Risk Assessment Methodology

Document Number: ISMS-RM-RAM-01

Classification: Internal

Version: 0.1.0

Effective Date: February 25, 2026

Author: Lucas Shin — Security Director

Approved By: Richard Williams — CISO

Next Review Date: February 2027


1. Purpose

This document defines the risk assessment methodology used within the Cybercraft Information Security Management System (ISMS). It establishes the criteria, scales, and processes for identifying, analysing, evaluating, and treating information security risks in accordance with ISO/IEC 27001:2022 Clauses 6.1.2 and 6.1.3.

This methodology provides the basis for the Risk Register, which serves as the single repository for all identified risks, their analysis, treatment decisions, and ongoing monitoring.


2. Scope

This methodology applies to all information assets, processes, and systems within the ISMS scope, including:


3. Risk Assessment Process

The risk assessment follows a structured five-step process aligned with ISO 31000:

  1. Identify — Enumerate risks by considering threats, vulnerabilities, and affected assets
  2. Analyse — Determine inherent likelihood and impact (before controls)
  3. Evaluate — Calculate risk score and classify risk level to prioritise treatment
  4. Treat — Select and implement treatment options; record in Risk Register
  5. Monitor & Review — Periodic reassessment per the PDCA cycle (§10)

4. Risk Identification

4.1 Sources

Risks are identified through:

4.2 Documentation

Each identified risk is recorded in the Risk Register with:


5. Risk Analysis

5.1 Likelihood Criteria

LevelRatingDescription
1RareMay occur only in exceptional circumstances. No history of occurrence.
2UnlikelyCould occur but not expected. Has occurred elsewhere in similar organisations.
3PossibleMight occur. Has occurred previously or is a known threat vector.
4LikelyWill probably occur. Occurs regularly in similar environments.
5Almost CertainExpected to occur frequently. Is occurring or has recently occurred.

5.2 Impact Criteria

LevelRatingDescription
1NegligibleNo measurable impact on operations, finances, or reputation.
2MinorMinor operational disruption. Limited to a single user or process. Recoverable within hours.
3ModerateNoticeable operational disruption. May affect client service delivery. Recoverable within 1 business day.
4MajorSignificant disruption. Client data or service compromised. Requires incident response. May trigger regulatory notification.
5CriticalSevere or prolonged disruption. Loss of critical business data. Regulatory breach or legal action. Existential threat to business.

5.3 Risk Score Calculation

Score range: 1 to 25

5.4 Risk Level Classification

Risk LevelScore RangeAction Required
🟢 Low1 – 5Accept with standard controls. No additional treatment required.
🟡 Medium6 – 10Documented treatment decision required. Monitor and review quarterly.
🟠 High12 – 16Priority treatment required. Treatment plan with target date and owner assigned.
🔴 Critical20 – 25Immediate action required. Escalate to CISO and CEO. Treatment plan within 5 business days.

5.5 Risk Matrix

Likelihood ↓ Impact →1 Negligible2 Minor3 Moderate4 Major5 Critical
5 Almost Certain5 Low10 Medium15 High20 Critical25 Critical
4 Likely4 Low8 Medium12 High16 High20 Critical
3 Possible3 Low6 Medium9 Medium12 High15 High
2 Unlikely2 Low4 Low6 Medium8 Medium10 Medium
1 Rare1 Low2 Low3 Low4 Low5 Low

6. Risk Evaluation

Risks are evaluated based on both inherent risk (before controls) and residual risk (after controls):

  1. Inherent risk is assessed first to understand the baseline threat level
  2. Current controls are documented and their effectiveness evaluated
  3. Residual risk is calculated after accounting for implemented controls
  4. Treatment decisions are based on the residual risk level

Priority for treatment:


7. Risk Treatment

Per the Information Security Policy (ISMS-POL-ISP-01) §6.2, identified risks shall be treated through one of four options:

OptionDescriptionApproval
MitigateImplement additional controls to reduce likelihood or impact to an acceptable levelSecurity Director
AcceptAccept the residual risk with documented rationale and business justificationPer §8 acceptance criteria
TransferTransfer risk via insurance, contractual arrangement, or outsourcingCEO + CISO
AvoidDiscontinue the activity or remove the asset that creates the riskCEO + CISO

Each treatment decision is recorded in the Risk Register with:


8. Risk Acceptance Criteria

Residual Risk LevelAcceptance AuthorityRequirements
🟢 LowSecurity DirectorAccepted by default with standard controls. No additional documentation required.
🟡 MediumCISODocumented rationale required. Reviewed quarterly.
🟠 HighCEO + CISOFormal risk acceptance statement. Business justification. Compensating controls documented. Reviewed quarterly.
🔴 CriticalCEO + CISOFormal risk acceptance with executive sign-off. Must demonstrate that treatment is not feasible or cost-proportionate. Reviewed monthly.

9. Roles and Responsibilities

RolePersonResponsibility
Security DirectorLucas ShinConduct risk assessments, maintain Risk Register, propose treatment plans, implement technical controls, report risk status
CISORichard WilliamsApprove risk treatment decisions, accept medium-level residual risks, conduct annual risk review with management
CEOFarah HerbertAccept high/critical residual risks, allocate resources for risk treatment, strategic risk oversight
All PersonnelReport identified risks and security incidents to the Security Director

10. Review and Update Cycle

TriggerActivityResponsible
AnnualFull risk reassessment aligned with ISMS management reviewSecurity Director + CISO
QuarterlyReview Risk Register status, verify treatment progress, reassess accepted risksSecurity Director
Significant ChangeReassess affected risks upon new client engagement, platform migration, personnel change, or architectural decisionSecurity Director
Post-IncidentAssess whether incident reveals new or changed risks; update Risk Register accordinglySecurity Director

11. Document Control

VersionDateAuthorChanges
0.1.02026-02-25Lucas ShinInitial release — established risk assessment methodology aligned with ISO 27001:2022 Clause 6.1.2/6.1.3 and Information Security Policy §6

Review Schedule

[End of Document]