SCF Risk Management Model
SCF Risk Management Model
Privacy Risk
Management Model
(C|P-RMM) Overview
Version 2024.2
Disclaimer: This document is provided for reference purposes only. This document does not render professional
services and is not a substitute for professional services. If you have compliance questions, you are encouraged to
consult a cybersecurity professional.
Page 2
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
11C. Assessment Findings ........................................................................................................................................... 33
12. Determine Risk Exposure............................................................................................................................... 33
12A. Impact Effect (IE).................................................................................................................................................. 34
12B. Occurrence Likelihood (OL) .................................................................................................................................. 34
12C. Inherent Risk ....................................................................................................................................................... 34
12D. Residual Risk ....................................................................................................................................................... 34
13. Prioritize & Document Identified Deficiencies .................................................................................................. 35
14. Risk Determination: Report on Conformity (ROC) ............................................................................................. 35
14A. Strictly Conforms ................................................................................................................................................. 36
14B. Conforms ............................................................................................................................................................ 36
14C. Significant Deficiency........................................................................................................................................... 36
14D. Material Weakness .............................................................................................................................................. 37
15. Identify The Appropriate Management Audience .............................................................................................. 37
16. Management Determines Risk Treatment ........................................................................................................ 38
17. Cybersecurity & Data Protection Practitioners Implement & Document Risk Treatment....................................... 38
Appendix A: Calculating Inherent Risk vs Residual Risk............................................................................... 39
Step 1: Calculate The Inherent Risk...................................................................................................................... 40
Step 2: Account For Control Weighting ................................................................................................................. 40
Step 3: Account For Maturity Level Targets ........................................................................................................... 40
Step 4: Account For Mitigating Factors To Determine Residual Risk ......................................................................... 40
Appendix B: Reporting Risk Findings: Applying The Concepts Of Assurance, Conformity & Materiality ............ 41
Level 1 Rigor: Standard................................................................................................................................................. 41
Level 2 Rigor: Enhanced ............................................................................................................................................... 44
Level 3 Rigor: Comprehensive ...................................................................................................................................... 47
Appendix C: NIST SP 800-171 & CMMC Risk Management Considerations..................................................... 51
NIST SP 800-171 Controls .................................................................................................................................... 51
Appendix D: Documentation To Support Risk Management Practices........................................................... 52
Supporting Policies, Standards & Procedures ....................................................................................................... 52
Risk Management Program (RMP) ........................................................................................................................ 53
Page 3
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
EXECUTIVE SUMMARY
To help simplify risk management practices, ComplianceForge and the Secure Controls Framework (SCF) jointly developed the
Cybersecurity & Data Privacy Risk Management Model (C|P-RMM). The concept of creating the C|P-RMM was to establish an
efficient methodology to identify, assess, report and mitigate risk across the entire organization.
The C|P-RMM:
Is a free solution that organizations can use to holistically approach that breaks risk management down into seventeen
(17) distinctive steps;
Exists is to help cybersecurity and data privacy functions create a repeatable methodology to identify, assess, report and
mitigate risk;
Offers flexibility to report on risk at a control level or aggregate level (e.g., a project, department, domain or organization-
level); and
Guides the decision to a risk treatment option (e.g., reduce, avoid, transfer or accept).
The most important concept to understand in cybersecurity and data privacy-related risk management is that the cybersecurity
and IT departments generally do not “own” technology-related risks, since that “risk ownership” primarily resides with Line of
Business (LOB) management. An organization’s cybersecurity and data privacy functions serve as the primary mechanism to
educate those LOB stakeholders on identified risks and provide possible risk treatment solutions. Right or wrong, LOB
management is ultimately responsible to decide how risk is to be handled.
Where the C|P-RMM exists to help cybersecurity and data privacy functions create a repeatable methodology to identify, assess,
report and mitigate risk. This is based on the understanding that the responsibility to approve a risk treatment solution rests with
the management of the LOB/department/team/stakeholder that “owns” the risk. The C|P-RMM is meant to guide the decision to
one of these common risk treatment options:
1. Reduce the risk to an acceptable level;
2. Avoid the risk;
3. Transfer the risk to another party; or
4. Accept the risk.
It is a common problem for individuals who are directly impacted by risk to simply claim, “I accept the risk” in a misplaced
maneuver to make the risk go away, so that the project/initiative can proceed without having to first address deficiencies. This is
why it is critically important that as part of a risk management program to identify the various levels of management who have the
legitimate authority to make risk management decisions. This can help prevent low-level managers from recklessly accepting risk
that should be reserved for more senior management.
Fundamentally, risk management requires educating stakeholders for situational awareness and decision-making purposes,
where reporting risk can be summarized by explaining the “health” of the cybersecurity and data privacy program as to how the
assessed controls provide assurance that the organization’s stated risk tolerance is or is not achieved. Therefore, the goal of the
C|P-RMM is to categorize the risk assessment results according to one (1) of the following four (4) risk determinations:
1. Strictly Conforms;
2. Conforms;
3. Significant Deficiency; or
4. Material Weakness
The intent of having these risk determinations is to normalize the terminology associated with the level of conformity an
organization conforms to its applicable cybersecurity and data protection controls. This methodology can help an organization
adhere to its risk appetite.
Page 4
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
INTRODUCTION
The C|P-RMM is designed to be an integral tool of an organization’s ability to demonstrate evidence of due diligence and due care.
This not only benefits your organization by having solid risk management practices, but it can also serve as a way to reduce risk
for those who have to initiate the hard discussions on risk management topics.
Before you read further, ask yourself these two (2) questions about your organization and your personal exposure in risk
management:
1. Can you prove that the right people within your organization are both aware of risks and have taken direct responsibility
for mitigating those risks?
2. If there was a breach or incident that is due to identified risks that went unmitigated, where does the “finger pointing” for
blame immediately go to?
Instead of executive leadership hanging blame on the CIO or CISO, quality risk management documentation can prove that
reasonable steps were taken to identify, assess, report and mitigate risk. This type of documentation can provide evidence of due
diligence and due care on the part of the CIO/CISO/CRO, which firmly puts the responsibility back on the management of the
team/department/line of business that “owns” the risk.
Organizations often face conflicting expectations for risk management, based on department-level practices. For example, where
disjointed risk management practices exist, a “Moderate Risk” often has entirely different financial and/or operational impacts
across cybersecurity, IT, legal, finance, HR, operations, etc. The concept of Enterprise Risk Management (ERM) is to apply a
comprehensive, organization-wide approach to risk management practices, where each department operates according to a
similar playbook, where “Moderate Risk” means the same thing across the entire organization. This helps make an “apples to
apples” comparison that can aid in creating a more holistic approach to risk management practices when risk designations are
standardized.
Risk management activities are logical and systematic processes that can be used when making well-informed decisions to
improve effectiveness and efficiency. Proactive risk management activities have these characteristics:
Integrated into Business As Usual (BAU) activities (e.g., everyday work);
Focuses on proactive management involvement, rather than reactive crisis management;
Identifies and helps prepare for what might happen;
Identifies opportunities to improve performance; and
Proposes taking action to:
o Avoid or reduce unwanted exposures; and/or
o Maximize opportunities identified.
The articulation of risk management concepts is both an art and science. This requires a clear understanding of certain risk
management terminology:
Risk Appetite;
Risk Tolerance; and
Risk Threshold.
Risk management decisions must be explained in the context of the business, since risk management practices do not operate in
a vacuum. Therefore, it is crucial to understand the environment where risk management practices exist. This also requires a clear
understanding of business planning terminology:
Mission;
Vision; and
Strategy.
Page 5
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
From a hierarchical perspective:
An organization’s risk appetite exists at the corporate level to influence actions and decisions, specifically the
organization’s strategy. The strategy provides prioritization and resourcing constraints to the organization’s various Line
of Business (LOB).
The risk appetite helps define the organization’s risk tolerance to influence actions and decisions at the LOB level. Risk
tolerance influences objectives, maturity targets and resource prioritization.
Risk thresholds affect actions and decisions at the department and team levels. Risk thresholds influence processes,
technologies, staffing levels and the supply chain (e.g., vendors, suppliers, consultants, contractors, etc.). Defined risk
thresholds provide criteria to assess operational risks that exist in the course of conducting business.
What is important to keep at the forefront of risk management considerations is the material nature of risk, as it pertains to the
organization. Risks that have a material impact include, but are not limited to:
Confidentiality, Integrity, Availability & Safety (CIAS) of the organization’s sensitive/regulated data;
Supply chain security;
Macroeconomic forces;
Socio-political changes;
Statutory / regulatory changes;
Competitive landscape;
Diplomatic sanctions (e.g., taxes, customs, embargoes, etc.); and
Natural / manmade disasters (e.g., pandemics, war, etc.).
The goal of risk analysis is to determine the potential negative implications of an action or situation to determine one (1) of two (2)
decisions:
1. Acceptable Risk: the criteria fall within a range of acceptable parameters; or
2. Unacceptable Risk: The criteria fall outside a range of acceptable parameters.
Page 6
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Building upon the graphic listed above, when viewed from a risk appetite perspective, for an organization that wants to follow a
Moderate Risk Appetite, which establishes constraints for allowable and prohibited activities, based on the potential harm to the
organization:
ComplianceForge published a “threats vs vulnerabilities vs risks” informational graphic that describes the relationship between
these components. That informational graphic is shown below:1
1
Risk vs Threat vs Vulnerability Ecosystem - https://complianceforge.com/content/pdf/guide-risk-vs-threat-vs-vulnerability-ecosystem.pdf
Page 7
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
WHAT IS A RISK?
In the context of cybersecurity & data privacy practices, “risk” is defined as:
noun A situation where someone or something valued is exposed to danger, harm or loss.
verb To expose someone or something valued to danger, harm or loss.
In the context of this definition of risk, it is important to define underlying components of this risk definition:
Danger: state of possibly suffering harm or injury.
Harm: material / physical damage.
Loss: destruction, deprivation or inability to use.
WHAT IS A THREAT?
In the context of cybersecurity & data privacy practices, “threat” is defined as:
noun A person or thing likely to cause damage or danger.
verb To indicate impending damage or danger.
UNDERSTANDING THE DIFFERENCES BETWEEN: RISK TOLERANCE VS RISK THRESHOLD VS RISK APPETITE
Key concepts associated with risk management include:
Risk Appetite: The types and amount of risk, on a broad level, an organization is willing to accept in its pursuit of value. 2
Risk Tolerance: The level of risk an entity is willing to assume in order to achieve a desired result. 3
Risk Threshold: Values used to establish concrete decision points and operational control limits to trigger management
action and response escalation.4
A risk appetite does not contain granular risk management criteria and is primarily a “management statement” that is subjective
in nature. Similar in concept to how a policy is a "high-level statement of management intent," an organization's defined risk
appetite is a high-level statement of how all, or certain types of, risk are willing to be accepted. 5
Examples of an organization stating its risk appetite from basic to more complex statements:
"[organization name] is a low-risk organization and will avoid any activities that could harm its customers."
"[organization name] will aggressively pursue innovative solutions through Research & Development (R&D) to provide
industry-leading products and services to our clients, while maintaining a Moderate Risk Appetite. Developing
breakthrough products and services does invite potential risk through changes to traditional supply chains, disruptions to
business operations and changing client demand. Proposed business practices that pose greater than a Moderate Risk
will be considered on a case-by-case basis for financial, operational and legal implications.”
It is important to point out that in many immature risk programs, risk appetite statements are divorced from reality. Executive
leaders mean well when they issue risk appetite statements, but the Business As Usual (BAU) practices routinely violate the risk
appetite. This is often due to numerous reasons that include, but are not limited to:
Technical debt;
Dysfunctional management decisions;
Insecure practices;
Inadequate funding/resourcing;
Improperly scoped support contracts (e.g., Managed Service Providers (MSPs), consultants, vendors, etc.); and
Lack of pre-production security testing.
2
NIST Glossary for Risk Appetite - https://csrc.nist.gov/glossary/term/risk_appetite
3
NIST Glossary for Risk Tolerance - https://csrc.nist.gov/glossary/term/risk_tolerance
4
NIST Glossary for Thresholds - https://csrc.nist.gov/glossary/term/thresholds
5
ComplianceForge Hierarchical Cybersecurity Governance Framework (HCGF) - https://complianceforge.com/content/pdf/complianceforge-
hierarchical-cybersecurity-governance-framework.pdf
Page 8
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
WHAT IS A RISK TOLERANCE?
Risk tolerance is based on objective criteria, unlike the subjective, conceptual nature of a risk appetite. Defining objective criteria
is a necessary step to be able to categorize risk on a graduated scale. Establishing objective criteria to quantify the impact of a
risk enables risk assessments to leverage that same criteria and assist decision-makers in their risk management decisions (e.g.,
accept, mitigate, transfer or avoid).
From a graduated scale perspective, it is possible to define "tolerable" risk criteria to create five (5) useful categories of risk:
1. Low Risk;
2. Moderate Risk;
3. High Risk;
4. Severe Risk; and
5. Extreme Risk.
There are two (2) objective criteria that go into defining what constitutes a low, moderate, high, severe or Extreme Risk includes:
1. Impact Effect (IE); and
2. Occurrence Likelihood (OL).
There are three (3) general approaches are commonly employed to estimate OL:
1. Relevant historical data;
2. Probability forecasts; and
3. Expert opinion.
Page 9
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
An organization's risk tolerance is influenced by several factors that includes, but is not limited to:
Statutory, regulatory and contractual compliance obligations (including adherence to privacy principles for ethical data
protection practices).
Organization-specific threats (natural and manmade).
Reasonably expected industry practices.
Pressure from competition.
Executive management decisions.
Organizations that are reasonably expected to operate with a Low Risk Tolerance include, but are not limited to:
Critical infrastructure
Utilities (e.g., electricity, drinking water, natural gas, sanitation, etc.)
Telecommunications (e.g., Internet Service Providers (ISPs), mobile phone carriers, Cloud Service Providers (CSPs), etc.)
(high value)
Transportation (e.g., airports, railways, ports, tunnels, fuel delivery, etc.)
Technology Research & Development (R&D) (high value)
Healthcare (high value)
Government institutions:
o Military
o Law enforcement
o Judicial system
o Financial services (high value)
o Defense Industrial Base (DIB) contractors (high value)
Organizations that are reasonably expected to operate with a Moderate Risk Tolerance include, but are not limited to:
Education (e.g., K-12, colleges, universities, etc.)
Utilities (e.g., electricity, drinking water, natural gas, sanitation, etc.)
Telecommunications (e.g., Internet Service Providers (ISPs), mobile phone carriers, etc.)
Transportation (e.g., airports, railways, ports, tunnels, fuel delivery, etc.)
Technology services (e.g., Managed Service Providers (MSPs), Managed Security Service Providers (MSSPs), etc.)
Manufacturing (high value)
Healthcare
Defense Industrial Base (DIB) contractors and subcontractors
Page 10
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Legal services (e.g., law firms)
Construction (high value)
Organizations that may choose to operate with a High Risk Tolerance include, but are not limited to:
Startups
Hospitality industry (e.g., restaurants, hotels, etc.)
Construction
Manufacturing
Personal services
Organizations that may choose to operate with a High Risk Tolerance include, but are not limited to:
Startups
Artificial Intelligence (AI) developers
Risk thresholds are entirely unique to each organization, based on several factors that include:
Financial stability;
Management preferences;
Compliance obligations (e.g., statutory, regulatory and/or contractual); and
Insurance coverage limits.
Page 11
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
WHAT IS MATERIALITY?
The SCF defines materiality as, “A deficiency, or a combination of deficiencies, in an organization’s cybersecurity and/or data
privacy controls (across its supply chain) where it is probable that reasonable threats will not be prevented or detected in a timely
manner that directly, or indirectly, affects assurance that the organization can adhere to its stated risk tolerance.” 6
The intended usage of materiality is meant to provide relevant context, as it pertains to risk thresholds. This is preferable when
compared to relatively hollow risk findings that act more as guidelines than actionable, decision-making criteria. Cybersecurity
materiality is meant to act as a "guard rail" for risk management decisions. A material weakness crosses an organization’s risk
threshold by making an actual difference to the organization, where systems, applications, services, personnel, the organization
and/or third-parties are, or may be, exposed to an unacceptable level of risk.
The SEC, Generally Accepted Accounting Principles (GAAP) and International Financial Reporting Standards (IFRS) lack specificity
in defining the criteria for materiality. Therefore, organizations generally have leeway to define it on their own. The lack of
authoritative definition for materiality is not unique, since the concept of risk appetite, risk tolerance and risk threshold also suffer
from nebulous definitions by statutory and regulatory authorities. For an item to be considered material, the control deficiency,
risk, threat or incident (singular or a combination) generally must meet one or more of the following criteria where the potential
financial impact is:7
≥ 5% of pre-tax income
≥ 0.5% of total assets
≥ 1% of total equity (shareholder value); and/or
≥ 0.5% of total revenue.
With evolving regulatory requirements for public disclosures, it is increasingly important to understand the nuances between
material weakness vs material risk vs material threat vs material incident, since they have specific meanings:
MATERIAL WEAKNESS
A material weakness is a deficiency, or a combination of deficiencies, in an organization's cybersecurity and/or data privacy
controls (across its supply chain) where it is probable that reasonable threats will not be prevented or detected in a timely manner
that directly, or indirectly, affects assurance that the organization can adhere to its stated risk tolerance.
When there is an existing deficiency (e.g., control deficiency) that poses a material impact, that is a material weakness
(e.g., inability to maintain access control, lack of situational awareness to enable the timely identification and response
to incidents, lacking pre-production control validation testing, etc.).
A material weakness will be identified as part of a gap assessment, audit or assessment as a finding due to one or more
control deficiencies.
A material weakness should be documented in an organization's Plan of Action & Milestones (POA&M), risk register, or
similar tracking mechanism used for remediation purposes.
MATERIAL CONTROL
When a deficiency, or absence, of a specific control poses a material impact, that control is designated as a material control. A
material control is such a fundamental cybersecurity and/or data protection control that:
• It is not capable of having compensating controls; and
• Its absence, or failure, exposes an organization to such a degree that it could have a material impact.
Page 12
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
MATERIAL RISK
When an identified risk that poses a material impact, that is a material risk. A material risk:
Is a quantitative or qualitative scenario where the exposure to danger, harm or loss has a material impact (e.g., significant
financial impact, potential class action lawsuit, death related to product usage, etc.); and
Should be identified and documented in an organization's "risk catalog" that chronicles the organization's relevant and
plausible risks.
MATERIAL THREAT
When an identified threat poses a material impact, that is a material threat. A material threat:
Is a vector that causes damage or danger that has a material impact (e.g., poorly governed Artificial Intelligence (AI)
initiatives, nation state hacking operations, dysfunctional internal management practices, etc.); and
Should be identified and documented in an organization's "threat catalog" that chronicles the organization's relevant and
plausible threats.
MATERIAL INCIDENT
When an incident poses a material impact, that is a material incident. A material incident is an occurrence that does or has the
potential to:
Jeopardize the Confidentiality, Integrity, Availability and/or Safety (CIAS) of a system, application, service or the data that
it processes, stores and/or transmits with a material impact on the organization; and/or
Constitute a violation, or imminent threat of violation, of an organization's policies, standards, procedures or acceptable
use practices that has a material impact (e.g., malware on sensitive and/or regulated systems, emergent AI actions,
illegal conduct, business interruption, etc.).
Page 13
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
HISTORICAL CONTEXT FOR CYBERSECURITY & DATA PRIVACY MATERIALITY USAGE
For Governance, Risk Management & Compliance (GRC) practitioners, materiality is often relegated to Sarbanes-Oxley Act (SOX)
compliance. However, the concept of materiality is much broader than SOX and can be applied as part of risk reporting in any type
of conformity assessment. Financial-related materiality definitions focus on investor awareness of third-party practices, not
inwardly looking for adherence to an organization's risk tolerance:
Per the Security and Exchange Commission (SEC), information is material “to which there is a substantial likelihood that
a reasonable investor would attach importance in determining whether to purchase the security registered.” 8
Per the International Accounting Standards Board (IASB), information is material, “if omitting, misstating or obscuring it
could reasonably be expected to influence the decisions that the primary users of general purpose financial statements
make on the basis of those financial statements, which provide financial information about a specific reporting entity.”9
In a mature risk program, the results of risk assessments are evaluated with the organization's risk appetite in consideration. For
example, if the organization has a Moderate Risk Appetite and there are several findings in a risk assessment that are High Risk,
then action must be taken to reduce the risk. Accepting a High Risk would violate the Moderate Risk Appetite set by management.
In reality, which leaves remediation, transferring or avoiding as the remaining three (3) options, since accepting the risk would be
prohibited.
Given the necessary changes to ramp up both talent and technology to put the appropriate solutions in place to meet the
company’s deadlines, there are gaps/deficiencies. When the risk management team assesses the associated risks, the results
identify a range of risks from High to Extreme. The reason for these results is simply due to the higher likelihood of emergent
behaviors occurring from AI that potentially could harm individuals (e.g., catastrophic impact effect). The results were objective
and told a compelling story that there is a realistic chance of significant damage to the company’s reputation and financial
liabilities from class action lawsuits.
With those results that point to risks exceeding the organization’s risk appetite, it is a management decision on how to proceed.
What does the CEO / Board of Directors (BoD) do?
Dispense with its long-standing risk appetite for this specific project so that a potentially lucrative business opportunity
can exist?
Is the AI project cancelled due to the level of risk?
If the CEO/BoD proceeds with accepting the risk, is it violating its fiduciary duties, since it is accepting risk that it
previously deemed unacceptable? Additionally, would it be considered negligent to accept high, severe or Extreme Risk
(e.g., would a rational individual under similar circumstances make the same decision?)?
8
SEC - https://www.sec.gov/comments/265-24/26524-77.pdf
9
IFRS - https://www.ifrs.org/content/dam/ifrs/project/definition-of-materiality/definition-of-material-feedback-statement.pdf
Page 14
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
SUMMARIZING THE INTEGRATION OF RISK MANAGEMENT & BUSINESS PLANNING
These key concepts of how risk appetite, risk tolerance and risk thresholds interact with strategic, operational and tactical actions
and decisions can be visualized in the following graphic:10
At the strategic layer, where corporate-level actions and decisions are made, the organization’s risk appetite is defined.
The scope of the risk appetite can be organization-wide or compartmentalized to provide enhanced granularity.
At the operational level, where Line of Business (LOB)-level actions and decisions are made, the organization’s risk
tolerance is put into practice. The organization’s risk tolerance is defined by its established risk appetite.
At the tactical level, where department / team-level actions and decisions are made, the organization’s risk thresholds
are used to provide criteria to assess operational risk. That operational risk must adhere to the organization’s risk
tolerance and therefore, its risk appetite.
management.pdf
Page 15
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
RISK MANAGEMENT: STRATEGIC CONSIDERATIONS
At this level, corporate-level actions and decisions define the strategic direction of the organization and its approach to risk
management practices:
MISSION
Influences the vision of the organization.
