Anya had been at Neuromesh barely three weeks when Marcus, the Security Architect, dropped a thick binder on her desk.

Marcus: “This is our risk register. It’s… outdated.”

Anya: “I dont know what that means ?”


🎯 Concept Focus: Risk Management

  1. Risk Terms

  2. Risk Management Process


Risk Terms and Terminologies

Vulnerability – A weakness or lack of an effective control that can be taken advantage of.

Threat – An action, event, or condition capable of exploiting a vulnerability.

Likelihood – Practical probability that a given threat will successfully exploit a vulnerability.

  • Ask: What are the odds this will occur?

  • Likelihood can be reduced when appropriate controls are introduced.

Impact – The magnitude of harm if the event occurs (financial, legal, operational, reputational).

Risk – Combination of likelihood and impact.

  • Working formula: Risk = Likelihood × Impact

  • The OWASP Risk Rating Model is a common approach to structure these inputs.

Exposure – Portion of asset value expected to be lost if the event happens.

Threat Agent – The actor (human, system, process) carrying out the attack.

Safeguard – Preventive, proactive control (e.g., strong passwords, MFA).

Countermeasure – Corrective, reactive measure (e.g., isolate an infected workstation).

Due Care – Taking reasonable, prudent protective actions (“do the right things”).

Due Diligence – Maintaining those protections over time (“keep doing the right things”).

Risk Policy – The organization’s formal statement of risk management objectives and expectations.

Ownership note: The asset owner determines value, mandates safeguards and countermeasures, and is accountable for risk reduction decisions.

Risk – The combination of likelihood and impact.
Formula: Risk = Likelihood × Impact

Concept diagram

The Risk Management Process (5 stages)

1. Risk Identification

2. Risk Analysis

3. Risk Evaluation

4. Risk Treatment

5. Monitoring & Review

Image Courtesy : Risk Mangement Mind Map DestCert

Concept diagram

1) Risk Identification

Purpose: discover what could go wrong and where.

1.1 Asset Valuation

1.2 Threat Analysis

1.3 Vulnerability Assessment

2) Risk Analysis

Purpose: convert raw findings into decision‑ready numbers or scores.

AV (Asset Value),

EF (Exposure Factor),

SLE (Single Loss Expectancy),

ALE (Annual Loss Expectancy),

ARO (Annualized Rate of Occurrence; default 1 if none stated).

Formulas:

SLE = AV × EF

ALE = SLE × ARO

Evaluate safeguard economics with ACS (Annual Cost of Safeguard):
ACS = (ALE_before − ALE_after) − Safeguard_Cost


3) Risk Evaluation

Purpose: decide what the numbers mean against organizational thresholds.

Outcome: Each risk is tagged above/below tolerance, which drives treatment choice.


4) Risk Treatment

Purpose: modify risk so it fits within tolerance.

Essential Terms

Inherent Risk – Risk before any controls.

Residual Risk – Risk after controls. It can be accepted (if within tolerance), transferred (e.g., insurance), or monitored continuously.

Control Risk – Risk introduced by the control environment itself (e.g., misconfigurations, failure modes).

Clarification on residual risk:
Correct: “Residual risk is the risk after implementing controls.”
Nuance: Management may accept it if within tolerance; otherwise they can transfer or continue to treat/monitor.
Better phrasing: Residual risk is the remaining exposure after controls. If that exposure is within tolerance, management may choose acceptance rather than further mitigation.


5) Monitoring, Review, and Governance Alignment

Purpose: ensure controls remain effective and risks don’t drift.

Artifacts: Continuous risk register updates, KRI dashboards, assessment reports, ATO/POA&M updates.


Security Controls: What to Weigh

When choosing countermeasures, consider:

Implementation essentials

Controls Catalog

Types

Categories (use across the incident timeline)


Control Assessment and Testing

Effectiveness assessment methods

By tester knowledge

Four‑stage PT flow

  1. Planning – Scope, goals, rules of engagement.

  2. Discovery – Intel gathering, scanning, attack‑path identification.

  3. Attack – Exploit safely to test defenses.

  4. Reporting – Findings, risk ratings, remediation guidance.

Other methods


Attack Progression Reference

Lockheed Martin Cyber Kill Chain – Detect early, break the chain, and design effective controls.

  1. Reconnaissance

  2. Weaponization

  3. Delivery

  4. Exploitation

  5. Installation

  6. Command & Control

  7. Actions on Objectives


Threat Modeling

STRIDE – Threat classes and common mitigations