Risk Assessment Process Template
Risk Assessment Process Template
Risk Assessment Process Template
Process
Report Template
essence, you are free to copy, distribute and adapt the work, as long as you attribute the work to the Department of Internal
Affairs and abide by the other licence terms. To view a copy of this licence, visit http://creativecommons.org/licenses/by/3.0/nz/. Please note that
neither the Department of Internal Affairs emblem nor the New Zealand Government logo may be used in any way which infringes any provision
of the Flags, Emblems, and Names Protection Act 1981 or would infringe such provision if the relevant use occurred within New Zealand.
Attribution to the Department of Internal Affairs should be in written form and not by reproduction of the Department of Internal Affairs emblem or
Glossary of Terms 3
1 Executive Summary 5
2 Business Context 7
3 Detailed Findings 9
4 Controls Catalogue 10
Table of tables
Table 1 – Gross Risks 3
Table 2 – Residual Risks 3
Table 3 – Risk Details 3
Table 4 – Controls Catalogue 3
Table 5 – Controls to Risk Mapping 3
Table 6 – Impact Scale 3
Table 7 – Likelihood Scale 3
Table 8 – Risk Matrix 3
Table 9 – Risk Escalation and Reporting 3
15 19 22 24 25
Severe
10 14 18 21 23
Significant
6 9 13 17 20
Moderate
Impact
3 5 8 12 16
Minor
1 2 4 7 11
Minimal
Table 2 illustrates the expected residual rating of each of the identified risks if all the recommended
controls are implemented and appropriately configured and managed:
15 19 22 24 25
Severe
10 14 18 21 23
Significant
6 9 13 17 20
Moderate
Impact
3 5 8 12 16
Minor
1 2 4 7 11
Minimal
Business Owner
The business owner of the service is:
<Full Name>
<Job Title>
<Business Unit>
<Organisation>
Technical Owner
The technical owner of the service is:
<Full Name>
<Job Title>
<Business Unit>
<Organisation>
Other Stakeholders
Additional business stakeholders for the service are:
<Full Name>
<Job Title>
<Business Unit>
<Organisation>
<Full Name>
<Job Title>
<Business Unit>
<Organisation>
Information Classification
<Document the classification of the information stored, processed and/or transmitted by the
information system/service based on the classification scheme presented in Security in the
Government Sector (SIGS) 2002>
Business Impact
<Describe the business impact if the confidentiality, integrity, availability or privacy of the information
stored, processed or transmitted by the information system/service were compromised. Define and
document the maximum level of impact based on the impact rating table defined in Appendix X>
Users
<Document each user type and describe the access that they have to information with the information
system/service>:
<User Type A> – <description of how they access and use the service, together with the level
of permissions that they have>.
<User Type B> – <description of how they access and use the service, together with the level
of permissions that they have>.
Security Requirements
<Document the business owner’s security requirements for the information system/service in terms of
the Confidentiality, Integrity and Availability (CIA) requirements and any other relevant legislation
etc.>
0: Irrelevant/not applicable
1: Unimportant
2: Some importance
3: Important
4: Highly Important
5: Critical>
Risk Risk Description Key Risk Drivers Consequence Gross Risk Recommended Controls Residual Risk
ID
Risk Rating
Risk Rating
Likelihood
Likelihood
Impact
Impact
R01.
R02.
Therefore (where possible) the description of risks identified should use the following structure:
For example:
“A malicious party gains unauthorised access to information stored in the system by
performing a brute force password guessing attack as the organisations password and
account lockout policies are not enforced”; or
“The loss of a laptop leads to official information being disclosed to an unauthorised party,
and reputational damage to the Minister and agency as a disk encryption solution has not
been deployed to all laptop devices”.
Risk identification phase should include an examination of the knock-on effects of the consequences
of the identified risks, including their cascade and cumulative effects.
Rating Risk
The likelihood and impacts of the risks will be rated using the simple qualitative scales documented
below. The identified risks should be assessed with no controls in place. This will provide the gross
risk rating and enable the effectiveness of the proposed controls to be assessed.
All impacts need to be seen in a business context, and be informed by the business. The effect of a
risk event materialising must be assessed using the agency’s approved risk rating scales. If a risk has
multiple potential consequences then the impact with the largest effect must be used to rate the risk.
However, where multiple consequences for a single risk are assessed at the same level the impact
may be evaluated as being higher than the individual impact statements (e.g., a risk that has two
moderate impacts might be judged to have a significant impact when they are combined). Rating the
impact of a risk should include a consideration of any possible knock-on effects of the consequences
of the identified risks, including cascade and cumulative effects.
15 19 22 24 25
Significant
10 14 18 21 23
Moderate
Impact
6 9 13 17 20
Minor
3 5 8 12 16
Minimal
1 2 4 7 11
Escalation of Risk
Table 9 below provides an example of risk escalation and reporting table. It defines who must be informed
and has authority to accept risk based on its magnitude.