RMF Training Materials — Secure In Security
Secure In Security — RMF Training Materials Cybersecurity & Information Security
Organizational
Risk Management &
Framework (RMF)
Cybersecurity & Information Security Training Program  ·  2026
Foundations of Risk Management

Introduction to Risk Management

What Is a Risk Management Framework?

A Risk Management Framework (RMF) is a structured, repeatable process for identifying, assessing, responding to, and monitoring risks to an organization’s information assets, systems, and operations. In the cybersecurity and information security context, an RMF provides the systematic approach needed to protect the confidentiality, integrity, and availability (CIA) of data and systems while enabling informed, risk-based business decisions.

Why It Matters
Organizations without a formal RMF are 3× more likely to suffer a material data breach and face significantly higher regulatory penalties. A mature RMF transforms security from a reactive cost center into a strategic business enabler by making risk visible and manageable.

The CIA Triad — Foundation of Information Security Risk

Every information security risk ultimately threatens one or more elements of the CIA Triad. All risk assessments must evaluate impact across all three dimensions:

PrincipleDefinitionExample ThreatExample Impact
ConfidentialityOnly authorized parties can access informationData breach, credential theft, insider exfiltrationRegulatory fines, reputational damage, loss of competitive advantage
IntegrityInformation is accurate and unaltered by unauthorized partiesRansomware, database tampering, man-in-the-middleCorrupted financial records, fraudulent transactions, loss of trust
AvailabilitySystems and data are accessible when needed by authorized usersDDoS, ransomware, hardware failure, misconfigurationOperational shutdown, SLA breach, revenue loss

Core Risk Terminology

TermDefinition
AssetAnything of value to the organization: data, systems, people, processes, reputation
ThreatA potential event or actor capable of causing harm to an asset (e.g., ransomware gang, disgruntled employee, natural disaster)
VulnerabilityA weakness that can be exploited by a threat (e.g., unpatched software, misconfigured firewall, lack of MFA)
RiskThe potential for harm resulting from a threat exploiting a vulnerability: Risk = Threat × Vulnerability × Impact
LikelihoodThe probability that a threat will materialize and successfully exploit a vulnerability
ImpactThe magnitude of harm if a risk event occurs (financial, operational, regulatory, reputational)
ControlA safeguard or countermeasure that reduces the likelihood or impact of a risk
Residual RiskThe risk remaining after controls have been applied
Risk AppetiteThe level and type of risk the organization is willing to accept in pursuit of its objectives
Risk ToleranceThe acceptable variation in outcomes relative to the risk appetite (operational boundaries)
Risk RegisterA centralized repository documenting all identified risks, their ratings, owners, and treatment status

Risk vs. Threat vs. Vulnerability — The Relationship

Understanding the distinction between these three concepts is critical for accurate risk assessment:

Example: Ransomware Scenario

Threat: A ransomware operator targeting organizations in your industry sector

Vulnerability: Unpatched Remote Desktop Protocol (RDP) exposed to the internet without MFA

Risk: High probability of successful encryption of critical systems, causing operational shutdown and ransom demand

Control: Disable RDP where possible; enforce MFA; deploy EDR; maintain tested offline backups

Industry Risk Management Frameworks

Established RMF Standards & Frameworks

Multiple globally recognized frameworks exist to guide cybersecurity and information security risk management. Organizations typically adopt one primary framework and align supplementary standards to it.

NIST Risk Management Framework (SP 800-37 Rev 2)

The NIST RMF is the most widely adopted cybersecurity risk management framework, particularly in U.S. federal, defense, and critical infrastructure sectors. It provides a 7-step lifecycle approach for managing security and privacy risk.

