ISMS Compliance
CyFun BasicIdentify

ID.RA-5: Risk determination

Threats, vulnerabilities, likelihoods, and impacts are used to determine risk

IDENTIFYID.RA-5

Requirement

The organisation shall conduct risk assessments in which risk is determined by threats, vulnerabilities and impact on business processes and assets.

Our Implementation

Risk determination follows a structured methodology combining threat identification, vulnerability assessment, and business impact analysis:

  • Scoring methodology: Risk Score = Probability (1–5) × Impact (1–5) × 100, enabling quantified comparison across risks
  • Probability scale: Five levels from Rare (1) to Almost Certain (5)
  • Impact scale: Five levels from Negligible (1) to Severe (5)
  • Current risk landscape: 13 risks documented (RSK-001 through RSK-013) with scores ranging from 800 to 1200 — covering device encryption, privilege separation, MFA gaps, vendor assessments, DR planning, vulnerability disclosure, centralised logging, incident response drills, security training, patch management, and penetration testing
  • Treatment assignment: Each risk has an assigned owner, mapped controls, and defined treatment approach (mitigate, accept, transfer, or avoid)

Gaps / Planned improvements:

  • No formal threat intelligence feeds incorporated (NEX-375)
  • Risk assessment not yet extended to all 33 software tools (NEX-375)
  • Annual reassessment cycle not yet completed — first assessment March 2026 (NEX-386)

Evidence

ImplementedL2 — Repeatable

On this page