": "highobject",
 
  "score": 16,     "calculationMethodproperties": "5x5{
risk matrix combining probability and impact values"   },   "riskTolerancecontrolDescription": {
      "toleranceLevel": "low",     "thresholdstype": [
  "string",
   {         "metricNamedescription": "SecurityDescription incidentsof involvingcontrol"
PII",         "thresholdValue": "0", },
          "responseRequiredcontrolEffectiveness": "Immediate{
executive notification and investigation"       },  "type": "string",
   {         "metricNamedescription": "FailedHow well securitycontrol testsworks",
          "thresholdValue": ">5%",
        "responseRequired": "Security remediation within 48 hours"  "enum": ["ineffective", "partially-effective", "effective", "highly-effective", "not-assessed"]
          },
     ],     "rationaleimplementationStatus": {
"Given regulatory requirements and potential reputational impact"   },   "riskStatustype": "mitigatedstring",
  "mitigationStrategy": {     "approachType": "reduce",     "description": "ComprehensiveStatus cybersecurity program including advanced threat protectionof implementation",
security monitoring, encryption, access controls, and security awareness training",     "expectedOutcomeenum": ["not-implemented"Reduce likelihood of successful breach while maintaining detection capabilities",
    "implementationStatus":, "planning", "in-progress", "implemented", "verified"]
 },   "residualRisk": {     "level": "moderate",}
    "acceptableLevel": true,   }
 "description": "Remaining risk primarily related to}
zero-day vulnerabilities and sophisticated threat actors"},
    "additionalControlscapabilityGaps": [{
      "type"Investigating additional advanced endpoint protection: "array",
      "Enhancing threat hunting capabilities"
    ]description": "Capability gaps increasing risk",
   },   "controlEffectivenessitems": {
 
  "level": "effective",     "lastAssessment": "2025-03-15",
    "improvementNeeds": [type": "object",
        "properties"Strengthen third-party security assessment process",: {
          "gapDescription"Enhance: cloud{
security monitoring"     ]   },   "reviewFrequencytype": "quarterlystring",
            "lastReviewDatedescription": "2025-04-01",Description of gap"
    "nextReviewDate": "2025-07-01",   "regulatoryImplications": [ },
   {       "regulationTyperiskContribution": "Data Protection",{
            "regulationNametype": "GDPRstring",
      "implications": "Breach notification requirements and potential fines up to 4% of global revenue",
 "description": "How gap contributes to risk"
    "complianceStatus": "compliant"     },

   {       "regulationTyperemediation": "Financial",{
      "regulationName": "PCI-DSS",       "implicationstype": "string"Requirements,
 for securing payment card data",       "complianceStatusdescription": "compliant"Plan to address gap"
 }   ],   "strategicImplications": {  }
  "overallImpact": "mixed",     "affectedObjectives":}
[      }
{    },
    "objectiveIDperformanceMetrics": "STRAT-DIGITAL-003",
 {
      "impactDescriptiontype": "Risk considerations require adjustment to cloud migration timelinearray",
        "impactSeveritydescription": "moderate"
Metrics for measuring risk impact on }capability",
      "items": {
        "objectiveIDtype": "STRAT-CUSTOMER-002object",
        "impactDescriptionproperties": "Enhanced security measures could create friction in customer experience",{
          "impactSeveritymetricName": "minor"{
      }     ]   },
  "emergingFactors": ["type": "string",
     {       "factorNamedescription": "AI-EnhancedName Cyberof Threatsmetric",
      "description": "Increasing sophistication of attacks},
using AI to evade detection",       "potentialImpactmetricDescription": {
"Could increase probability of successful breach",       "timeHorizontype": "medium-termstring",

