Risk Assessment (Simulated)

Objective
Demonstrate a repeatable risk analysis workflow using a FAIR‑lite approach that produces audit‑ready artifacts and business‑aligned decisions.

Scope & Assumptions

Method at a Glance

  1. Inventory — gather risks with owners, controls, and ties to business processes.
  2. Score — apply FAIR‑lite: Impact (Low/Med/High) × Likelihood (Rare/Unlikely/Possible/Likely).
  3. Prioritize — heatmap and top‑N list.
  4. Treat — mitigate, accept, or transfer; log the why and the by‑when.
  5. Evidence — keep artifacts (register, scoring notes, tickets) in source control.

Risk Register (Excerpt)

| ID | Title | Owner | Key Control(s) | Impact | Likelihood | Current Treatment | |—:|—|—|—|—|—|—| | R‑01 | Privilege escalation via stale admin role | Platform Eng | IAM review SOP, Just‑In‑Time access | High | Possible | Mitigate (JIT & review) | | R‑02 | Public S3 bucket exposure | Cloud Eng | S3 Block Public Access, Config rules | High | Unlikely | Mitigate (SCP + rule) | | R‑03 | Vendor breach of PII | GRC | DPA, SOC 2 review, key mgmt | High | Possible | Transfer (contract) | | R‑04 | Phishing leads to Okta session hijack | IT Sec | FIDO2, Conditional Access | Medium | Likely | Mitigate (MFA hardening) |

Full register lives in repo for audit traceability (CSV/MD). Tie each risk to a control, owner, status, and a dated decision.


FAIR‑Lite Scoring Notes


Treatment Decisions (Top 3)


Outcomes


What’s Next