Skip to main content

Risk Register

Overview

The Risk Register helps you identify, assess, and track security risks across your organization. Risk management is a core compliance requirement and a fundamental security practice. Your vCISO helps you identify risks, assess their impact, and define appropriate treatment plans.

Risk Management Process

IdentifyDiscover potential risksAssessEvaluate likelihood andimpactTreatDecide how to handle theriskMonitorTrack risk status overtime
IdentifyDiscover potential risks
AssessEvaluate likelihood and impact
TreatDecide how to handle the risk
MonitorTrack risk status over time

Identifying Risks

Risk Sources

Common risk sources include:

  • Vulnerabilities - Technical weaknesses
  • Threats - External and internal actors
  • Compliance - Regulatory requirements
  • Vendors - Third-party dependencies
  • Processes - Operational weaknesses
  • Assets - Critical asset exposure

Adding Risks

  1. Navigate to ComplianceRisk Register
  2. Click Add Risk
  3. Enter risk details:
    • Title - Clear, descriptive name
    • Description - Detailed explanation
    • Category - Risk type
    • Owner - Responsible party
    • Source - How the risk was identified
  4. Click Save

Risk Categories

CategoryExamples
TechnicalSystem vulnerabilities, misconfigurations
OperationalProcess failures, human error
ComplianceRegulatory violations, audit failures
StrategicBusiness decisions, market changes
ReputationalBrand damage, customer trust
FinancialFraud, financial loss

Assessing Risks

Risk Scoring

Evaluate each risk on two dimensions:

Likelihood - How likely is the risk to occur?

ScoreLevelDescription
1RareUnlikely to occur
2UnlikelyCould occur but not expected
3PossibleMay occur
4LikelyExpected to occur
5Almost CertainWill occur

Impact - What is the potential damage?

ScoreLevelDescription
1NegligibleMinimal impact
2MinorLimited impact
3ModerateNoticeable impact
4MajorSignificant damage
5SevereCritical damage

Risk Rating

Risk Rating = Likelihood × Impact

RatingLevelAction Required
1-4LowAccept or monitor
5-9MediumMitigate when possible
10-16HighMitigate promptly
17-25CriticalImmediate action required

Risk Matrix

Visual representation of risk distribution:

Impact
Severe
5
10
15
20
25
Major
4
8
12
16
20
Moderate
3
6
9
12
15
Minor
2
4
6
8
10
Negligible
1
2
3
4
5
Rare
Unlikely
Possible
Likely
Almost Certain
Likelihood
Low
Medium
High

Treating Risks

Treatment Options

OptionDescriptionWhen to Use
MitigateReduce likelihood or impactRisk is too high to accept
AcceptAcknowledge and monitorRisk is within tolerance
TransferShift risk to another partyInsurance, contracts
AvoidEliminate the risk sourceRisk outweighs benefit

Creating Treatment Plans

For risks requiring mitigation:

  1. Open the risk
  2. Click Add Treatment Plan
  3. Define treatment actions:
    • Action - Specific mitigation step
    • Owner - Responsible person
    • Due Date - Target completion
    • Status - Progress tracking
  4. Track implementation

Treatment Status

StatusMeaning
PlannedTreatment defined but not started
In ProgressImplementation underway
CompletedTreatment implemented
VerifiedEffectiveness confirmed

Risk Tasks

Automated Risk Identification

Bastion can automatically identify risks from:

  • Vulnerability Scans - Technical vulnerabilities
  • Integration Data - Configuration issues
  • Compliance Gaps - Missing controls
  • Vendor Issues - Third-party risks

Risk Tasks Queue

Review identified risks in the tasks queue:

  1. Navigate to Risk RegisterTasks
  2. Review each identified risk
  3. Accept to add to register, or dismiss

Monitoring and Reporting

Risk Dashboard

The risk dashboard shows:

  • Risk Distribution - By category and rating
  • Treatment Progress - Open vs. resolved
  • Trend Analysis - Risk changes over time
  • Owner Summary - Risks by owner

Key Risk Indicators (KRIs)

Track metrics that indicate risk levels:

  • Security incidents per month
  • Vulnerability remediation time
  • Compliance control failures
  • Employee security training completion

Reports

Generate risk reports:

  • Risk Register Export - Complete risk listing
  • Executive Summary - High-level overview
  • Treatment Status - Mitigation progress
  • Trend Report - Historical analysis

Compliance Integration

Framework Mapping

Map risks to compliance controls:

  • Demonstrates risk-aware approach to auditors
  • Links risks to specific control objectives
  • Creates evidence for risk management controls

Audit Evidence

Risk management activities provide evidence for:

  • Risk assessment requirements
  • Management review controls
  • Continuous monitoring controls

Best Practices

Be Comprehensive

Don't limit risk identification to obvious threats. Consider all risk sources including process, people, and vendor risks.

Assign Ownership

Every risk needs an owner. Without ownership, risks go unaddressed.

Review Regularly

Risk ratings change over time. Review the register quarterly to update assessments.

Document Decisions

Document why risks are accepted or how treatments were chosen. This context is valuable for audits.

Next Steps