Requires a strategy to accomplish.
VISION
Inspires personnel to achieve the mission.
STRATEGY
Implements the mission.
Quantifies “downstream” objectives for Lines of Business (LOB)
Influences the organization’s risk appetite.
COMPLIANCE OBLIGATIONS
Affect the strategy.
Affect resource prioritization.
RISK APPETITE
Must support the organization’s strategy.
Defines the organization’s risk tolerance.
RESOURCE PRIORITIZATION
Creates operational risks.
Affects:
o Processes that are implemented to achieve objectives;
o Technologies used to support operations;
o Staffing levels at the department / team level; and
o Supply chain quality & security (e.g., vendors, suppliers, contractors, consultants, etc.).
RISK TOLERANCE
Is defined by the organization’s risk appetite.
Influences LOB objectives.
Quantifies the organization’s risk thresholds.
Page 16
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
RISK MANAGEMENT: TACTICAL CONSIDERATIONS
At this level, department / team-level actions and decisions define the tactics used for day-to-day operations:
PROCESSES
Are affected by:
o Department / team objectives;
o Capability maturity targets; and
o Resource prioritization.
Create operational risks.
TECHNOLOGIES
Are affected by:
o Department / team objectives;
o Capability maturity targets; and
o Resource prioritization.
Create operational risks.
STAFFING
Are affected by:
o Department / team objectives;
o Capability maturity targets; and
o Resource prioritization.
Creates operational risks.
SUPPLY CHAIN
Are affected by:
o Department / team objectives;
o Capability maturity targets; and
o Resource prioritization.
Creates operational risks.
RISK THRESHOLDS
Provide criteria to assess operational risks.
Affect:
o Processes that are implemented to achieve objectives;
o Technologies used to support operations;
o Staffing levels at the department / team level; and
o Supply chain quality & security (e.g., vendors, suppliers, contractors, consultants, etc.).
OPERATIONAL RISK
Is assessed against the organization’s risk thresholds.
Must adhere to the organization’s risk tolerance, where the organization has four (4) options to address identified risks:
1. Reduce the risk to an acceptable level;
2. Avoid the risk;
3. Transfer the risk to another party; or
4. Accept the risk.
Page 17
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
CYBERSECURITY & DATA PRIVACY RISK MANAGEMENT MODEL (C|P-RMM)
The concept of creating the C|P-RMM was to create an efficient methodology to identify, assess, report and mitigate risk. This
project was approached from the perspective of asking the question, “How should I management risk?” and was a collaboration
between ComplianceForge and the Secure Controls Framework (SCF).
Therefore, it is vitally important to understand that risks and threats do not exist in a vacuum. If your cybersecurity and data privacy
program is appropriately built, you will have a robust controls framework where risks and threats will map directly to controls.
Why is this?
Controls are central to managing risks, threats procedures and metrics.
Risks, threats, metrics and procedures need to map into the controls, which then map to standards and policies.
In risk management, the old adage is applicable that “the path to hell is paved with good intentions.” Often, risk management
personnel are tasked with creating risk assessments and questions to ask without having a centralized set of organization-wide
cybersecurity and data privacy controls to work from. This generally leads to risk teams making up risks and asking questions that
are not supported by the organization’s policies and standards. For example, an organization is an “ISO shop” that operates an
ISO 27002-based Information Security Management System (ISMS) to govern its policies and standards, but its risk team is asking
questions about NIST SP 800-53 or NIST SP 800-171 controls that are not applicable to the organization.
This scenario of “making up risks” points to a few security program governance issues:
If the need for additional controls to cover risks is legitimate, then the organization is improperly scoped and does not
have the appropriate cybersecurity and data privacy controls to address its applicable statutory, regulatory, contractual
or industry-expected practices.
If the organization is properly scoped, then the risk team is essentially making up requirements that are not supported by
the organization’s policies and standards.
Page 18
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
COVERAGE FROM START TO FINISH
The C|P-RMM addresses risk management from how you start building a risk management program through the ongoing risk
management practices that are expected within your organization.
Page 19
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
C|P-RMM: STEPS TO IDENTIFY, ASSESS, REPORT & MITIGATE RISK
The C|P-RMM is broken down into seventeen (17) core steps (note - these steps correspond to the diagram from the previous
page):
Page 20
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
and requirements exists. This information is necessary to build out a System Security & Privacy Plan (SSPP).
Since the LOB “owns” risk management decisions, the organization needs to ensure that those individuals in roles that
make risk management decisions are competent and appropriately trained to make risk-related decisions.
In the context of this definition of risk, it is important to define underlying components of this risk definition:
Danger: state of possibly suffering harm or injury
Harm: material / physical damage
Loss: destruction, deprivation or inability to use
With this understanding of what risk is, the Secure Controls Framework (SCF) contains a catalog of thirty-three (33) risks that are
directly mapped to each of the SCF’s controls.
Risk*
Note - Some of these risks may Description of Possible Risk Due To Control Deficiency
Risk Grouping Risk # indicate a deficiency that could
be considered a failure to meet IF THE CONTROL FAILS, RISK THAT THE ORGANIZATION
"reasonable security practices" IS EXPOSED TO IS:
Page 21
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Emergent properties and/or Emergent properties and/or unintended consequences from
R-AM-3
unintended consequences Artificial Intelligence & Autonomous Technologies (AAT).
Business
R-BC-3 Reduction in productivity Diminished user productivity.
Continuity
Exposure R-EX-4 Diminished reputation Diminished brand value (e.g., tarnished reputation).
Page 22
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Missing or incorrect cybersecurity and/or privacy controls
R-GV-2 Incorrect controls scoping
due to incorrect or inadequate control scoping practices.
Inability to maintain situational The inability to detect cybersecurity and/or privacy incidents
R-SA-1
awareness (e.g., a lack of situational awareness).
Situational
Awareness
Lack of a security-minded The inability to appropriately educate and train personnel to
R-SA-2
workforce foster a security-minded workforce.
Page 23
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Loss of Confidentiality, Integrity, Availability and/or Safety
(CIAS) from physical security exposure of third-party
Third-party physical security
R-SC-2 structures, facilities and/or other physical assets that
exposure
affects the supply chain through impacted products and/or
services.
Loss of Confidentiality, Integrity, Availability and/or Safety
Third-party supply chain
(CIAS) from "downstream" third-party relationships, visibility
R-SC-3 relationships, visibility and
and controls that affect the supply chain through impacted
controls
products and/or services.
Third-party compliance / legal The inability to maintain compliance due to third-party non-
R-SC-4
exposure compliance, criminal acts, or other relevant legal action(s).
Threat
Threat* Threat Description
#
Regardless of geographic location, periods of reduced rainfall are expected. For non-
NT-1 Drought & Water Shortage agricultural industries, drought may not be impactful to operations until it reaches
the extent of water rationing.
Earthquakes are sudden rolling or shaking events caused by movement under the
NT-2 Earthquakes earth’s surface. Although earthquakes usually last less than one minute, the scope
of devastation can be widespread and have long-lasting impact.
Page 24
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Flooding is the most common of natural hazards and requires an understanding of
the local environment, including floodplains and the frequency of flooding events.
NT-4 Floods
Location of critical technologies should be considered (e.g., server room is in the
basement or first floor of the facility).
Hurricanes and tropical storms are among the most powerful natural disasters
Hurricanes & Tropical because of their size and destructive potential. In addition to high winds, regional
NT-5
Storms flooding and infrastructure damage should be considered when assessing
hurricanes and tropical storms.
Landslides occur throughout the world and can be caused by a variety of factors
including earthquakes, storms, volcanic eruptions, fire, and by human modification
NT-6 Landslides & Debris Flow of land. Landslides can occur quickly, often with little notice. Location of critical
technologies should be considered (e.g., server room is in the basement or first floor
of the facility).
Due to the wide variety of possible scenarios, consideration should be given both to
Pandemic (Disease) the magnitude of what can reasonably happen during a pandemic outbreak (e.g.,
NT-7
Outbreaks COVID-19, Influenza, SARS, Ebola, etc.) and what actions the business can be taken
to help lessen the impact of a pandemic on operations.
Severe weather is a broad category of meteorological events that include events that
NT-8 Severe Weather
range from damaging winds to hail.
Space weather includes natural events in space that can affect the near-earth
environment and satellites. Most commonly, this is associated with solar flares from
NT-9 Space Weather
the Sun, so an understanding of how solar flares may impact the business is of
critical importance in assessing this threat.
Thunderstorms are most prevalent in the spring and summer months and generally
occur during the afternoon and evening hours, but they can occur year-round and at
NT-10 Thunderstorms & Lightning all hours. Many hazardous weather events are associated with thunderstorms.
Under the right conditions, rainfall from thunderstorms causes flash flooding and
lightning is responsible for equipment damage, fires and fatalities.
Tornadoes occur in many parts of the world, including the US, Australia, Europe,
Africa, Asia, and South America. Tornadoes can happen at any time of year and
NT-11 Tornadoes occur at any time of day or night, but most tornadoes occur between 4–9 p.m.
Tornadoes (with winds up to about 300 mph) can destroy all but the best-built man-
made structures.
All tsunamis are potentially dangerous, even though they may not damage every
coastline they strike. A tsunami can strike anywhere along most of the US coastline.
NT-12 Tsunamis
The most destructive tsunamis have occurred along the coasts of California, Oregon,
Washington, Alaska and Hawaii.
While volcanoes are geographically fixed objects, volcanic fallout can have
significant downwind impacts for thousands of miles. Far outside of the blast zone,
NT-13 Volcanoes
volcanoes can significantly damage or degrade transportation systems and also
cause electrical grids to fail.
Winter storms is a broad category of meteorological events that include events that
Winter Storms & Extreme range from ice storms, to heavy snowfall, to unseasonably (e.g., record breaking)
NT-14
Cold cold temperatures. Winter storms can significantly impact business operations and
transportation systems over a wide geographic region.
Page 25
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
threats:
Threat
Threat* Threat Description
#
Unlike physical threats that prompt immediate action (e.g., "stop, drop, and roll" in
the event of a fire), cyber incidents are often difficult to identify as the incident is
Hacking & Other occurring. Detection generally occurs after the incident has occurred, with the
MT-2
Cybersecurity Crimes exception of "denial of service" attacks. The spectrum of cybersecurity risks is
limitless and threats can have wide-ranging effects on the individual, organizational,
geographic, and national levels.
The use of NBC weapons are in the possible arsenals of international terrorists and it
must be a consideration. Terrorist use of a “dirty bomb” — is considered far more
Nuclear, Biological and
MT-4 likely than use of a traditional nuclear explosive device. This may be a combination of
Chemical (NBC) Weapons
conventional explosive device with radioactive / chemical / biological material and
be designed to scatter lethal and sub-lethal amounts of material over a wide area.
Armed attacks, regardless of the motivation of the attacker, can impact a business.
Scenarios can range from single actors (e.g., "disgruntled" employee) all the way to a
MT-6 Terrorism & Armed Attacks coordinated terrorist attack by multiple assailants. These incidents can range from
the use of blade weapons (e.g., knives), blunt objects (e.g., clubs), to firearms and
explosives.
Utility service disruptions are focused on the sustained loss of electricity, Internet,
natural gas, water, and/or sanitation services. These incidents can have a variety of
MT-7 Utility Service Disruption
causes but directly impact the fulfillment of utility services that your business needs
to operate.
Dysfunctional management practices are a manmade threat that expose an
organization to significant risk. The threat stems from the inability of weak,
Dysfunctional Management
MT-8 ineffective and/or incompetent management to (1) make a risk-based decision and
Practices
(2) support that decision. The resulting risk manifests due to (1) an absence of a
required control or (2) a control deficiency.
Human error is a broad category that includes non-malicious actions that are
MT-9 Human Error unexpected and unpredictable by humans. These incidents can range from
misconfigurations, to misunderstandings or other unintentional accidents.
Page 26
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Laws, regulations and/or contractual obligations that directly or indirectly weaken an
Statutory / Regulatory / organization's security & privacy controls. This includes hostile nation states that
MT-11
Contractual Obligation leverage statutory and/or regulatory means for economic or political espionage
and/or cyberwarfare activities.
Sanctions is a Supply Chain Risk Management (SCRM) threat category that pertains
to past or present fraudulent activity or corruption. Primarily, the concern is if the
MT-19 Sanctions
third-party is subject to suspension, exclusion or other sanctions that can affect the
supply chain.
Counterfeit / Non-Conforming Products is a Supply Chain Risk Management (SCRM)
threat category that pertains to the integrity of components within the supply chain.
Counterfeit / Non- Counterfeits are products introduced to the supply chain that falsely claim to be
MT-20
Conforming Products produced by the legitimate Original Equipment Manufacturer (OEM), whereas non-
conforming are OEM products / materials that fail to meet the customer
specifications. Both can have a detrimental effect on the supply chain.
Operational Environment is a Supply Chain Risk Management (SCRM) threat
category that pertains to the user environment (e.g., place of performance).
MT-21 Operational Environment
Primarily, the concern is if the operational environment is hazardous that could
expose the organization operationally or financially.
Page 27
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Supply Chain Interdependencies is a Supply Chain Risk Management (SCRM) threat
Supply Chain
MT-22 category pertaining to interdependencies related to data, systems and mission
Interdependencies
functions.
Secure and compliant operations exist when both MCR and DSR are implemented and properly governed:
MCR are primarily externally-influenced, based on industry, government, state and local regulations. MCR should never
imply adequacy for secure practices and data protection, since they are merely compliance-related.
DSR are primarily internally-influenced, based on the organization’s respective industry and risk tolerance. While MCR
establishes the foundational floor that must be adhered to, DSR are where organizations often achieve improved
efficiency, automation and enhanced security.
The combination of MCR and DSR equate to an organization’s Minimum Security Requirements (MSR), which define the “must
have” and “nice to have” requirements for People, Processes, Technologies, Data & Facilities (PPTDFF) in one control set. It
defines the Minimum Viable Product (MVP) technical and business requirements from a cybersecurity and data privacy
perspective. In short, the MSR can be considered to be an organization’s IT General Controls (ITGC), which establishes the basic
controls that must be applied to systems, applications, services, processes and data throughout the enterprise. ITGC provides
the foundation of assurance for an organization’s decision makers. ITGC enables an organization’s governance function to define
how technologies are designed, implemented and operated.
Commensurate with risk, cybersecurity and data privacy measures must be implemented to guard against unauthorized access
to, alteration, disclosure or destruction of data and systems, applications and services. This also includes protection against
accidental loss or destruction. The security of systems, applications and services must include controls and safeguards to offset
possible threats, as well as controls to ensure Confidentiality, Integrity, Availability and Safety (CIAS):
11
Integrated Controls Management (ICM) model - http://integrated-controls-management.com/
Page 28
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Confidentiality – Confidentiality addresses preserving
restrictions on information access and disclosure so
that access is limited to only authorized users and
services.
Integrity – Integrity addresses the concern that
sensitive data has not been modified or deleted in an
unauthorized and undetected manner.
Availability – Availability addresses ensuring timely
and reliable access to and use of information.
Safety – Safety addresses reducing risk associated
with embedded technologies that could fail or be
manipulated by nefarious actors.
Note: The SCF has built-In Control Weighting Values [1-10], a maturity model and the SCF controls written in question format.
Maturity model criteria should be used by the organization as the benchmark to evaluate cybersecurity and data privacy controls.
Page 29
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Privacy Impact Assessment (PIA).
The definition of each assessment method includes types of objects to which the method can be applied. In addition, the
application of each method is described in terms of the attributes of depth and coverage.
The depth attribute addresses the rigor and level of detail of the assessment.
The coverage attribute addresses the scope or breadth of the assessment.
Standard rigor represents sufficient due care in the evaluation of cybersecurity and/or data protection controls. Standard rigor is
appropriate for the Manual Point In Time (MPIT) assessment methodology that:
1. Is relevant to a specific point in time (time at which the controls were evaluated); and
2. Relies on the manual review of artifacts to derive a finding.
Enhanced rigor is appropriate for the Automated Point In Time (APIT) assessment methodology that utilizes automation to
augment a traditional assessment methodology, where AAT is used to compare the desired state of conformity versus the current
state via machine-readable configurations and/or assessment evidence:
1. Is relevant to a specific point in time (time at which the controls were evaluated);
2. In situations where technology cannot evaluate evidence, evidence is manually reviewed; and
3. The combined output of automated and manual reviews of artifacts is used to derive a finding.
Comprehensive rigor is appropriate for the Automated Evidence with Human Review (AEHR) assessment methodology that is
used for ongoing, continuous control assessments:
1. AAT continuously evaluates controls by comparing the desired state of conformity versus the current state through
machine-readable configurations and/or assessment evidence; and
2. Recurring human reviews:
Page 30
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
a. Evaluate the legitimacy of the results from automated control assessments; and
b. Validate the automated evidence review process to derive a finding.
An assessor can generally find this information in a well-documented System Security & Privacy Plan (SSPP). If the scoping is
incorrect, the context will likely also be incorrect, which can lead to a misguided and inaccurate risk assessment.
Without specific statutory, regulatory or contractual scoping instructions, the organization should leverage the Unified Scoping
Guide (USG) as the basis for scoping sensitive and/or regulated data. 12
12
Unified Scoping Guide (USG) - https://complianceforge.com/content/pdf/unified-scoping-guide-usg.pdf
Page 31
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
10. CONFORMITY ASSESSMENT (CONTROLS GAP ASSESSMENT)
Based on the applicable statutory, regulatory and contractual obligations that impact the SPRE, the entity is expected to have an
applicable set of controls to cover those needs. That set of controls identifies the in-scope requirements that must be evaluated
to determine the organization’s conformity against that specified control set.
The assessor leverages Assessment Objectives (AOs) to perform a conformity assessment against the designated cybersecurity
& data protection controls. The AOs provide objective criteria that must be satisfied to legitimately determine whether the control
is implemented and operating as intended.
Note: There may be multiple AOs associated with a control. The SCF spreadsheet contains an AO catalog, tied to SCF controls.
11A-1. EXAMINE
The process of checking, inspecting, reviewing, observing, studying or analyzing one or more assessment objects to facilitate
understanding, achieve clarification or obtain evidence.
11A-2. INTERVIEW
The process of conducting discussions with individuals or groups in an organization to facilitate understanding, achieve
clarification or lead to the location of evidence.
11A-3. TEST
The process of exercising one or more assessment objects under specified conditions to compare actual with expected behavior.
When the control deficiencies are identified, the assessor must utilize an entity-accepted method to assess the risk in the most
objective method possible. Criteria for assessing a control for deficiencies is generally defined as either:
Qualitative;
Semi-Qualitative; or
Quantitative
In most cases, it is not feasible to have an entirely quantitative assessment, so assessments should be expected to include semi-
qualitative or qualitative aspects. There are multiple methods to actually assess and calculate risk. The C|P-RMM simplifies risk
management practices by utilizing a form of risk matrix that takes Occurrence Likelihood (OL) and Impact Effect (IE) into account
to determine the risk categorization.
11B. METHODOLOGIES
Note: There are three (3) options to implement assessment methods:
1. Manual Point In Time (MPIT);
2. Automated Point In Time (APIT); and
3. Automated Evidence with Human Review (AEHR).
Page 32
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
11B-2. AUTOMATED POINT IN TIME (APIT)
APIT utilizes automation to augment a traditional assessment methodology, where Artificial Intelligence and Autonomous
Technologies (AAT) are used to compare the desired state of conformity versus the current state via machine-readable
configurations and/or assessment evidence:
Is relevant to a specific point in time (time at which the controls were evaluated);
In situations where technology cannot evaluate evidence, evidence is manually reviewed; and
The combined output of automated and manual reviews of artifacts is used to derive a finding; or
11C-1. SATISFACTORY
Positive finding. Appropriate evidence of due diligence and due care exists to demonstrate the design and/or operation of an
organization’s cybersecurity and/or data protection control satisfactorily meets all applicable Assessment Objectives (AOs) that
determine if the intent of the control is achieved.
11C-4. DEFICIENT
Negative finding. A “deficiency” exists when the design and/or operation of an organization’s cybersecurity and/or data protection
control fails to meet one of more AO that determines if the intent of the control is achieved.
Note: Determining risk exposure can be calculated at an individual level and averaged across multiple deficiencies.
Page 33
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
4. Severe; and
5. Extreme.
There are three (3) general approaches are commonly employed to estimate OL:
1. Relevant historical data;
2. Probability forecasts; and
3. Expert opinion.
Page 34
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Maturity Level (ML) and Mitigating Factors (MF). See Appendix A for more details on calculating residual risk.
The organization’s risk documentation methodology should utilize one or more of the following options:
Risk Register
Plan of Action & Milestones (POA&M)
Risk Assessment Report
System Security & Privacy Plan (SSPP); or
Another documentation option of your choosing.
This approach can be summarized by reporting to the organization’s management on the “health” of the assessed controls by one
of the following four (4) risk determinations:
1. Strictly Conforms;
2. Conforms;
3. Significant Deficiency; and
4. Material Weakness.
Page 35
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
14A. STRICTLY CONFORMS
This is a positive outcome and indicates that at a high-level, the organization’s cybersecurity and data privacy practices conform
to its selected cybersecurity and data privacy practices. Strictly Conforms means:
The organization/LOB can demonstrate Strict Conformity with its selected cybersecurity and/or data protection controls,
where one hundred percent (100%) of the assessed controls have reasonable evidence to conclude:
o The controls are met and operational;
o Any control designated as Not Applicable (N/A) is validated as such by the assessor; and/or
o Where applicable, compensating controls are validated by the assessor as being:
Applicable;
Reasonable; and
Implemented and operating properly; and
Assessed controls provide reasonable assurance that the organization’s/LOB’s cybersecurity and data protection
program provides adequate security, where it:
o Adheres to a defined and documented risk tolerance;
o Mitigates material cybersecurity and/or data protection risks;
o Is designed to detect and protect against material cybersecurity and/or data protection threats; and
o Is prepared to respond to material incidents.
Strictly Conforms is a statement to the organization’s management that sufficient evidence of due care and due diligence exists
to assure that the organization’s stated risk tolerance can be achieved.
14B. CONFORMS
This is a positive outcome and indicates that at a high-level, the organization’s cybersecurity and data privacy practices conform
to its selected cybersecurity and data privacy practices. Conforms means:
The organization/LOB can demonstrate Conformity with its selected cybersecurity and/or data protection controls, where
at least eighty percent (80%) of the assessed controls have reasonable evidence to conclude:
o The controls are met and operational;
o Any control designated as Not Applicable (N/A) is validated as such by the assessor; and/or
o Where applicable, compensating controls are validated by the assessor as being:
Applicable;
Reasonable; and
Implemented and operating properly; and
Any assessed control deficiency is not material to the organization’s/LOB’s cybersecurity and data protection program;
and
Assessed controls provide reasonable assurance that the organization’s/LOB’s cybersecurity and data protection
program provides adequate security, where it:
o Adheres to a defined and documented risk tolerance;
o Mitigates material cybersecurity and/or data protection risks;
o Is designed to detect and protect against material cybersecurity and/or data protection threats; and
o Is prepared to respond to material incidents.
Conforms is a statement to the organization’s management that sufficient evidence of due care and due diligence exists to assure
that the organization’s stated risk tolerance can be achieved.
Page 36
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
• Reasonable; and
• Implemented and operating properly;
Any assessed control deficiency is not material to the organization's cybersecurity and data protection program;
Assessed controls do not provide reasonable assurance that the organization’s cybersecurity and data protection
program provides adequate security, where it:
o Adheres to a defined and documented risk tolerance;
o Mitigates material cybersecurity and/or data protection risks;
o Is designed to detect and protect against material cybersecurity and/or data protection threats; and
o Is prepared to respond to material incidents; and
The organization’s cybersecurity and data protection program:
o Has systemic problems inherent in the overall function of a team, department, project, application, service
and/or vendor rather than a specific, isolated factor; and
o Requires implementing limited changes to personnel, technology and/or practices to correct the design and
implementation of deficient cybersecurity and/or data protection controls.
Significant Deficiency is a statement to the organization’s management that insufficient evidence of due care and due diligence
exists to assure that the organization’s stated risk tolerance is achieved, due to a systemic problem in the cybersecurity and/or
privacy program.
In the context of a significant deficiency, a systemic problem is a consequence of issues inherent in the overall function (e.g.,
team, department, project, application, service, vendor, etc.), rather than a specific, isolated factor. Systemic errors may require
changing the structure, personnel, technology and/or practices to remediate the significant deficiency.
Material Weakness is a statement to the organization’s management that (1) the cybersecurity and/or privacy program is
incapable of successfully performing its stated mission and (2) drastic changes to people, processes and/or technology are
necessary to remediate the findings.
Page 37
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
from recklessly accepting risks that should be reserved for more senior management. A common tiered structure for risk
management decisions includes:
Line Management;
Senior Management;
Executive Management; and
Board of Directors.
The organization’s RMP defines the specific risk authority that roles have to make risk management decisions.
17. CYBERSECURITY & DATA PROTECTION PRACTITIONERS IMPLEMENT & DOCUMENT RISK TREATMENT
When managing risk, it should be kept as simple as possible. Realistically, risk treatment is either “open” or “closed” but it can
sometimes be useful to provide more granularity into open items to assist in reporting on risk management activities:
Open (unacceptable risk);
Open (acceptable risk); and
Closed.
Page 38
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
APPENDIX A: CALCULATING INHERENT RISK VS RESIDUAL RISK
It is possible to use a straightforward method to calculate risk using C|P-RMM. Both Inherent Risk & Residual Risk map into the
C|P-RMM Risk Matrix (graphic shown below):
For Inherent Risk, find the cell where Occurrence Likelihood (OL) intersects Impact Effect (IE) to determine the risk level.
For Residual Risk, utilize the calculated Residual Risk values to determine the corresponding risk level.
https://securecontrolsframework.com/content/SCF-Risk-Management-Model-Calculations.pdf
Page 39
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
STEP 1: CALCULATE THE INHERENT RISK
To determine the inherent risk, calculate the Occurrent Likelihood (OL) by the Impact Effect (IE).
Leveraging the by ComplianceForge’s Risk Management Program (RMP) structure, it is straightforward to translate the calculated
value of the residual risk score into a user-friendly risk category:
Page 40
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
APPENDIX B: REPORTING RISK FINDINGS: APPLYING THE CONCEPTS OF ASSURANCE,
CONFORMITY & MATERIALITY
The concepts of assurance, conformity and materiality are integral into meaningful risk management decisions.
NIST defines assurance as, “the grounds for confidence that the set of intended cybersecurity and data privacy controls in a
system, application or service are effective in their application.” 13 Since assurance is relative to a specific set of controls, defects
in those controls affect the underlying confidence in the ability of those controls to operate as intended to produce the stated
results.
Risk assessment levels are based on assessment rigor (assurance level). There are three (3) levels of rigor that an organization
can select for risk assessments, based on assessment methods described in NIST SP 800-172A Appendix C.14 There are three (3)
levels of rigor:
1. Standard;
2. Enhanced; and
3. Comprehensive
Risk assessment rigor pertains to how risk is assessed. The three (3) assessment methods are:
1. Examining,
2. Interviewing; and
3. Testing
The definition of each assessment method includes types of objects to which the method can be applied. In addition, the
application of each method is described in terms of the attributes of depth and coverage.
The depth attribute addresses the rigor and level of detail of the assessment.
The coverage attribute addresses the scope or breadth of the assessment.
Standard rigor represents sufficient due care in the evaluation of cybersecurity and/or data protection controls. Standard rigor is
appropriate for the Manual Point In Time (MPIT) assessment methodology that:
1. Is relevant to a specific point in time (time at which the controls were evaluated); and
2. Relies on the manual review of artifacts to derive a finding.
STANDARD
EXAMINE INTERVIEW TEST
Assessment Rigor
The process of checking, The process of conducting The process of exercising
inspecting, reviewing, discussions with individuals one or more assessment
observing, studying or or groups in an organization objects under specified
Assessment
analyzing one or more to facilitate understanding, conditions to compare
Method
assessment objects to achieve clarification or lead actual with expected
facilitate understanding, to the location of evidence. behavior.
achieve clarification or
13
NIST Glossary - https://csrc.nist.gov/glossary/term/assurance
14
NIST SP 800-172A - https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-172A.pdf
Page 41
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
obtain evidence.
Results from examination, interviews and testing are used to support the determination of:
Security safeguard existence;
Functionality;
Correctness;
Completeness; and
Potential for improvement over time.
Assessment
Results
Standard rigor assessments provide a level of understanding of the administrative,
technical and physical cybersecurity and/or data protection measures necessary for
determining whether the applicable controls are:
1. Implemented; and
2. Free of obvious errors.
Review:
Policies;
Plans;
Specifications Procedures; N/A N/A
System requirements;
and
Designs.
Assessment Review configurations Test functionality in:
Objects and/or functionality Hardware;
implemented in: Software (e.g., services
Mechanisms Hardware; N/A and applications); and
Software (e.g., services Firmware.
and applications); and
Firmware.
Review procedures Test applicable procedures
Activities N/A
associated with: for:
Page 42
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Designs; System operations;
System operations; Administrative activities;
Administration; Management functions;
Management; and/or and
Exercises. Exercises (e.g., incident
response, business
continuity, security
awareness, etc.).
Page 43
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
LEVEL 2 RIGOR: ENHANCED
Enhanced rigor assessments provide a level of understanding of the administrative, technical and physical cybersecurity and/or
data protection measures necessary for determining whether:
1. The applicable controls are:
a. Implemented; and
b. Free of obvious/apparent errors; and
2. There are increased grounds for confidence that the applicable controls are:
a. Implemented correctly; and
b. Operating as intended.
Enhanced rigor is appropriate for the Automated Point In Time (APIT) assessment methodology that utilizes automation to
augment a traditional assessment methodology, where AAT is used to compare the desired state of conformity versus the current
state via machine-readable configurations and/or assessment evidence:
1. Is relevant to a specific point in time (time at which the controls were evaluated);
2. In situations where technology cannot evaluate evidence, evidence is manually reviewed; and
3. The combined output of automated and manual reviews of artifacts is used to derive a finding.
ENHANCED
EXAMINE INTERVIEW TEST
Assessment Rigor
The process of checking, The process of conducting The process of exercising
inspecting, reviewing, discussions with individuals one or more assessment
observing, studying or or groups in an organization objects under specified
analyzing one or more to facilitate understanding, conditions to compare
Assessment
assessment objects to achieve clarification or lead actual with expected
Method
facilitate understanding, to the location of evidence. behavior.
achieve clarification or
obtain evidence.
Results from examination, interviews and testing are used to support the determination
of:
Security safeguard existence;
Functionality;
Correctness;
Completeness; and
Potential for improvement over time.
Page 44
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
evidence or A set of generalized, conducted using:
documentation. high-level questions; A functional specification
and and limited system
Examples include: More in-depth questions architectural information
Functional-level in specific areas where (e.g., high-level design)
descriptions and where responses indicate a for mechanisms and a
appropriate and need for more in-depth high-level process
available, high-level investigation. description; and
design information for A high-level description
mechanisms; of integration into the
High-level process operational environment
descriptions and for activities.
implementation
procedures for activities;
and
Documents and related
documents for
specifications.
Review:
Policies;
Plans;
Procedures;
Specifications N/A N/A
System requirements;
and
Designs.
Page 45
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
Responsible - People
directly responsible for
performing a task (e.g.,
control/process
operator);
Accountable - Person
overall responsible for
the task being
performed and has the
authority to delegate
the task to others (e.g.,
control/process
owner);
Supportive - People
under the coordination
of the Responsible
person for support in
performing the task;
Consulted - People not
directly involved in task
execution but were
consulted for subject
matter expertise; and
Informed - People not
involved in task
execution but are
informed when the task
is completed.
Page 46
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
LEVEL 3 RIGOR: COMPREHENSIVE
Comprehensive rigor assessments provide a level of understanding of the administrative, technical and physical cybersecurity
and/or data protection measures necessary for determining:
1. Whether the applicable controls are:
a. Implemented; and
b. Free of obvious/apparent errors;
2. Whether there are further increased grounds for confidence that the applicable controls are:
a. Implemented correctly; and
b. Operating as intended on an ongoing and consistent basis; and
3. There is support for continuous improvement in the effectiveness of the applicable controls.
Comprehensive rigor is appropriate for the Automated Evidence with Human Review (AEHR) assessment methodology that is
used for ongoing, continuous control assessments:
1. AAT continuously evaluates controls by comparing the desired state of conformity versus the current state through
machine-readable configurations and/or assessment evidence; and
2. Recurring human reviews:
a. Evaluate the legitimacy of the results from automated control assessments; and
b. Validate the automated evidence review process to derive a finding.
COMPREHENSIVE
EXAMINE INTERVIEW TEST
Assessment Rigor
The process of checking, The process of conducting The process of exercising
inspecting, reviewing, discussions with one or more assessment
observing, studying or individuals or groups in an objects under specified
analyzing one or more organization to facilitate conditions to compare
Assessment
assessment objects to understanding, achieve actual with expected
Method
facilitate understanding, clarification or lead to the behavior.
achieve clarification or location of evidence.
obtain evidence.
Results from examination, interviews and testing are used to support the determination
of:
Security safeguard existence;
Functionality;
Correctness;
Completeness; and
Potential for improvement over time.
Page 47
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
An examination that An interview that consists Test methodology that
consists of high-level of broad-based, high-level assumes explicit and
reviews, checks, discussions and more in- substantial knowledge of
observations or inspections depth, probing discussions the internal structure and
and more in-depth, detailed in specific areas with implementation detail of
and thorough studies and individuals or groups of the assessment object. This
analyses of the assessment individuals. methodology is also
object. referred to as “white box”
This type of interview is testing.
This type of examination is conducted using:
conducted using an A set of generalized, high- This type of testing is
extensive body of evidence level questions; and conducted using:
or documentation More in-depth, probing A functional
including: questions in specific specification;
Functional-level areas where responses Extensive system
descriptions and where indicate a need for more architectural information
Assessment appropriate and in-depth investigation. (e.g., high-level design,
Depth available: low-level design);
o High- level design Implementation
information; representation (e.g.,
o Low-level design source code,
information; and schematics) for
o Implementation mechanisms;
information for A high-level process
mechanisms; description; and
High-level process A detailed description of
descriptions and integration into the
detailed implementation operational environment
Attributes procedures for activities; for activities.
and
Documents and related
documents for
specifications.
Page 48
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
o Implemented o Operating as intended o Operating as intended
correctly; and on an ongoing and on an ongoing and
o Operating as intended consistent basis; and consistent basis; and
on an ongoing and There is support for There is support for
consistent basis; and continuous improvement continuous improvement
There is support for in the effectiveness of in the effectiveness of
continuous improvement the applicable controls. the applicable controls.
in the effectiveness of
the applicable controls.
Review:
Policies;
Plans;
Procedures;
Specifications N/A N/A
System requirements;
and
Designs.
Page 49
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
the task to others (e.g.,
control/process
owner);
Supportive - People
under the coordination
of the Responsible
person for support in
performing the task;
Consulted - People not
directly involved in task
execution but were
consulted for subject
matter expertise; and
Informed - People not
involved in task
execution but are
informed when the task
is completed.
Page 50
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
APPENDIX C: NIST SP 800-171 & CMMC RISK MANAGEMENT CONSIDERATIONS
An immediate need for many organizations is compliance with NIST SP 800-171 R2 and the Cybersecurity Maturity Model
Certification (CMMC) 2.0. The Cybersecurity & Data Privacy Risk Management Model (C|P-RMM) is a tool that can be used to
address the following requirements:
Page 51
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
APPENDIX D: DOCUMENTATION TO SUPPORT RISK MANAGEMENT PRACTICES
In the context of good cybersecurity documentation, components are hierarchical and build on each other to build a strong
governance structure that utilizes an integrated approach to managing requirements. Well-designed documentation is generally
comprised of six (6) main parts:
Documentation works best when it is simple and concise. Conversely, documentation fails when it is overly wordy, complex or
difficult for users to find the information they are seeking. When you picture this from a hierarchical perspective, everything builds
off of the policy and all of the components of cybersecurity documentation build off each other to make a cohesive approach to
addressing a requirement:
Page 52
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.
When that is all laid out properly, your company’s cybersecurity and data privacy documentation should flow like the diagram
below depicts, where your organization’s cybersecurity and data privacy policies are linked all the way down to metrics:
https://complianceforge.com/content/pdf/complianceforge-hierarchical-cybersecurity-governance-framework.pdf
NIST SP 800-171 & CMMC. Protecting Controlled Unclassified Information (CUI) in Nonfederal Information Systems and
Organizations – Multiple sections of NIST SP 800-171 & CMMC requires risk to be periodically.
Federal Trade Commission (FTC) Act. 15 U.S. Code § 45 deems unfair or deceptive acts or practices in or affecting
commerce to be unlawful - poor security practices are covered under this requirement and not managing cybersecurity
risk is an indication of poor security practices.
Payment Card Industry Data Security Standard (PCI DSS). Section 12.2 requires companies to perform a formal risk
assessment.
Health Insurance Portability and Accountability Act (HIPAA). Security Rule (Section 45 C.F.R. §§ 164.302 – 318) requires
companies to conduct an accurate & thorough assessment of potential risks.
Gramm-Leach-Bliley Act (GLBA). Safeguard Rule requires companies to identify and assess risks to customer
information.
Massachusetts MA 201 CMR 17.00. Section 17.03(2)(b) requires companies to "identify & assess" reasonably-
foreseeable internal and external risks.
Oregon Identity Theft Protection Act. Section 646A.622(2)(d)(B)(ii) requires companies to assess risks in information
processing, transmission & storage.
Vendor Contracts. It is increasingly common for vendors, partners and subcontractors to be contractually-bound to
perform recurring risk assessments. Not having a risk management program could lead to breach of contract or losing a
bid.
Page 53
Copyright © 2024 by Compliance Forge, LLC (ComplianceForge). All rights reserved.