StepPhasePurposeKey Activities
1PREPAREEstablish context and prioritiesDefine risk management roles; establish organizational risk strategy; identify common controls; develop organization-wide risk assessment
2CATEGORIZEClassify systems by impact levelCategorize information systems using FIPS 199; document system boundaries, data flows, and interconnections
3SELECTChoose security controlsSelect control baselines from NIST SP 800-53; tailor controls to organizational context; document in System Security Plan (SSP)
4IMPLEMENTDeploy selected controlsImplement controls in accordance with SSP; document implementation evidence; configure systems to baseline standards
5ASSESSVerify control effectivenessConduct security assessments; test controls against stated objectives; identify deficiencies and plan remediation
6AUTHORIZEAccept residual risk formallyAuthorizing Official (AO) reviews assessment results; issues Authorization to Operate (ATO) or denial; documents risk acceptance
7MONITORContinuously track risk postureOngoing assessment of control effectiveness; change management; incident response; periodic reauthorization
Key Concept
The NIST RMF is not a one-time event — it is a continuous cycle. The MONITOR step feeds back into PREPARE, ensuring that changes to the threat landscape, system configuration, or organizational priorities trigger re-evaluation of risk and controls.

NIST Cybersecurity Framework (CSF) 2.0

The NIST CSF provides a complementary, outcomes-based framework organized around six core functions. While the RMF is a process, the CSF is a set of desired cybersecurity outcomes. The two are designed to work together.

FunctionAbbreviationRisk Management Purpose
GOVERNGVEstablish and monitor risk strategy, expectations, and policy — the foundational layer added in CSF 2.0
IDENTIFYIDUnderstand organizational assets, threats, vulnerabilities, and risk context
PROTECTPRImplement safeguards to limit the likelihood and impact of a cyber event
DETECTDEDevelop capabilities to identify cybersecurity events in a timely manner
RESPONDRSTake appropriate actions when a cybersecurity event is detected
RECOVERRCRestore capabilities and services impaired by a cybersecurity incident

ISO 31000 — Risk Management Principles

ISO 31000:2018 provides universally applicable principles and guidelines for enterprise risk management. In the cybersecurity context, it establishes the overarching management system within which information security risks are governed.

ISO 31000 Core Principles (Cybersecurity Relevance)

  • IntegratedCyber risk management must be embedded in all organizational processes, not siloed in IT
  • Structured & ComprehensiveConsistent, comparable risk assessments across all systems and business units
  • CustomizedControls and risk appetite must be tailored to organizational context, not generic templates
  • InclusiveRisk identification must include perspectives from business, operations, and security teams
  • DynamicRisk management must adapt as threats, systems, and the business environment evolve
  • Best Available InformationDecisions must be based on current threat intelligence, not outdated assumptions
  • Human & Cultural FactorsInsider threat, social engineering, and security culture must be explicitly considered

ISO/IEC 27005 — Information Security Risk Management

ISO 27005 provides specific guidance for information security risk management within the context of an ISO 27001 ISMS. It aligns directly with ISO 31000 principles while providing information-security-specific guidance.

ISO 27005 ProcessDescription
Context EstablishmentDefine scope, boundaries, and criteria for evaluating information security risk (risk acceptance criteria, scale definitions)
Risk IdentificationIdentify assets, threats, existing controls, vulnerabilities, consequences; document all risk scenarios
Risk AnalysisAssess likelihood and impact; calculate risk level using selected methodology (qualitative, quantitative, or hybrid)
Risk EvaluationCompare risk levels against acceptance criteria; prioritize risks for treatment
Risk TreatmentSelect and implement treatment options: modify, retain, avoid, or share the risk
Risk AcceptanceObtain formal management approval for residual risk; document rationale
Communication & ConsultationOngoing stakeholder engagement throughout the risk management process
Monitoring & ReviewTrack risk indicators, control effectiveness, and changes to the threat landscape

Framework Comparison at a Glance

DimensionNIST RMFNIST CSF 2.0ISO 31000ISO 27005
Primary FocusIT system authorizationCybersecurity outcomesEnterprise risk managementInfoSec risk management
ScopeFederal/defense systems; broadly adoptedAll sectors and sizesAll risk types in any organizationInformation security specifically
ApproachProcess-driven (7 steps)Outcomes-driven (6 functions)Principles-basedProcess-driven (aligned to ISO 31000)
Mandatory?Federal agencies (FedRAMP)Voluntary (widely adopted)VoluntaryVoluntary (required for ISO 27001)
Best Used ForAuthorizing IT systemsBenchmarking cyber postureBoard-level risk governanceISMS risk assessment process
Conducting a Cybersecurity Risk Assessment

The Risk Assessment Process

A cybersecurity risk assessment is the systematic identification and analysis of risks to organizational information assets. It is the cornerstone activity of any RMF and must be performed before controls can be meaningfully selected or prioritized.

