Risk mitigation strategies are identified and implemented
Identifying risks through the risk assessment process (CC3) is only half the work. This criterion requires that risks are actively addressed: mitigation controls are selected and implemented, residual risk is accepted at an appropriate level, and the overall risk posture is actively managed rather than passively observed.
Implementation steps
- 1
Develop a risk treatment plan for identified risks
For each risk identified in your risk assessment, document a treatment decision: mitigate (implement controls), transfer (insurance or contract), accept (documented acceptance with rationale), or avoid (change the activity creating the risk). For risks being mitigated, identify the specific controls that address them and assign owners and timelines.
notion confluence google-sheets jira - 2
Implement and track mitigation controls
Implement the controls identified in the risk treatment plan. Track implementation progress in your risk register or project tracking tool. When controls are implemented, update the residual risk rating to reflect the reduced exposure. Controls with no owner or no timeline are unlikely to be implemented.
jira linear notion vanta drata - 3
Review risk treatment decisions periodically
Risk treatment decisions made 12 months ago may no longer be appropriate. Review your risk register and treatment decisions at least annually. Risks that were accepted may need to be re-evaluated if the threat landscape has changed or the organization's risk tolerance has shifted.
notion confluence google-sheets
Evidence required
Risk treatment plan
Documentation showing how identified risks are being addressed.
- - Risk register with treatment decisions and status
- - Risk treatment plan with owner and timeline columns
- - Risk acceptance records with documented rationale
Evidence of mitigation control implementation
Evidence that risk mitigation controls are in place.
- - Control implementation tickets with completion dates
- - Compliance platform showing control status
- - Risk register showing reduced residual risk after control implementation
Related controls
Third-party vendor risk is assessed and managed
Risk Mitigation
Control activities are selected and developed to mitigate risks
Control Activities
Commitment to integrity and ethical values is demonstrated
Control Environment
Board or equivalent body oversees security risk
Control Environment