SOC2-CC3-RISK-ASSESSMENT

Annual Risk Assessment Process

detectivehigh effectivenessAnnually

What this control does

Formal methodology for identifying, analyzing, and evaluating risks to the confidentiality, integrity, and availability of systems and data.

Implementation guidance

Conduct a structured risk assessment at least annually using a consistent methodology (likelihood × impact scoring). Document assumptions, threat sources, and vulnerability analysis. Present results to leadership and use findings to prioritize the security roadmap.

Requirements satisfied

CC3.1CC3.2

Why it matters

Without a formal, documented risk assessment process, organizations operate blindfolded—unable to distinguish critical threats from noise or allocate limited security budgets effectively. Weak or ad-hoc risk assessments lead to missed high-impact vulnerabilities, compliance gaps, and misaligned security investments that fail to address the organization's actual threat landscape.

Evidence to collect

  • Current-year risk assessment report with likelihood × impact scoring matrix, dated within 12 months
  • Documented risk assessment methodology document (e.g. NIST, ISO 31000, or custom framework) with defined scoring scales and decision criteria
  • Evidence of leadership review and sign-off (e.g. meeting minutes, email approval, or board presentation showing C-level acknowledgment of findings)
  • Risk register or remediation roadmap showing how assessment findings were translated into prioritized security initiatives or projects

Testing procedure

Request the most recent risk assessment report and validate that: (1) it covers the full scope of systems, data, and threat sources relevant to the organization; (2) likelihood and impact scores are consistently applied using a documented scale (e.g., 1–5); (3) assumptions about threat sources, asset criticality, and existing controls are explicitly stated; and (4) findings were presented to senior leadership with documented acknowledgment. Interview the risk owner to confirm the assessment informed the current security roadmap and budget allocation.

Common gotchas

Organizations often score risks inconsistently across domains—a "high" impact in one department differs from another—undermining the entire ranking. Additionally, assessments frequently list vulnerabilities without tying them to business context (which assets matter most?), resulting in organizations patching low-risk systems while critical ones remain exposed.