Step-by-Step Risk Assessment Methodology

  • Define Scope & ObjectivesDetermine what systems, data, and processes are in scope; align with organizational risk appetite
  • Asset Inventory & ClassificationCatalog all information assets; classify by sensitivity and criticality
  • Threat IdentificationEnumerate plausible threat actors, threat events, and attack vectors relevant to each asset
  • Vulnerability IdentificationAssess weaknesses through scans, audits, interviews, and review of past incidents
  • Control InventoryDocument existing controls and assess their effectiveness against identified threats
  • Likelihood AssessmentRate the probability of each threat-vulnerability pair being realized
  • Impact AssessmentEvaluate the business consequences if the risk event occurs (CIA dimensions)
  • Risk Rating & PrioritizationCalculate risk scores; rank by priority for treatment
  • Risk Treatment PlanningSelect treatment options and assign owners with deadlines
  • Document & ReportPopulate the Risk Register; report to stakeholders; obtain management sign-off

Asset Classification

Effective risk management begins with knowing what you are protecting. All information assets must be classified according to sensitivity and business criticality:

ClassificationDescriptionExamplesHandling Requirements
TOP SECRET / CRITICALHighest sensitivity; catastrophic impact if disclosedEncryption keys, authentication secrets, M&A data, regulated PII/PHINeed-to-know only; encrypted at rest and in transit; access logged and reviewed monthly
CONFIDENTIALSignificant business or regulatory impact if disclosedFinancial forecasts, HR records, customer PII, IP, contractsRole-based access; encrypted in transit; classified document controls
INTERNALLow external harm but internal confidentiality expectedInternal policies, project plans, meeting notes, org chartsAuthenticated access only; not for public distribution
PUBLICNo harm from public disclosure; intended for external audiencesMarketing materials, press releases, published reportsNo restrictions; verify accuracy before publication

Threat Modeling — STRIDE

Threat modeling is a structured technique for identifying, enumerating, and prioritizing threats relevant to a specific system or asset. The STRIDE model provides a comprehensive taxonomy of cybersecurity threats:

LetterThreat CategoryDescriptionExample Attack
SSpoofingImpersonating a user, system, or component to gain unauthorized accessPhishing email impersonating CEO; ARP spoofing; forged authentication tokens
TTamperingUnauthorized modification of data or system configurationDatabase record alteration; man-in-the-middle injection; firmware modification
RRepudiationDenying having performed an action, often to evade accountabilityDisabling audit logs; deleting transaction records; exploiting weak non-repudiation controls
IInformation DisclosureUnauthorized exposure of sensitive informationSQL injection data dump; misconfigured S3 bucket; unencrypted data in transit
DDenial of ServiceDisrupting availability of systems or data for legitimate usersDDoS attack; ransomware encryption; resource exhaustion exploit
EElevation of PrivilegeGaining access rights beyond what was authorizedLocal privilege escalation exploit; token hijacking; misconfigured sudo permissions

Risk Scoring Methodologies

Qualitative Risk Assessment

Qualitative assessment uses descriptive scales (High/Medium/Low) to rate likelihood and impact. It is faster, accessible to non-technical stakeholders, and appropriate for initial assessments or when quantitative data is unavailable.

RISK MATRIX Impact: LOW Impact: MEDIUM Impact: HIGH Impact: CRITICAL
Likelihood: VERY HIGHMEDIUMHIGHCRITICALCRITICAL
Likelihood: HIGHLOWMEDIUMHIGHCRITICAL
Likelihood: MEDIUMLOWLOWMEDIUMHIGH
Likelihood: LOWLOWLOWLOWMEDIUM

Quantitative Risk Assessment — FAIR Model

Factor Analysis of Information Risk (FAIR) provides a quantitative approach that translates cyber risk into financial terms, enabling direct comparison with other business risks and informing investment decisions.

FAIR FactorDescription & Calculation
Loss Event Frequency (LEF)How often a loss event is expected to occur per year = Threat Event Frequency × Vulnerability
Threat Event Frequency (TEF)How often a threat agent acts against an asset (e.g., 2 ransomware campaigns targeting your sector per year)
Vulnerability (Vuln)Probability that a threat event results in a loss (e.g., 0.4 = 40% chance attacker succeeds given current controls)
Loss Magnitude (LM)Financial impact per loss event: Primary losses (direct costs) + Secondary losses (fines, litigation, reputation)
Risk (Annualized Loss Exposure)LEF × LM = Expected annual financial loss from this risk scenario (e.g., 0.8 events/year × $2.5M = $2M ALE)
Risk Treatment, Controls & Response Strategies

Treating Cyber Risk

Once risks are identified and rated, the organization must formally decide how to respond to each. Risk treatment is not a one-size-fits-all decision — it requires balancing cost, feasibility, business impact, and organizational risk appetite.

Risk Treatment Options

OptionAlso Known AsDescriptionWhen to Use
AVOIDRisk EliminationDiscontinue the activity or system that creates the riskWhen the cost or impact of treatment exceeds the benefit of the business activity
MODIFYRisk Mitigation / ReductionImplement controls to reduce likelihood, impact, or bothMost common option; use when controls are cost-effective relative to risk reduction
SHARERisk Transfer / SharingTransfer financial impact via insurance or contract; share via third-party serviceUse when residual risk remains high and insurance/contractual protection is available
RETAINRisk AcceptanceConsciously accept the risk without additional control investmentUse when residual risk falls within risk tolerance and treatment cost exceeds benefit
Important
Risk Acceptance is a formal management decision — it must be explicitly documented, signed by an accountable executive, time-bounded, and reviewed on a defined schedule. Undocumented risk acceptance is not a risk management strategy; it is negligence.

Security Controls Framework — NIST SP 800-53

NIST Special Publication 800-53 provides a comprehensive catalog of security and privacy controls organized into 20 control families. Controls are categorized as Preventive, Detective, or Corrective, and as Technical, Operational, or Management.

Control FamilyCategoryTypeRisk Management Purpose
Access Control (AC)TechnicalPreventiveEnforce least privilege; prevent unauthorized access to systems and data
Audit & Accountability (AU)TechnicalDetectiveCreate audit trails; detect anomalous activity; support forensic investigation
Configuration Management (CM)TechnicalPreventiveMaintain secure baselines; prevent unauthorized changes; reduce attack surface
Contingency Planning (CP)OperationalCorrectiveEnsure recovery capabilities; aligned with BC/DR program
Identification & Authentication (IA)TechnicalPreventiveVerify identity of users, devices, and processes; enforce MFA
Incident Response (IR)OperationalCorrectiveDetect, contain, and recover from security incidents
Risk Assessment (RA)ManagementPreventiveSystematic identification and evaluation of organizational risk
System & Comm. Protection (SC)TechnicalPreventiveNetwork segmentation; encryption; boundary protection controls
Security Assessment (CA)ManagementDetectiveOngoing evaluation of control effectiveness; third-party assessments
Supply Chain Risk Mgmt (SR)ManagementPreventiveManage risk from vendors, suppliers, and third-party software

Control Implementation Tiers

The NIST RMF defines four implementation tiers that describe the rigor and sophistication of an organization’s risk management practices:

TierNameCharacteristics & Expectations
1PartialRisk management practices are informal, reactive, and not organization-wide. Limited awareness of cyber risk at management levels. No formal risk management process.
2Risk InformedRisk management practices are approved by management but may not be enterprise-wide. Awareness of cybersecurity risk exists but is not consistently applied across the organization.
3RepeatableFormally approved risk management practices are expressed as policy and implemented consistently. Organization-wide approach with regular updates based on threat intelligence.
4AdaptiveOrganization adapts cybersecurity practices based on lessons learned and predictive threat intelligence. Risk management is fully integrated into organizational culture and business strategy.

Third-Party & Supply Chain Risk

Third-party vendors, cloud providers, and software supply chains represent one of the fastest-growing risk vectors. Organizations must extend their RMF to cover all entities with access to organizational systems or data.

Third-Party Risk Management (TPRM) Requirements

  • Conduct risk-based due diligence before onboarding any vendor with access to sensitive data or critical systems
  • Require SOC 2 Type II, ISO 27001 certification, or equivalent assurance for critical vendors annually
  • Include security and breach notification requirements in all vendor contracts (SLAs, data processing agreements)
  • Maintain an active vendor inventory with criticality ratings and last-assessed dates
  • Conduct annual questionnaire-based assessments for all Tier 1 vendors; onsite assessments for critical infrastructure vendors
  • Establish vendor offboarding procedures: revoke access, recover data, obtain data destruction certification
  • Monitor for vendor breaches via threat intelligence feeds and dark web monitoring services
Risk Register, Governance & Reporting

Risk Register & Governance Structure

The Risk Register

The Risk Register is the authoritative record of all identified cybersecurity risks. It is a living document that must be actively maintained, reviewed regularly, and used to drive prioritization of security investments and remediation activities.

Risk Register — Required Fields

FieldDescription & Purpose
Risk IDUnique identifier for tracking and cross-referencing (e.g., RISK-2025-042)
Risk TitleConcise name describing the risk scenario
DescriptionDetailed narrative of the threat, vulnerability, and potential business impact
Asset(s) AffectedSystems, data, or processes exposed to this risk
Threat SourceInternal, external, or environmental threat actor or event
Inherent Risk RatingRisk level before any controls are applied (Likelihood × Impact)
Current ControlsExisting controls that reduce this risk; include control effectiveness rating
Residual Risk RatingRisk level after existing controls are applied
Treatment OptionAvoid / Modify / Share / Retain — with justification
Treatment ActionsSpecific remediation steps, responsible owner, and target completion date
Target Risk RatingDesired risk level after treatment actions are completed
Risk OwnerNamed individual accountable for managing and monitoring this risk
Review DateDate of last review and next scheduled review
StatusOpen / In Treatment / Accepted / Closed

Sample Risk Register Entry

FieldValue
Risk IDRISK-2025-017
Risk TitleRansomware Encryption via Exposed RDP
DescriptionThreat actors are actively scanning for RDP endpoints exposed to the internet. Successful exploitation enables ransomware deployment, encrypting critical finance systems with potential full operational shutdown.
Asset(s) AffectedFinance ERP System, Accounts Payable Server, Shared Drive (Finance)
Threat SourceExternal — organized cybercriminal ransomware operators
Inherent Risk RatingCRITICAL (Likelihood: High │ Impact: Critical)
Current ControlsFirewall blocking RDP externally (partial); AV on endpoints; daily backups
Residual Risk RatingHIGH (controls partially effective; backups not tested; no MFA on RDP)
Treatment OptionMODIFY — Implement additional technical controls
Treatment Actions1) Disable external RDP by [DATE]; 2) Deploy MFA on all remote access; 3) Implement EDR on all finance endpoints; 4) Test backup restoration by [DATE]
Target Risk RatingLOW (after all treatment actions completed)
Risk OwnerIT Security Manager
Review DateQuarterly until treatment complete; then annually
StatusIn Treatment — 2 of 4 actions completed

Risk Governance Structure

Effective risk governance requires clear ownership and accountability from the board level through to operational teams. The Three Lines of Defense model provides the industry-standard governance structure:

LineRoleResponsibilityExample in Cyber Risk
First LineBusiness OperationsOwns and manages risk day-to-day; implements controlsSystem owners, IT operations, application teams managing their security controls
Second LineRisk & Compliance FunctionsOversees risk management; provides frameworks and monitoringCISO, Risk Management team, Compliance/Legal — set policy, assess control effectiveness
Third LineInternal Audit / External AuditProvides independent assurance on risk and control effectivenessInternal audit testing of security controls; external penetration testing; regulatory exams

Risk Reporting & Escalation

Risk information must flow efficiently to the right stakeholders at the right level of detail. A tiered reporting structure ensures leadership can make informed decisions without being overwhelmed with technical detail:

ReportAudienceFrequencyContent Focus
Board Cyber Risk ReportBoard of Directors / Audit CommitteeQuarterlyRisk posture trends; top 5 risks; regulatory exposure; major incidents; cyber insurance adequacy
Executive Risk DashboardC-Suite (CEO, CFO, COO, CTO)MonthlyRisk register summary; control effectiveness KPIs; critical open vulnerabilities; compliance status
CISO Risk ReportCISO / IT LeadershipBi-WeeklyDetailed risk register; vulnerability metrics; incident summary; remediation progress; threat intelligence highlights
Operational Risk BulletinIT Teams / System OwnersWeeklyActive threats; patch status; open audit findings; upcoming assessments and deadlines
Board Reporting Tip
Board members are not cybersecurity experts — translate risk into business language. Instead of “We have 47 critical CVEs,” say “Three of our revenue-generating systems have unpatched vulnerabilities that threat actors are actively exploiting; remediation is estimated at $80K and will take 6 weeks.”
Continuous Monitoring & Risk Metrics

Continuous Monitoring

Risk management is not a point-in-time activity. Continuous monitoring ensures that the organization maintains situational awareness of its risk posture as threats evolve, systems change, and new vulnerabilities emerge.

Continuous Monitoring Program Requirements

  • Define and document a monitoring strategy aligned to system risk categorization
  • Establish key risk indicators (KRIs) and key performance indicators (KPIs) for all critical controls
  • Automate monitoring where possible — manual processes introduce gaps and latency
  • Define frequency of monitoring activities based on asset criticality (real-time for critical systems)
  • Integrate monitoring outputs into the Risk Register — findings must update risk ratings
  • Conduct formal risk posture reviews at defined intervals (minimum quarterly for critical systems)
  • Document and track all changes to systems, configurations, and personnel with security implications

Key Risk Indicators (KRIs) — Cybersecurity

Key Risk IndicatorMeasurementTarget ThresholdEscalate If
% Critical/High Vulnerabilities Patched within SLACount patched / Count identified≥ 95% within 30 days< 85% or any critical CVE > 15 days unpatched
Mean Time to Detect (MTTD) IncidentsAvg days from compromise to detection< 24 hoursMTTD > 72 hours on any P1/P2 incident
Mean Time to Remediate (MTTR) VulnerabilitiesAvg days from discovery to closureCritical ≤ 7d; High ≤ 30dAny critical vuln open > 14 days
Phishing Simulation Click Rate% of staff clicking simulated phish< 5% click rate> 10% click rate or any credential submission
MFA Coverage Rate% of accounts with MFA enabled100% for privileged; ≥ 98% all usersAny privileged account without MFA
Third-Party Risk Assessment Coverage% of critical vendors assessed in last 12 months100% of Tier 1 vendorsAny Tier 1 vendor assessment overdue > 90 days
Security Training Completion Rate% of staff with annual training current≥ 95% of all staff< 85% or any high-risk role employee overdue
Open Risk Register Items (High+)Count of High/Critical risks with overdue treatment0 items past treatment deadlineAny Critical risk item past deadline

Vulnerability Management Lifecycle

Vulnerability management is the operational backbone of continuous monitoring. It must be a structured, repeatable process — not ad hoc patching:

  • DISCOVERAutomated scanning of all in-scope assets (authenticated scans weekly for critical; monthly for all)
  • PRIORITIZEApply CVSS score plus organizational context (asset criticality, exploitability, exposure) to rank vulnerabilities
  • REMEDIATEPatch, configure, or isolate affected systems per defined SLAs based on severity rating
  • VERIFYRescan after remediation to confirm vulnerability is resolved; do not rely on vendor confirmation alone
  • REPORTPublish vulnerability metrics to stakeholders; update Risk Register for high/critical findings
CVSS vs. EPSS
CVSS rates the theoretical severity of a vulnerability. EPSS rates the probability it will be actively exploited in the wild. Use EPSS alongside CVSS to prioritize patching — a CVSS 7.5 vulnerability with 60% EPSS is a higher real-world priority than a CVSS 9.0 with 2% EPSS.

