Risk Assessment Framework

Last Updated: 2026-02-12 Standard: ISO 27001:2022 -- Clause 6.1 / Clause 8.2 Review Cycle: Annually and after significant changes


1. Purpose#

This framework defines the methodology used by cloak.business to identify, assess, evaluate, and treat information security risks. It ensures that risks to the confidentiality, integrity, and availability of information assets are systematically managed and reduced to acceptable levels.


2. Scope#

This framework applies to all information assets within the cloak.business ISMS, including:

  • Platform services and application components
  • Infrastructure and hosting environments
  • Customer data processed by the platform
  • User accounts and authentication systems
  • Third-party services and sub-processors
  • Personnel and organizational processes

3. Methodology#

Risk Formula#

Risk is assessed using the standard formula:

Risk = Likelihood x Impact

Each factor is scored on a 1--5 scale, producing a risk score from 1 (lowest) to 25 (highest).

Likelihood Scale#

ScoreLevelDescription
1Very LowUnlikely to occur; no history of occurrence
2LowCould occur but not expected; rare historical occurrence
3MediumPossible; has occurred in similar organizations
4HighLikely to occur; has occurred before in this context
5Very HighExpected to occur; frequent or ongoing threat

Impact Scale#

ScoreLevelDescription
1NegligibleNo measurable impact on operations, data, or reputation
2MinorMinimal impact; quickly recoverable with no data exposure
3ModerateNoticeable impact on service or limited data exposure; requires active response
4SignificantMajor impact on service availability or customer data; regulatory implications
5SevereCritical breach of customer data, extended outage, or major regulatory consequences

Risk Levels#

Risk ScoreLevelRequired Action
1--4LowAccept and monitor; no immediate action required
5--9MediumImplement controls within defined timeline; monitor regularly
10--15HighImplement controls as a priority; management attention required
16--25CriticalImmediate action required; escalate to management; controls must be implemented before proceeding

4. Risk Categories#

Technical Risks#

Risks arising from the technology stack, software vulnerabilities, and system architecture:

  • Application vulnerabilities (injection, authentication flaws, misconfiguration)
  • Dependency vulnerabilities in third-party libraries
  • Cryptographic weaknesses or key management failures
  • System misconfiguration or hardening gaps
  • Data processing errors or corruption

Operational Risks#

Risks arising from day-to-day operations and processes:

  • Service outages or degraded performance
  • Backup failures or data loss
  • Monitoring gaps or delayed incident detection
  • Patch management delays
  • Human error in configuration or deployment

Compliance Risks#

Risks related to regulatory and contractual obligations:

  • GDPR non-compliance (data processing, retention, subject rights)
  • ISO 27001 control deficiencies
  • Contractual SLA breaches
  • Inadequate breach notification procedures
  • Documentation gaps

Third-Party Risks#

Risks introduced through external service providers and dependencies:

  • Sub-processor data handling practices
  • Vendor service outages affecting platform availability
  • Supply chain compromise
  • Changes in third-party terms or capabilities

Personnel Risks#

Risks related to human factors:

  • Insufficient security awareness
  • Unauthorized access by personnel
  • Knowledge concentration (key person dependency)
  • Social engineering attacks

5. Risk Treatment Options#

When a risk exceeds the acceptable threshold, one of the following treatment strategies is applied:

OptionDescriptionWhen Used
MitigateImplement controls to reduce likelihood or impactMost common; risk can be reduced to acceptable level with reasonable effort
AcceptAcknowledge the risk without further actionRisk is within acceptable threshold or cost of mitigation exceeds potential impact
TransferShift risk to a third party (e.g., insurance, outsourcing)Risk can be effectively managed by a specialized third party
AvoidEliminate the activity or condition that creates the riskRisk is unacceptable and cannot be adequately mitigated

All treatment decisions are documented with justification and approved by management.


6. Key Risk Areas#

The following areas receive particular attention in our risk assessment process:

Data Protection#

  • Confidentiality of customer data during processing
  • Integrity of anonymization and detection results
  • Prevention of unauthorized data access or exposure
  • Compliance with data minimization and retention requirements

Availability#

  • Platform service uptime and performance
  • Resilience against denial-of-service conditions
  • Backup and recovery capabilities
  • Infrastructure redundancy

Access Control#

  • Authentication strength and multi-factor adoption
  • Role-based access enforcement
  • Privileged access management
  • Session security

Third-Party Services#

  • Sub-processor security posture
  • Dependency on external service availability
  • Data handling practices of third parties
  • Contract and SLA compliance

Cryptographic Controls#

  • Encryption strength for data at rest and in transit
  • Key management and rotation practices
  • Certificate management and renewal
  • Cryptographic algorithm currency

7. Risk Assessment Process#

Step 1: Asset Identification#

Identify and categorize all information assets within scope, including systems, data, services, and personnel.

Step 2: Threat Identification#

For each asset, identify potential threats from internal and external sources.

Step 3: Vulnerability Assessment#

Identify vulnerabilities that could be exploited by identified threats.

Step 4: Risk Evaluation#

Calculate risk scores (Likelihood x Impact) for each threat-vulnerability pair and map to risk levels.

Step 5: Risk Treatment#

Select and document treatment strategies for all risks above the acceptable threshold.

Step 6: Residual Risk Assessment#

Evaluate the remaining risk after treatment controls are applied. Ensure residual risk is within acceptable limits.

Step 7: Documentation and Reporting#

Record all findings, treatment decisions, and residual risk levels in the risk register. Report to management.


8. Review and Monitoring#

Risk assessments are conducted:

  • Annually as a scheduled review of the complete risk register
  • After significant changes to the platform, infrastructure, or business operations
  • After security incidents to reassess affected risk areas
  • When new threats emerge that may affect the risk landscape

The risk register is a living document, updated continuously as new information becomes available.


Revision History#

VersionDateChanges
1.02026-02-09Initial framework publication

Document maintained by cloak.business Contact: support@cloak.business