AuditRubric
id-ra-5 high Identify / Risk Assessment

Risk information is used to understand inherent risk and prioritize responses

Risk data is only valuable if it drives decisions. Organizations that maintain a risk register but never use it to set security priorities are spending effort on documentation without getting the benefit of structured decision-making. This control closes the loop: the risk register feeds directly into what the security team works on next and how resources are allocated.

Estimated effort: 4h
risk-assessmentprioritizationrisk-registerdecision-making
Complete first: id-ra-4

Implementation steps

  1. 1

    Sort and prioritize the risk register by inherent risk score

    At least monthly, review the risk register sorted by inherent risk (the combined likelihood-impact score before controls). The highest-scoring risks are candidates for immediate attention. Confirm that your current work queue is aligned with the top risks, not with whatever is loudest or most recent.

    jiraarcherservicenowgoogle-sheets
  2. 2

    Use risk scores to drive the security roadmap and backlog prioritization

    When planning the next quarter's security work, anchor the roadmap to the top risks in the register. For each major initiative, document which risks it is designed to reduce. This makes the connection between security investment and risk reduction explicit and auditable.

    jiralinearnotionconfluence
  3. 3

    Present risk-based prioritization to leadership

    In security reporting to leadership, show the top risks, current status, and what is being done about them. When proposing new security investments, frame them in terms of which specific risks they address and by how much. This grounds budget conversations in evidence rather than fear.

    google-slidesnotionconfluence

Evidence required

Risk register used for prioritization

Evidence that the risk register is actively used to set priorities, not just maintained as a compliance artifact.

  • · Security roadmap with work items linked to specific risk register entries
  • · Sprint planning records referencing risk priorities
  • · Leadership report showing top risks and current remediation progress

Risk-based resource allocation decisions

Records showing that security resource decisions were informed by risk scores.

  • · Budget request citing specific risks being addressed
  • · Headcount or tool purchase decision referencing top risks
  • · Security program review showing alignment between priorities and risk register

Related controls