ID.RA-04.159
Does your organization have a documented process where business leaders and cybersecurity professionals collaboratively assess and record risk scenarios with their likelihood and impact in risk registers?
Explanation
This question evaluates whether your organization has formalized the collaboration between business and security teams to identify, assess, and document risks. Effective risk management requires input from both business stakeholders who understand operational impacts and security professionals who can assess technical vulnerabilities and threats. This collaborative approach ensures risks are evaluated holistically with appropriate context for both likelihood and business impact. Evidence of fulfillment could include a formal risk assessment methodology document, completed risk registers showing both business and security input, meeting minutes from risk assessment sessions with both teams present, or a risk management policy that explicitly requires this collaboration.
Implementation Example
Business leaders and cybersecurity risk management practitioners work together to estimate the likelihood and impact of risk scenarios and record them in risk registers
ID: ID.RA-04.159
Context
- Function
- ID: IDENTIFY
- Category
- ID.RA: Risk Assessment
- Sub-Category
- Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded

