cc3-2 Critical priority Security / Risk Assessment

Security risks are identified and analyzed

A formal risk assessment process identifies what can go wrong, how likely it is, and how severe the impact would be. This is the core of any security program. Without it, security investment is driven by gut feel and visible incidents rather than actual exposure. SOC 2 auditors want to see a documented risk register maintained over time, not just a one-time spreadsheet.

Complete first: cc3-1

Implementation steps

  1. 1

    Conduct an annual risk assessment

    At least once per year, run a structured risk assessment. Gather input from engineering, ops, and business teams on what threats they perceive. Enumerate threat categories: unauthorized access, data loss, service disruption, insider threat, supply chain attack. For each, estimate likelihood and impact. Document results in a risk register.

    confluence notion google-sheets vanta drata
  2. 2

    Maintain a live risk register

    Create a risk register that is updated throughout the year as new risks emerge or existing ones change. Each entry should include: risk description, likelihood rating (1-5), impact rating (1-5), inherent risk score, current controls, residual risk score, risk owner, and target remediation date for unacceptable risks.

    google-sheets notion confluence jira
  3. 3

    Treat identified risks with controls

    For each risk rated above your acceptable threshold, define a treatment: accept, mitigate, transfer, or avoid. Mitigated risks should have specific controls assigned. Track control implementation status. This connects your risk assessment directly to your security roadmap.

    jira linear notion google-sheets

Evidence required

Risk register

A documented and dated risk register covering the in-scope systems.

  • - Risk register spreadsheet with likelihood, impact, and owner columns
  • - Vanta or Drata risk assessment output
  • - Annual risk assessment report with identified risks and ratings

Risk treatment decisions

Evidence that identified risks have been formally accepted, mitigated, or transferred.

  • - Risk register with treatment column and status
  • - Management sign-off on accepted risks
  • - Security roadmap items mapped to risk register entries

Related controls