     "monitoringApproach": "Threat intelligence subscription and quarterly assessment"   "description": "What },metric measures"
   {       "factorName": "Extended Supply Chain Exposure",},
          "descriptioncurrentValue": "Increasing{
integration with third-party systems expanding attack surface",       "potentialImpacttype": "string"New,
  vectors for data compromise",       "timeHorizondescription": "immediateCurrent measurement",
      "monitoringApproach": "Third-party security assessment program"},
    }   ],   "relatedRiskstargetValue": {
[     {       "riskIDtype": "RISK-TECH-005string",
            "relationshipTypedescription": "contributor",Target value"
          "relationshipStrength": 4,}
       "description": "Legacy System Maintenance Risk contributes to cybersecurity vulnerabilities" }
      }
    },
    "improvementInitiatives": {
      "riskIDtype": "RISK-COMP-002array",
      "relationshipTypedescription": "consequenceInitiatives to improve capability for risk management",
      "relationshipStrengthitems": 5,{
        "descriptiontype": "Data breach would trigger Regulatory Compliance Risk"object",
        "properties": {
    }   ],   "keyRiskIndicatorsinitiativeDescription": [{
     {       "indicatorNametype": "Security Incidentsstring",
            "description": "NumberDescription of securityinitiative"
incidents detected per month",       "currentValue": "12",
  },
   "threshold": "25",       "trendexpectedOutcome": "stable", {
            "monitoringFrequencytype": "dailystring"
 ,
  },     {       "indicatorNamedescription": "Anticipated result"Vulnerability
Remediation Time",       "description": "Average time},
to remediate critical vulnerabilities",       "currentValuestatus": "1.8 days",{
            "thresholdtype": "3 daysstring",
      "trend": "improving",
      "monitoringFrequencydescription": "weeklyCurrent status",
    },     {   "enum": ["proposed", "approved", "in-progress", "indicatorNamecompleted":, "Phishing Simulation Success Rate",canceled"]
          }
  "description": "Percentage of employees clicking on simulated}
phishing emails",     }
 "currentValue": "4.2%",  },
    "thresholddependencyRisks": "5%",{
      "trendtype": "stablearray",
      "monitoringFrequencydescription": "monthly"Risks arising from capability dependencies",
}   ],   "dependenciesitems": [
  {
 {       "dependencyTypetype": "Criticalobject",
        "domainTypeproperties": "Capability", {
          "entityIDdependencyType": "CAP-SECOPS-001",{
      "description": "Security Operations capability"   "type": "string",
},     {       "dependencyTypedescription": "ImportantType of dependency",
      "domainType": "Information",   },
   "entityID": "INFO-DATA-003",       "descriptiondependentEntity": "Customer Data{
Security Classification Framework"     }   ],  "type": "documentationReferencesstring":,
[     {       "documentNamedescription": "InformationWhat capability Securitydepends Policyon",
       "documentLocation": "Policy repository (IS-POL-001)", },
          "documentTyperiskScenario": "policy", {
            "documentDatetype": "2024-12-15"
    },string",
     {       "documentNamedescription": "AnnualRisk scenario Cybersecuritycreated Riskby Assessmentdependency",
      "documentLocation": "Risk repository (RISK-RPT-2025-01)",    }
      "documentType": "assessment", }
     "documentDate": "2025-02-28" }
    }
  ]}
}

Risk Management Domain Schema Properties

...

Property

Description

Example

monitoringID

Unique identifier for the risk monitoring activity

"MON-CYBER-002"

monitoringTitle

Name of the specific risk monitoring activity

"Cybersecurity Risk Monitoring Program"

description

Detailed explanation of the risk monitoring activity

"Continuous monitoring of key risk indicators and control effectiveness"

orgUnitTitle

Organization unit responsible for this monitoring

"Security Operations Center"

monitoredRisks

Risks being monitored

[{"riskID": "RISK-CYBER-001", "monitoringPriority": "high"}]

keyRiskIndicators

Indicators being tracked

[{"indicatorName": "Security Incidents", "currentValue": "12"}]

monitoringFrequency

Frequency of monitoring activities

{"reviewCycle": "continuous", "justification": "Critical risk requiring real-time visibility"}

monitoringMethods

Approaches used for monitoring

[{"methodName": "SIEM Analytics", "automationLevel": "fully-automated"}]

earlyWarningSystem

System for early detection of risk changes

{"alertMechanisms": ["Automated alerts", "Dashboard indicators"]}

monitoringResponsibilities

People responsible for monitoring

[{"role": "SOC Analyst", "responsibilities": ["Monitor alerts", "Initial triage"]}]

reportingStructure

How monitoring results are reported

{"reportTypes": [{"reportName": "Weekly Security Status", "reportFrequency": "weekly"}]}

technologySystems

Systems supporting monitoring

[{"systemName": "Security Information & Event Management", "systemFunction": "Log analysis"}]

dataManagement

How monitoring data is managed

{"dataSources": ["Firewall logs", "IDS alerts", "Authentication logs"]}

historicalPerformance

History of monitoring effectiveness

{"successRate": "93% of incidents detected by monitoring systems"}

Schema Evolution Guidance

The Risk Management Domain schema is expected to evolve with emerging practices in risk management. Future extensions may include:

  • Enhanced predictive risk analytics

  • AI-assisted risk identification and assessment

  • Dynamic risk modeling capabilities

  • Operational resilience frameworks

  • Cyber and digital risk extensions

  • Integrated governance, risk, and compliance models

Organizations should plan for these evolutions by maintaining clean taxonomies and clear relationship models in their current implementation.