You can’t protect what you don’t know you have, and you can’t prioritize what you haven’t measured. A risk assessment is the process of figuring out what you’ve got, what could go wrong, and how bad it would be if it did. Every mature security program starts here — not with buying tools, not with writing policies, not with hiring a SOC team. Here. Because without a risk assessment, every security decision you make is a guess dressed up as strategy.

DO / DON’T

DO:

DON’T:

Step 1: Asset Inventory

You cannot assess risk to things you don’t know about. Start here.

What to Inventory

How to Do It

Use a spreadsheet or a dedicated asset management tool. For each asset, record: asset name, owner, location, data classification, criticality (how important it is to business operations), and dependencies (what else breaks if this breaks).

If you’re starting from nothing, the NIST Cybersecurity Framework Identify function walks through this systematically. The CIS Critical Security Controls put asset inventory as Control #1 for a reason — everything else depends on it.

Step 2: Threat Identification

Once you know what you have, ask what could threaten it.

Common Threat Categories

Map threats to assets. Not every threat applies to every asset. Ransomware is a threat to your file server; a flood is a threat to your physical data center; a phishing campaign is a threat to your people.

Step 3: Vulnerability Identification

Where are the gaps between your threats and your defenses?

Step 4: Risk Scoring

For each threat-vulnerability pair, score the risk.

Likelihood + Impact

Likelihood: How probable is it that this threat will exploit this vulnerability? Consider threat actor motivation, vulnerability exposure, and existing controls.

Impact: If it happens, how bad is it? Consider financial loss, operational disruption, reputational damage, regulatory penalties, and legal liability.

A simple 5x5 matrix works:

Impact: 1 (Minimal) 2 (Low) 3 (Moderate) 4 (High) 5 (Critical)
Likelihood: 5 (Near Certain) 5 10 15 20 25
4 (Likely) 4 8 12 16 20
3 (Possible) 3 6 9 12 15
2 (Unlikely) 2 4 6 8 10
1 (Rare) 1 2 3 4 5

Scores above 15: address immediately. Scores 8-15: plan remediation. Scores below 8: monitor and review.

For organizations ready to go deeper, quantitative methods like FAIR (Factor Analysis of Information Risk) translate risk scores into dollar values using probability distributions. When you need to justify a security budget, speaking in dollars beats speaking in colors.

Step 5: Risk Register

The risk register is where everything comes together. For each identified risk, document:

Field What Goes Here
Risk ID Unique identifier
Description What could happen, in plain language
Asset(s) affected What’s at risk
Threat source Who or what causes it
Vulnerability What weakness is exploited
Likelihood Scored 1-5
Impact Scored 1-5
Risk score Likelihood x Impact
Risk owner Name of the person accountable
Treatment Accept, mitigate, transfer, or avoid
Treatment details Specific actions, timelines, and budgets
Status Open, in progress, closed
Review date When this gets re-evaluated

The risk register is a living document. It gets reviewed at every security meeting, updated when conditions change, and reported to leadership regularly. A risk register that nobody reads is a compliance artifact, not a security tool.

Step 6: Risk Treatment

For each risk, you have four options:

If It Already Happened

If you’re reading this after a breach or incident, a risk assessment is still the right next step — but scope it to the incident first. Identify what was compromised, what data was affected, and what controls failed. Then expand outward. The incident just gave you real-world data about your threat landscape. Use it.

Report the incident through appropriate channels. CISA accepts voluntary incident reports. If personal data is involved, check your breach notification obligations under applicable regulations. The FTC and FBI IC3 are the primary federal reporting channels.


The risk assessment is step one. Not the last step — the first one. Pick one framework, start with your most critical assets, and work outward. A completed, imperfect risk assessment that gets reviewed quarterly is worth infinitely more than a perfect one that’s still in planning. Open the spreadsheet. Start counting what matters.