2.9 Documenting the Risk Assessment
Risk assessment report provides details about the current state of the risk environment and also points out gaps, if any, from the desired state of IT risk. It also indicates whether gaps are within acceptable levels and provides recommendations for addressing the gap.
Risk assessment report should capture the process and the result of the risk assessment.
Risk and gaps should be documented in such a manner that is understandable by management and it should also indicate the level of risk. This will help management to prioritize the risk response.
Following are the contents of a risk assessment report:
Objective and scope of risk assessment
Risk assessment process and criteria
Assumptions, if any, used during assessment
Risk categorization process
Identification of risk, threats and vulnerabilities along with control weakness
Recommendations to address the risk
Summary for management
Risk assessment process should be consistent to make them comparable with previous results.
Major risks which are already being addressed should also be made part of the report for accurate reporting to senior management.
To the extent possible, the report should not contain technical terminologies that are specific to IT or may be misinterpreted by management.
Addressing Bypassed Risk
It must be noted few of the IT related risks may not be applicable to the organization. Hence such risks are not evaluated. In such cases, it is advisable to document the risks which were intentionally bypassed along with reasons for the same.
However, risk practitioners should re-evaluate each bypassed risk and ensure that it is being assessed accurately on the current risk landscape.
Updating the Risk Register
Risk register is primarily maintained and updated with following objectives:
Documentation of all identified risks along with corrective plans
Availability of complete risk related database
Improves decision making related to risk and helps to drive risk response plan.
For each risk following information should be captured in risk register:
risk scenarios and description
risk owner
impact
probability
inherent risk score,
details of controls implemented
mitigation plan
residual risk score
risk owner
Risk registers should be updated as and when there is change in an organization's risk scenario.
Very first step in identification of new risk is to update the risk register. Maintenance of the risk register starts from the risk identification phase.
Key aspects from CRISC exam perspective