Risk Posture Trend Analysis

Monthly risk posture trend analysis tracks whether the organization’s overall risk exposure is improving, stable, or deteriorating. Key trend indicators include:

  • Direction of average residual risk ratings in the Risk Register over the past 12 months
  • Ratio of new risks identified vs. risks closed/remediated (net risk accumulation rate)
  • Control maturity scores over time — are implemented controls becoming more effective?
  • Threat landscape evolution — are new threat vectors emerging that increase inherent risk?
  • Security investment effectiveness — are resources being allocated to the highest-risk areas?
Regulatory Compliance & Risk Integration

Compliance & Regulatory Risk

Compliance requirements do not define your complete risk posture — they represent a minimum floor. An organization can be fully compliant and still suffer a major breach. However, non-compliance itself represents a significant regulatory and financial risk that must be managed within the RMF.

Regulatory Requirements Mapped to RMF Activities

RegulationSectorRMF RequirementKey Risk Management Obligation
HIPAA Security RuleHealthcareRisk Analysis Mandatory (§164.308(a)(1))Annual risk analysis of PHI systems; documented risk management plan; sanction policy for noncompliance
GDPRAll (EU Data)Art. 35 — DPIA RequiredData Protection Impact Assessment for high-risk processing; Privacy by Design; DPO role for high-risk organizations
PCI DSS v4.0Payment CardsReq. 12 — Risk AssessmentAnnual risk assessment; targeted risk analysis for each control requirement; organizational security policy
NIST CSF (CISA)Critical InfrastructureVoluntary; regulatory alignmentSector-specific profiles required by CISA for 16 critical infrastructure sectors; ICS/OT-specific guidance
NY DFS 23 NYCRR 500Financial Services (NY)§500.09 — Risk AssessmentAnnual cybersecurity risk assessment; program must address identified risks; CISO must report to board annually
SEC Cybersecurity RulesPublic CompaniesMaterial Risk DisclosureDisclosure of material cybersecurity risks in annual filings; incident disclosure within 4 business days
CMMC 2.0Defense ContractorsLevel 2: NIST 800-171110 security requirements; third-party assessment required for Level 2/3; POA&M accepted for some gaps

Integrating Compliance into the Risk Register

Compliance gaps must be treated as risks in the organizational Risk Register. Each unmet regulatory requirement should generate a risk entry with:

  • Specific regulation, requirement reference, and gap description as the risk scenario
  • Regulatory penalty exposure as the primary financial impact driver
  • Reputational and operational impact as secondary impact factors
  • A remediation plan with owner, timeline, and budget allocation
  • Formal risk acceptance if the gap cannot be immediately remediated, signed by the appropriate executive

Privacy Risk — A Distinct Risk Dimension

Privacy risk is related to, but distinct from, cybersecurity risk. Organizations processing personal data must integrate privacy risk assessment into their RMF:

Privacy Risk CategoryDescriptionRMF Integration
Data Minimization RiskCollecting more data than necessary increases breach impact and regulatory exposureAsset inventory must include data sensitivity classification; excess data collection is a risk to treat
Consent & Lawful Basis RiskProcessing personal data without a valid legal basis creates regulatory liabilityLegal basis must be documented for each processing activity in a Records of Processing Activities (RoPA)
Data Subject Rights RiskInability to fulfill access, deletion, or portability requests creates regulatory breachAssess operational capability to fulfill DSRs within statutory timeframes (30 days under GDPR)
Cross-Border Transfer RiskTransferring personal data across jurisdictions without adequate safeguardsData flow mapping required; transfer mechanisms (SCCs, BCRs) must be documented and maintained

Quick Reference — RMF Key Terms

TermDefinition
RMFRisk Management Framework — structured, repeatable process for identifying, assessing, treating, and monitoring risk
CIA TriadConfidentiality, Integrity, Availability — the three foundational pillars of information security
AssetAnything of value to the organization that requires protection
ThreatA potential event or actor capable of causing harm
VulnerabilityA weakness that can be exploited by a threat
RiskPotential for harm = Threat × Vulnerability × Impact
Risk AppetiteThe level of risk the organization is willing to accept in pursuit of objectives
Risk RegisterCentralized record of all identified risks, ratings, owners, and treatment status
NIST CSFNIST Cybersecurity Framework — outcomes-based framework with 6 functions: Govern, Identify, Protect, Detect, Respond, Recover
NIST RMFNIST Risk Management Framework — 7-step process: Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor
ISO 27005International standard for information security risk management within an ISMS
STRIDEThreat modeling taxonomy: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
FAIRFactor Analysis of Information Risk — quantitative model translating cyber risk into financial terms
ATOAuthorization to Operate — formal approval issued in NIST RMF Step 6 to operate a system within accepted risk levels
KRIKey Risk Indicator — metric that signals increasing risk exposure before a loss event occurs
TPRMThird-Party Risk Management — program to identify and manage risk from vendors, suppliers, and partners
CVSSCommon Vulnerability Scoring System — industry standard for rating the severity of software vulnerabilities
EPSSExploit Prediction Scoring System — probability score indicating likelihood a vulnerability will be exploited in the wild
Three Lines of DefenseRisk governance model: 1st (Operations), 2nd (Risk/Compliance), 3rd (Audit)
Appendices & Reference Materials

Appendix A: Risk Assessment Checklist

Use this checklist to ensure completeness of each risk assessment cycle. Document completion dates and responsible parties.

TaskOwnerDate
Define scope, objectives, and assessment boundariesRisk/Security Lead
Update asset inventory — confirm all in-scope assets are documented and classifiedIT / Asset Owner
Review threat intelligence for new or emerging threats relevant to the organizationSecurity Team
Identify new vulnerabilities since last assessment (scan results, CVE feeds, vendor advisories)IT Security
Review effectiveness of existing controls — any controls degraded or bypassed?Security Team
Conduct threat modeling for any new or significantly changed systemsSecurity Architect
Rate likelihood and impact for all identified risks using defined methodologyRisk Lead
Calculate risk scores and prioritize for treatmentRisk Lead
Update Risk Register — add new risks; update ratings on existing risks; close remediated risksRisk Lead
Assign risk owners to all unowned risks; confirm existing owners are still validCISO
Develop/update treatment plans for all High and Critical risksRisk Owners
Obtain management sign-off on risk acceptance decisionsExecutive Sponsor
Distribute risk assessment report to stakeholders per reporting matrixRisk Lead
Schedule next assessment cycle based on risk ratings and regulatory requirementsCISO

Appendix B: Risk Appetite Statement Template

The following template should be customized and formally approved by the Board of Directors or equivalent governance body:

Organizational Risk Appetite Statement

[Organization Name] has a LOW risk appetite for cybersecurity and information security risks that could compromise the confidentiality of customer or employee data, disrupt business-critical operations, or result in regulatory non-compliance.

Specifically:

  • Confidentiality: We will not accept risks that create a significant probability of unauthorized exposure of regulated personal data (PII, PHI, financial data).
  • Integrity: We will not accept risks that could result in undetected corruption of financial records or customer data.
  • Availability: We will not accept risks that create a >4-hour unplanned outage probability for Tier 1 business systems.
  • Compliance: We will not knowingly operate in material non-compliance with applicable regulations. Compliance gaps identified must be risk-registered and treated within 90 days.

Residual risks rated CRITICAL require Board or CEO-level acceptance. Risks rated HIGH require CISO and VP-level acceptance. This statement is reviewed annually by the Audit Committee.

Appendix C: Recommended Resources

  • NIST SP 800-37 Rev 2 — Risk Management Framework for Information Systems and Organizations
  • NIST SP 800-53 Rev 5 — Security and Privacy Controls for Information Systems and Organizations
  • NIST SP 800-30 Rev 1 — Guide for Conducting Risk Assessments
  • NIST Cybersecurity Framework 2.0 — csrc.nist.gov/projects/cybersecurity-framework
  • ISO/IEC 27005:2022 — Information Security Risk Management
  • ISO 31000:2018 — Risk Management Guidelines
  • The FAIR Institute — fairinstitute.org — Quantitative cyber risk analysis guidance
  • CISA Known Exploited Vulnerabilities Catalog — cisa.gov/known-exploited-vulnerabilities-catalog
  • MITRE ATT&CK Framework — attack.mitre.org — Adversary tactics and techniques knowledge base
  • OWASP Top 10 — owasp.org — Application security risk awareness