Zum Hauptinhalt springen
Starter Kit · Register

Risk Register

Updated on 2 min Reviewed by: Cenedril-Redaktion
Clause 6.1Clause 8.2 ISO 27001ISO 27005BSI IT-Grundschutz

The risk register is the central document of your risk management process. It consolidates everything from risk identification, analysis, and evaluation — every information security risk with its description, assessment, owner, and current treatment status.

ISO 27001 requires a documented risk assessment process (Clause 6.1) and its regular execution (Clause 8.2). ISO 27005 provides the methodological framework. The risk register is where these requirements materialise into a concrete, auditable document.

What does it contain?

The CSV template covers the full risk assessment cycle. Key columns:

  • Risk ID and title — unique identifier and a clear description of the scenario
  • Risk source, threat, vulnerability — the three components that give rise to the risk
  • Affected assets — link to the asset register
  • Likelihood and impact — each on a defined scale
  • Risk level — calculated from likelihood and impact
  • Risk owner — the person who decides on treatment
  • Treatment decision and status — what is being done, and how far along is implementation?

How to use it

Build it during risk analysis. The register is populated during risk identification and analysis. For each asset in the asset register, you examine which threats and vulnerabilities are relevant. Each plausible combination yields a risk scenario — one entry in the register. This process works best as a workshop with IT, business departments, and senior management.

Assessment and prioritisation. Each risk is assessed by likelihood and impact. The resulting risk level determines priority. Risks above the defined acceptance threshold must be treated — the treatment decision is documented directly in the register.

A living document. The risk register is an ongoing effort. After the initial build, it is updated whenever material changes occur: new systems, organisational restructuring, evolving threat landscapes, security incidents. The annual ISMS review checks completeness.

Register Template

Risk Register

IDRisk TitleDescriptionAsset / ProcessThreatVulnerabilityOwnerLikelihood (1-5)Impact FinancialImpact OperationalImpact ReputationalImpact Legal/RegulatoryImpact Health/SafetyMax ImpactInherent ScoreInherent Risk LevelExisting ControlsResidual LikelihoodResidual Max ImpactResidual ScoreResidual Risk LevelTreatment DecisionStatus
R-001Ransomware on file serversAttackers encrypt central file share and backup shares via compromised admin accountFile server FS-01 + central SMB shareRansomwareFlat admin network, shared backup credentialsIT Operations Lead455541520CriticalEDR, MFA on admin accounts, offline backups, partial network segmentation248MediumMitigateOpen
R-002Phishing leading to credential compromiseEmployee enters credentials on cloned M365 login pageAll user accountsPhishingUser awareness gap, no phishing-resistant MFAISO443431416CriticalMail filter, awareness training, phishing simulations, MFA (TOTP)339MediumMitigateOpen
R-003Insider data exfiltration via personal emailLeaving employee sends customer list to private GmailCustomer databaseMalicious insiderWeak DLP on outbound email, broad CRM accessHR Lead23244148MediumNDA, role-based access, leaver process236MediumMitigateOpen
R-004Supplier outage affecting logistics portalCritical SaaS provider suffers 8h outage during peak periodLogistics portal (SaaS)Supplier outageSingle provider, no fallback processIT Operations Lead344321412HighSLA, incident monitoring, manual fallback checklist339MediumAccept with monitoringOpen
R-005GDPR breach via misconfigured S3 bucketPublic bucket exposes 2000 customer recordsMarketing bucket s3://nwl-marketingMisconfigurationNo IaC review, no scheduled bucket auditDPO332551515HighQuarterly config audit, bucket policy template248MediumMitigateIn treatment
R-006Loss of historical marketing assets due to local hardware failureOld campaign creatives stored on a single workstation are lost when its disk failsMarketing workstation MW-07Hardware failureNo automated backup of local creative folderMarketing Lead22121124LowFiles older than 12 months are not business-critical and can be re-created or are available from agency partners224LowAcceptAccepted
R-007Storage of cardholder data in own ERPStoring full PAN in the ERP would bring the company into PCI DSS scope and create high regulatory and reputational exposureERP (AST-007)Unauthorised disclosure of cardholder dataNo tokenisation; no PCI-compliant segmentationCFO352551515HighN/A — risk eliminated by design111LowAvoidAvoided — payments outsourced to PCI-DSS Level 1 provider (Stripe), no PAN ever touches own systems

Sources

ISO 27001 Controls Covered

Clause 6.1 Actions to address risks and opportunities Clause 8.2 Information security risk assessment

Frequently asked questions

What is the difference between a risk register and a risk treatment plan?

The risk register documents all identified risks with their assessment (likelihood × impact). The risk treatment plan describes what you do about each risk — avoid, mitigate, transfer, or accept. Both documents belong together but serve different purposes.

How many risks should the register contain?

That depends on the size and complexity of your organisation. A typical risk register contains between 30 and 150 entries. Quality matters more than quantity: each risk must be specific enough to allow a meaningful assessment and treatment decision.

Who maintains the risk register?

The information security officer coordinates maintenance, but substantive responsibility lies with the risk owners — the people who decide on the treatment of each risk. Auditors verify that risk owners actually know and have approved their entries.