ID.RA-05.163
Does your organization have a documented process for prioritizing cybersecurity investments based on risk assessment (likelihood and impact)?
Explanation
This question assesses whether the organization makes strategic decisions about cybersecurity spending based on quantifiable risk factors rather than arbitrary choices. Effective resource allocation requires understanding which threats are most likely to occur and would cause the greatest damage, allowing limited security budgets to address the most critical vulnerabilities first. Evidence could include a risk assessment framework document, meeting minutes from security investment planning sessions, or a prioritized security roadmap with justifications based on risk calculations. An ideal deliverable would be a risk register or matrix that shows how different security initiatives were ranked based on threat likelihood and potential business impact scores.
Implementation Example
Prioritize cybersecurity resource allocations and investments based on estimated likelihoods and impacts
ID: ID.RA-05.163
Context
- Function
- ID: IDENTIFY
- Category
- ID.RA: Risk Assessment
- Sub-Category
- Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization

