CIS Risk Assessment Method (CIS RAM) v2.1
Comprehensive reference for the CIS RAM methodology based on Duty of Care Risk Analysis (DoCRA).
On This Page
Overview
CIS RAM is a risk assessment method that helps organizations implement the CIS Critical Security Controls (CIS Controls) in a way that is informed by the organization's specific risk environment. It provides a structured approach to evaluating cybersecurity risks and selecting appropriate safeguards based on the principle of Duty of Care Risk Analysis (DoCRA).
DoCRA Foundation
CIS RAM is built on the DoCRA (Duty of Care Risk Analysis) standard, which establishes that organizations have a duty to protect against reasonably foreseeable threats and that safeguards should be proportionate to the risks they address. DoCRA is codified in the CIS Controls and recognized by regulators and courts as a reasonable standard of care.
CIS RAM Versions by Implementation Group
CIS RAM for IG1
Simplified risk assessment for organizations implementing IG1 (Essential Cyber Hygiene). Uses a 3-point impact and likelihood scale. Suitable for small to medium organizations with limited cybersecurity resources.
CIS RAM for IG2
Intermediate risk assessment for organizations implementing IG2 (Risk-Managed Enterprise). Uses a 5-point impact and likelihood scale with more detailed analysis. Suitable for organizations with moderate cybersecurity resources and compliance requirements.
CIS RAM for IG3
Comprehensive risk assessment for organizations implementing IG3 (Comprehensive Security). Uses a 5-point impact and likelihood scale with the most detailed analysis including advanced threat modeling. Suitable for organizations with significant cybersecurity resources managing sensitive data or critical infrastructure.
3 Core Principles
Risk analysis must reasonably consider all interested parties that may be harmed
Risk assessments must not only consider the organization's own interests but also the interests of customers, partners, employees, regulators, and the general public who could be affected by a security incident. This principle ensures that risk analysis is comprehensive and accounts for the full scope of potential harm.
Key Points
- Identify all parties who could be affected by a security failure
- Consider the impact on customers, partners, employees, and the public
- Regulatory and legal obligations to third parties must be factored in
- The organization cannot simply accept risk on behalf of others without their consent
- Business associate agreements and contractual obligations define shared risk responsibilities
Examples
- A healthcare organization must consider patients when assessing risk to electronic health records
- A financial institution must consider account holders when assessing risk to banking systems
- A cloud service provider must consider its customers when assessing risk to its infrastructure
Risks must be reduced to a level that no authority can call negligent
Organizations must reduce risks to a level that a reasonable authority (court, regulator, industry body) would consider adequate. This does not mean eliminating all risk, but rather demonstrating that reasonable and proportionate measures have been taken. The standard is one of reasonableness, not perfection.
Key Points
- The 'reasonable person' standard applies to cybersecurity decisions
- Industry standards and frameworks (like CIS Controls) help define what is reasonable
- Documentation of risk decisions is essential for demonstrating due care
- Risk acceptance must be justified and documented with clear rationale
- Compliance with regulations alone may not be sufficient -- actual risk reduction matters
Examples
- Implementing IG1 safeguards demonstrates basic due care for any organization
- Failing to patch known critical vulnerabilities within a reasonable timeframe could be considered negligent
- Not having basic access controls on sensitive data systems would likely be viewed as unreasonable
Safeguards must not be more burdensome than the risks they protect against
The cost and burden of implementing security safeguards must be proportionate to the risks they address. Over-securing can be just as problematic as under-securing, as excessive safeguards can impede business operations, waste resources, and create their own risks. This principle ensures balanced, practical security.
Key Points
- Safeguard costs include financial, operational, and human factors
- The 'Safeguard Risk' concept captures the burden a safeguard creates
- If a safeguard creates more disruption than the risk it addresses, it may not be appropriate
- This principle prevents 'security theater' -- measures that look good but add burden without proportionate benefit
- Organizations should seek the least burdensome effective safeguard
Examples
- Requiring MFA for all systems is proportionate; requiring hardware tokens for a break room kiosk may not be
- Full disk encryption for laptops handling sensitive data is proportionate to the risk of device theft
- Blocking all USB devices may be disproportionate if the organization does not handle highly classified data
10 Practices
Understand the organization's mission, business objectives, legal and contractual obligations, and risk tolerance before beginning the assessment. This ensures risk analysis is grounded in the enterprise's actual context.
Activities
- 1. Review the organization's mission statement and strategic objectives
- 2. Identify legal, regulatory, and contractual compliance requirements
- 3. Understand existing risk management frameworks and governance structures
- 4. Interview key stakeholders to understand business priorities and risk appetite
- 5. Document the organization's risk tolerance thresholds
Create a comprehensive picture of the organization's current security posture by understanding its assets, threats, vulnerabilities, and existing controls. This model serves as the baseline for risk evaluation.
Activities
- 1. Inventory enterprise assets and data flows
- 2. Identify threat sources relevant to the organization
- 3. Assess current implementation of CIS Controls safeguards
- 4. Map assets to the safeguards that protect them
- 5. Document existing security capabilities and gaps
Define the boundaries and focus areas for the risk assessment. This ensures the assessment is manageable and focused on the most important areas.
Activities
- 1. Determine which CIS Controls Implementation Group (IG) applies
- 2. Identify the systems, processes, and data in scope
- 3. Define organizational units and geographic locations in scope
- 4. Document any exclusions and the rationale for excluding them
- 5. Prioritize assessment areas based on business criticality
Identify realistic threat sources and develop criteria for evaluating the impact of security incidents on the organization's mission, operations, finances, and legal obligations.
Activities
- 1. Identify threat sources (criminal, nation-state, insider, accidental, environmental)
- 2. Develop impact criteria across four dimensions: Mission, Operational, Financial, Obligations
- 3. Calibrate impact scales to the organization's context and IG level
- 4. Define scoring thresholds with specific examples relevant to the organization
- 5. Validate impact criteria with executive leadership
Establish criteria for estimating inherent risk -- the risk that exists before safeguards are applied. This helps prioritize which risks need the most attention.
Activities
- 1. Define likelihood scales based on threat intelligence and incident history
- 2. Use VCDB (VERIS Community Database) Index as a reference for likelihood estimation
- 3. Map inherent risk to scenarios without CIS Controls implementation
- 4. Calculate inherent risk scores using Expectancy x Impact formula
- 5. Document the basis for each inherent risk estimation
Apply the developed criteria to evaluate the inherent risk for each in-scope safeguard area. This provides a prioritized view of where the organization faces the greatest unmitigated risk.
Activities
- 1. Score each safeguard area for likelihood of exploitation if unprotected
- 2. Score each safeguard area for impact across all four impact dimensions
- 3. Calculate inherent risk scores (Expectancy x highest Impact score)
- 4. Classify risks as Acceptable, Unacceptable, or High
- 5. Document justification for each risk rating
Based on the inherent risk evaluation, recommend specific CIS Controls safeguards that would reduce unacceptable risks to acceptable levels.
Activities
- 1. Map unacceptable and high inherent risks to appropriate CIS safeguards
- 2. Prioritize safeguards based on risk reduction potential
- 3. Consider the organization's IG level when selecting safeguards
- 4. Document the expected risk reduction from each recommended safeguard
- 5. Identify safeguard implementation dependencies and sequencing
Assess whether recommended safeguards create their own risks or burdens that could be disproportionate. This implements Principle 3 of CIS RAM.
Activities
- 1. Evaluate the financial cost of implementing each safeguard
- 2. Assess operational impact (productivity, workflow changes, user friction)
- 3. Consider technical complexity and maintenance burden
- 4. Evaluate whether the safeguard could create new vulnerabilities
- 5. Compare safeguard burden against the risk it mitigates
After applying recommended safeguards, evaluate the remaining (residual) risk to ensure it has been reduced to an acceptable level.
Activities
- 1. Recalculate risk scores with recommended safeguards in place
- 2. Verify residual risk falls within acceptable thresholds
- 3. Identify any remaining unacceptable risks requiring additional treatment
- 4. Document risk acceptance decisions for any residual risks above threshold
- 5. Obtain executive sign-off on residual risk acceptance
Develop and execute risk treatment plans for all identified risks, including implementation timelines, responsible parties, and success metrics.
Activities
- 1. Create risk treatment plans for each unacceptable risk
- 2. Assign owners and deadlines for safeguard implementation
- 3. Define success metrics and verification criteria
- 4. Establish monitoring and review cadence for risk treatment progress
- 5. Document formal risk acceptance for any risks that cannot be further reduced
Risk Assessment Process
CIS RAM Risk Assessment Activities: Five key activities that comprise the CIS RAM risk assessment.
Develop Impact Criteria
Create organization-specific criteria for measuring the impact of security incidents across four dimensions.
Mission
Impact on the organization's ability to fulfill its primary mission or purpose. For commercial entities, this is the ability to deliver products/services. For government, this is the ability to serve constituents.
IG1 Scale (1-3)
| Score | Label | Description |
|---|---|---|
| 1 | Low | Minor disruption to mission; easily recoverable within normal operations |
| 2 | Moderate | Noticeable disruption to mission; requires dedicated effort to recover |
| 3 | High | Severe disruption to mission; may threaten organizational viability |
IG2/IG3 Scale (1-5)
| Score | Label | Description |
|---|---|---|
| 1 | Negligible | No meaningful impact on mission delivery |
| 2 | Low | Minor, short-term disruption to some mission functions |
| 3 | Moderate | Significant disruption to mission functions; recovery requires days |
| 4 | High | Major disruption to most mission functions; recovery requires weeks |
| 5 | Critical | Complete loss of mission capability; may threaten organizational survival |
Operational Objectives
Impact on day-to-day business operations, productivity, and service delivery. This includes internal operations, customer-facing services, and supply chain interactions.
IG1 Scale (1-3)
| Score | Label | Description |
|---|---|---|
| 1 | Low | Operations continue with minor inconvenience |
| 2 | Moderate | Operations degraded; workarounds needed for days |
| 3 | High | Operations halted or severely degraded for extended period |
IG2/IG3 Scale (1-5)
| Score | Label | Description |
|---|---|---|
| 1 | Negligible | No impact on operations |
| 2 | Low | Minor operational disruption; resolved within hours |
| 3 | Moderate | Noticeable operational impact; resolved within days |
| 4 | High | Major operational disruption; resolved within weeks |
| 5 | Critical | Complete operational failure; extended recovery timeline |
Financial Objectives
Direct and indirect financial impact including revenue loss, remediation costs, legal fees, regulatory fines, and reputational damage leading to customer loss.
IG1 Scale (1-3)
| Score | Label | Description |
|---|---|---|
| 1 | Low | Financial impact easily absorbed; less than 1% of annual revenue |
| 2 | Moderate | Significant financial impact; 1-5% of annual revenue |
| 3 | High | Severe financial impact; greater than 5% of annual revenue or threatening solvency |
IG2/IG3 Scale (1-5)
| Score | Label | Description |
|---|---|---|
| 1 | Negligible | Minimal financial impact; within normal operating variance |
| 2 | Low | Minor financial impact; less than 1% of annual revenue |
| 3 | Moderate | Material financial impact; 1-3% of annual revenue |
| 4 | High | Major financial impact; 3-10% of annual revenue |
| 5 | Critical | Existential financial impact; greater than 10% of annual revenue |
Obligations
Impact on regulatory compliance, contractual commitments, legal obligations, and duty of care responsibilities. Includes obligations to customers, partners, regulators, and the public.
IG1 Scale (1-3)
| Score | Label | Description |
|---|---|---|
| 1 | Low | Minor compliance gap; self-reported with minimal consequence |
| 2 | Moderate | Regulatory notice or contractual breach; fines or penalties likely |
| 3 | High | Major regulatory action, litigation, or loss of operating authority |
IG2/IG3 Scale (1-5)
| Score | Label | Description |
|---|---|---|
| 1 | Negligible | No compliance impact |
| 2 | Low | Minor compliance gap; correctable through self-reporting |
| 3 | Moderate | Regulatory inquiry or audit finding; fines possible |
| 4 | High | Formal regulatory action; significant fines or sanctions |
| 5 | Critical | Loss of license, criminal liability, or class-action litigation |
Estimate Inherent Risk Criteria
Determine the likelihood and impact of threats when no CIS Controls safeguards are in place.
CIS RAM uses the VERIS Community Database (VCDB) Index as a reference point for estimating the likelihood that a threat will exploit an unprotected system. The VCDB contains thousands of real-world security incidents, providing an empirical basis for likelihood estimation.
Expectancy Calculation
Expectancy represents the likelihood that a threat event will occur. It is derived from two factors: the VCDB Index (frequency of similar incidents in the real world) and the Maturity Score (the organization's current implementation maturity for the relevant safeguard).
Expectancy = VCDB_Index_Score adjusted by Maturity_Score
IG1 VCDB Index Scores
| Score | Label | Description |
|---|---|---|
| 1 | Low | Incident type rarely seen in VCDB for similar organizations |
| 2 | Moderate | Incident type occasionally seen in VCDB for similar organizations |
| 3 | High | Incident type frequently seen in VCDB for similar organizations |
IG2/IG3 VCDB Index Scores
| Score | Label | Description |
|---|---|---|
| 1 | Very Low | Less than 1% of VCDB incidents for similar organizations |
| 2 | Low | 1-10% of VCDB incidents for similar organizations |
| 3 | Moderate | 10-30% of VCDB incidents for similar organizations |
| 4 | High | 30-60% of VCDB incidents for similar organizations |
| 5 | Very High | Greater than 60% of VCDB incidents for similar organizations |
Evaluate Risks
Calculate risk scores by combining expectancy and impact, then classify risks by severity level.
Risk Score = Expectancy x Highest Impact Score (across all four dimensions)
IG1 Risk Matrix (3x3)
| Expectancy \ Impact | 1 (Low) | 2 (Moderate) | 3 (High) |
|---|---|---|---|
| 1 (Low) | 1 | 2 | 3 |
| 2 (Moderate) | 2 | 4 | 6 |
| 3 (High) | 3 | 6 | 9 |
IG2/IG3 Risk Matrix (5x5)
| Expectancy \ Impact | 1 | 2 | 3 | 4 | 5 |
|---|---|---|---|---|---|
| 1 | 1 | 2 | 3 | 4 | 5 |
| 2 | 2 | 4 | 6 | 8 | 10 |
| 3 | 3 | 6 | 9 | 12 | 15 |
| 4 | 4 | 8 | 12 | 16 | 20 |
| 5 | 5 | 10 | 15 | 20 | 25 |
Recommend Safeguards
For each unacceptable or high risk, recommend specific CIS Controls safeguards that would reduce the risk to an acceptable level. Safeguard selection should consider the organization's IG level, existing capabilities, and implementation feasibility.
- Start with the safeguards in the organization's target IG level
- Prioritize safeguards that address the highest risks first
- Consider safeguard dependencies (some safeguards build on others)
- Evaluate whether partial implementation provides meaningful risk reduction
- Document the expected risk reduction for each recommended safeguard
Evaluate Recommended Safeguards
Assess whether the recommended safeguards themselves create unacceptable burden or risk (Safeguard Risk). This implements CIS RAM Principle 3: safeguards must not be more burdensome than the risks they protect against.
Safeguard Risk Factors
Financial Cost
Total cost of ownership including procurement, deployment, training, and ongoing maintenance
Operational Impact
Effect on productivity, user experience, workflow efficiency, and business agility
Technical Complexity
Implementation difficulty, integration challenges, and ongoing technical maintenance burden
Organizational Change
Required changes to processes, culture, staffing, and organizational structure
New Vulnerabilities
Whether the safeguard itself introduces new attack surfaces or failure modes
Threats & Vulnerabilities by Control
CIS RAM risk assessments require identifying threats and vulnerabilities for each control. Below is an aggregated summary of threats and vulnerabilities across all safeguards for each of the 18 CIS Controls. Click individual safeguards for safeguard-specific threats and tool recommendations.
Threat Scenarios
Attackers compromise untracked devices connected to the network that are invisible to security tooling, using them as persistent footholds for lateral movement.
Critical vulnerabilities remain unpatched on devices not included in the asset inventory, allowing ransomware or worms to propagate through unmanaged endpoints.
Sensitive data resides on assets not captured in the inventory, leading to unprotected PII/PHI exposure during a breach and regulatory penalties.
An attacker or insider connects an unauthorized device (e.g., rogue wireless AP, USB-tethered device) to the corporate network to intercept traffic or establish a backdoor.
Unauthorized IoT devices with default credentials remain on the network indefinitely, providing persistent attack vectors that bypass endpoint security controls.
Unmanaged personal devices infected with malware connect to the enterprise network without quarantine or review, spreading infections to production systems.
Without active scanning, attacker-controlled devices or compromised hosts remain invisible on the network, enabling long-term data exfiltration campaigns.
Assets that bridge network segments but are not discovered by active tools allow attackers to pivot between zones that should be isolated.
...and 4 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without a detailed asset inventory, the organization cannot determine the full scope of devices storing or processing data, leaving blind spots in security coverage.
Absence of a maintained inventory means decommissioned, relocated, or repurposed assets are not tracked, creating inconsistencies between assumed and actual network state.
When a breach occurs, responders cannot quickly identify all potentially affected assets, extending dwell time and increasing the blast radius of incidents.
Without a defined process for addressing unauthorized assets, rogue devices persist on the network indefinitely with no accountability or remediation timeline.
The absence of a weekly review cycle for unauthorized assets means malicious or non-compliant devices can operate undetected for extended periods.
Relying solely on manual inventory processes means new or transient devices connected to the network are not detected in a timely manner.
Without daily active discovery scans, the gap between a device connecting to the network and its detection grows, increasing the window for unauthorized activity.
Without DHCP logging feeding the asset inventory, dynamically addressed devices are not tracked, creating gaps in visibility for devices that come and go.
...and 3 more. See individual safeguards for complete list.
Threat Scenarios
Malicious or backdoored software installed without inventory tracking evades security review, enabling supply chain attacks like those seen in SolarWinds-type compromises.
Unlicensed or pirated software installed outside inventory controls introduces trojanized versions or cracks that contain embedded malware and credential stealers.
Applications installed for past projects but never inventoried remain on systems with known vulnerabilities, providing easy exploitation targets for attackers.
Unsupported software no longer receives security patches, allowing attackers to exploit publicly disclosed CVEs with readily available exploit code.
Unsupported applications with zero-day vulnerabilities will never be patched by the vendor, giving attackers permanent exploitation capabilities against those systems.
Unauthorized software including remote access trojans, cryptominers, or backdoors persists on endpoints because no process exists to identify and remove them.
Employees install unauthorized cloud sync clients or SaaS tools that exfiltrate corporate data to unmanaged cloud storage outside organizational visibility.
Attackers install persistence tools, keyloggers, or lateral movement utilities that go undetected because no automated tooling monitors for new software installations.
...and 9 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without a maintained software inventory, the organization cannot determine what applications are installed across endpoints, leaving unknown software unpatched and unmonitored.
Without records of publisher, version, and business purpose, the organization cannot distinguish authorized software from unauthorized or malicious installations.
Running end-of-life software without documented exceptions and compensating controls leaves known vulnerabilities permanently unaddressed in the environment.
Without monitoring vendor support status, the organization is unaware when critical software transitions to end-of-life, continuing to rely on it without risk acceptance.
Without a process to remove or exception unauthorized software, non-compliant and potentially malicious applications accumulate across the enterprise unchecked.
Unauthorized software is never flagged because no regular review cycle compares installed applications against the approved software inventory.
Relying on manual processes to track installed software across the enterprise is error-prone and cannot scale, resulting in chronically incomplete and outdated inventories.
Without automated inventory tools, there is no mechanism to detect when new software is installed or existing software is modified between manual audit cycles.
...and 6 more. See individual safeguards for complete list.
Threat Scenarios
Without a data management process, sensitive data proliferates across uncontrolled locations including personal drives, shadow IT services, and unsecured file shares.
Absence of defined data sensitivity levels and handling requirements leads to GDPR, HIPAA, or PCI DSS violations when regulated data is processed without appropriate safeguards.
Without data retention and disposal requirements, organizations retain data indefinitely, massively increasing the volume and sensitivity of data exposed during a breach.
Without a data inventory, the organization cannot determine what sensitive data was exposed in a breach, leading to delayed notifications and underestimated impact assessments.
Sensitive data on systems being decommissioned or migrated is not properly handled because no inventory tracks where sensitive data resides.
Users with excessive file system, database, or application permissions access sensitive data beyond their need-to-know, increasing insider threat risk and breach blast radius.
Attackers who compromise a single user account gain access to broadly shared file systems and databases lacking access control lists, enabling rapid data harvesting.
Without proper access control lists, unauthorized users or compromised accounts can modify critical business data, financial records, or configuration files.
...and 24 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without established data management procedures, there are no consistent rules for how data is classified, handled, retained, or disposed of across the enterprise.
The absence of designated data owners means no one is accountable for ensuring sensitive data receives appropriate protection throughout its lifecycle.
Without a data inventory, the organization does not know where sensitive data is stored, processed, or transmitted, making it impossible to apply appropriate protections.
Security controls like encryption, access restrictions, and monitoring cannot be properly targeted without knowing which assets contain sensitive data.
Without need-to-know-based access control lists, data repositories default to broad access, granting users permissions far exceeding their role requirements.
Without a policy-driven ACL configuration, access permissions vary inconsistently across file systems, databases, and applications with no unified enforcement.
Without minimum and maximum retention periods, data accumulates indefinitely, expanding the attack surface and increasing regulatory exposure.
Without enforced retention schedules, data deletion depends on individual judgment, leading to inconsistent practices and perpetual data hoarding.
...and 20 more. See individual safeguards for complete list.
Threat Scenarios
Attackers exploit out-of-box default configurations including open ports, unnecessary services, and weak security settings that were never hardened according to a secure baseline.
Over time, systems drift from secure configurations through ad-hoc changes, reintroducing vulnerabilities that were previously mitigated and creating inconsistent security postures.
Ransomware propagates rapidly through systems lacking hardened configurations, exploiting enabled-by-default protocols like SMBv1 and unnecessary remote access services.
Attackers gain administrative access to routers, switches, and firewalls using well-known default credentials or SNMP community strings that were never changed from vendor defaults.
Network devices configured without security hardening allow traffic mirroring, unauthorized VLAN access, or routing manipulation enabling man-in-the-middle attacks.
An attacker or malicious insider accesses sensitive data, installs malware, or executes commands on an unattended workstation that never locked due to missing auto-lock configuration.
In shared office spaces or public locations, unlocked idle sessions expose sensitive data on screen and allow passersby to interact with authenticated application sessions.
Attackers who compromise one server move laterally to others through open ports and services that a host-based firewall would have blocked, escalating the breach scope.
...and 19 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without a documented secure configuration process, systems are deployed with vendor defaults that prioritize ease of use over security, leaving known attack surfaces exposed.
Without annual review of secure configuration standards, baselines become outdated as new attack techniques emerge and vendor recommendations change.
Without a secure configuration process for network devices, routers, switches, and firewalls run with default settings that expose management interfaces and unnecessary services.
Without documented configuration processes referencing standards like CIS Benchmarks or DISA STIGs, there is no way to verify network devices meet security requirements.
Without configured automatic session locking, unattended devices remain logged in indefinitely, granting physical access equal to authenticated user access.
Without standardized lock policies, some devices lock after minutes while others never lock, creating inconsistent protection that users cannot rely on.
Without server firewalls, all network-accessible services on the server are exposed to any device that can route to it, relying entirely on perimeter controls.
Absence of host-based firewalls means internal network compromise provides unrestricted access to all server services, negating defense-in-depth strategies.
...and 16 more. See individual safeguards for complete list.
Threat Scenarios
Former employees, contractors, or third parties retain active accounts that are not tracked in an inventory, using them to access systems and data after their authorization has ended.
Accounts not tracked in an inventory accumulate permissions over time through role changes without review, creating over-privileged accounts that represent high-value targets.
Shared or generic accounts not captured in the inventory are compromised, and investigations cannot attribute actions to a specific individual due to lack of account tracking.
Attackers use credentials leaked from third-party breaches to access enterprise accounts where employees reused the same password across personal and work systems.
Attackers perform password spraying attacks using common passwords like 'Spring2026!' that meet basic complexity rules but are predictable, compromising multiple accounts simultaneously.
Attackers who obtain password hashes crack short or simple passwords rapidly using GPU-accelerated brute force or rainbow tables, gaining access to accounts with weak passwords.
Attackers compromise dormant accounts through credential stuffing or phishing, using them for persistent access since inactive accounts are rarely monitored for suspicious activity.
A former contractor's account remains active and unmonitored for months after contract end, providing an entry point if the contractor turns hostile or their credentials are leaked.
...and 7 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without a maintained inventory of all accounts, the organization cannot determine how many accounts exist, who owns them, or whether they are all still authorized.
Without quarterly reviews against the account inventory, unauthorized or orphaned accounts persist indefinitely without detection or remediation.
Without unique password requirements and minimum length enforcement, users choose weak, predictable, or previously compromised passwords that are easily guessed or cracked.
Without technical controls enforcing password length and uniqueness requirements, users default to the shortest, simplest, most memorable passwords possible.
Without automatic disabling after 45 days of inactivity, dormant accounts from departed users, completed projects, or seasonal workers persist as latent access vectors.
Without automated monitoring of account login activity, the organization cannot identify which accounts are dormant and should be disabled or reviewed.
Administrators using their privileged accounts for email, browsing, and general work expose their elevated credentials to phishing, malware, and credential theft attacks.
Without dedicated admin accounts separate from daily-use accounts, compromise of any admin user's session immediately grants the attacker full administrative access.
...and 4 more. See individual safeguards for complete list.
Threat Scenarios
Without a formal granting process, new employees receive access by cloning another user's permissions, inheriting unnecessary privileges accumulated through that user's role changes.
Users changing roles accumulate access from both old and new positions because no structured process ensures previous access is reviewed when new access is granted.
A terminated employee retains access to enterprise systems for days or weeks after departure because no revocation process exists, enabling data theft or sabotage out of retaliation.
Third-party contractor accounts remain active indefinitely after their engagement ends because no revocation process triggers deprovisioning when the business relationship terminates.
Users who change departments or roles retain their previous access in addition to new role permissions, gradually accumulating excessive privileges across the enterprise.
Attackers use leaked credential databases to perform automated login attempts against externally-exposed applications that rely solely on passwords without MFA.
An employee's credentials stolen through a phishing campaign provide immediate access to externally-exposed applications because no second factor is required for authentication.
Attackers perform sustained brute-force attacks against internet-facing login pages where single-factor authentication allows unlimited credential guessing at scale.
...and 11 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without a defined process for granting access, provisioning decisions are ad-hoc, inconsistent, and not tied to verified business need, leading to over-provisioning.
Without a structured approval process, access is granted based on informal requests without management authorization or documentation of the business justification.
Without a defined process for revoking access upon termination or role change, accounts remain active and privileged long after the user's authorization has ended.
Without automated or procedural links between HR termination events and IT account deprovisioning, there is no trigger to disable accounts when users leave the organization.
Externally-exposed applications protected only by passwords are vulnerable to credential theft, stuffing, spraying, and brute-force attacks from anywhere on the internet.
Third-party applications used by the enterprise lack MFA requirements, meaning a compromised password grants full access to potentially sensitive cloud-hosted data.
Remote access connections (VPN, remote desktop gateway) protected only by passwords can be compromised by any attacker who obtains or guesses valid credentials.
Without MFA, the VPN or remote access gateway becomes a single-password-away entry point to the entire internal network from anywhere on the internet.
...and 8 more. See individual safeguards for complete list.
Threat Scenarios
Without a documented vulnerability management process, critical vulnerabilities like Log4Shell or MOVEit are addressed inconsistently, with some teams patching immediately while others remain exposed for months.
Absence of a formal process means vulnerabilities are triaged based on individual judgment rather than risk-based criteria, allowing high-severity vulnerabilities in internet-facing assets to persist while low-risk internal issues consume remediation resources.
Auditors and regulators find no evidence of a structured vulnerability management program, resulting in compliance failures and potential fines under frameworks like PCI DSS or HIPAA that mandate documented vulnerability management.
Attackers exploit known vulnerabilities that persist for months because no risk-based remediation timeline exists, allowing threat actors to weaponize public exploits long before patches are applied.
Without a structured remediation process, hastily applied patches cause system instability and are rolled back, re-exposing the vulnerability while the organization scrambles for a stable fix.
Vulnerabilities are permanently deferred without documented risk acceptance or compensating controls, creating a growing backlog of unpatched systems that accumulate exploitable weaknesses over time.
Threat actors leverage automated scanning tools to identify enterprise systems running unpatched operating systems and deploy ransomware or cryptominers through known OS-level vulnerabilities like EternalBlue or PrintNightmare.
A wormable vulnerability in an unpatched operating system allows malware to propagate laterally across the network without user interaction, as seen with WannaCry and NotPetya, because automated OS patching is not in place.
...and 13 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
The organization has no written policy defining vulnerability identification, assessment, and remediation responsibilities, leaving each team to handle vulnerabilities independently with no accountability.
Without a documented process, there is no clear ownership of vulnerability scanning, triage, remediation, or exception approval, causing critical vulnerabilities to fall through the cracks between IT and security teams.
The organization lacks a standardized severity classification scheme (such as CVSS-based thresholds) for prioritizing vulnerability remediation, resulting in inconsistent treatment of similar risks across business units.
The organization has no defined SLAs linking vulnerability severity to remediation deadlines (e.g., critical within 48 hours, high within 14 days), allowing dangerous vulnerabilities to remain open indefinitely.
When vulnerabilities cannot be immediately remediated, there is no process for documenting exceptions, compensating controls, or risk acceptance decisions, leaving unpatched systems without any mitigating oversight.
Operating system patches are applied manually or on an irregular schedule, resulting in significant patch lag where critical OS updates may not be deployed for weeks or months after release.
The organization lacks a centralized tool (such as WSUS, SCCM, or Jamf) to automate OS patch distribution and verification, making it impossible to ensure consistent patch levels across all enterprise assets.
Automated patching may cover Windows endpoints but miss Linux servers, macOS devices, or specialized operating systems, leaving significant portions of the fleet running vulnerable OS versions.
...and 9 more. See individual safeguards for complete list.
Threat Scenarios
Advanced persistent threat actors operate undetected for months because the organization has no standardized logging requirements, leaving critical assets without the audit trails needed to identify malicious activity.
When a breach is discovered, incident responders cannot determine the scope, root cause, or timeline because the audit log management process was never defined, resulting in inconsistent and incomplete log collection across systems.
Regulatory audits reveal that the organization has no formal audit log management process, resulting in compliance violations under SOX, HIPAA, PCI DSS, or GDPR that require documented logging standards and retention policies.
Attackers specifically target assets where audit logging is disabled or not collected, knowing their activities will leave no forensic trail, enabling prolonged dwell times and undetected data exfiltration.
Malicious insiders or external attackers modify critical data, configurations, or access controls on systems where audit logs are not collected, making it impossible to detect or attribute unauthorized changes.
Sophisticated attackers route their activities through assets without log collection, using these blind spots as staging areas for lateral movement and data staging while remaining invisible to security monitoring.
Critical audit log data is silently overwritten or discarded when logging destinations run out of storage, destroying evidence of ongoing attacks or compliance-required records during the exact periods when they are most needed.
Attackers intentionally generate massive volumes of log entries to exhaust available storage, causing legitimate audit events to be dropped and creating a window of unmonitored activity for their actual malicious operations.
...and 24 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
The organization lacks a formal policy specifying which assets must generate logs, what events must be captured, how logs are reviewed, and how long they are retained, resulting in ad-hoc logging that varies widely across systems.
Without a documented audit log management process, no one is responsible for reviewing logs, and no procedures exist for escalating suspicious findings, allowing malicious activity captured in logs to go unnoticed.
Key servers, databases, network devices, and cloud services have audit logging disabled by default or intentionally turned off to conserve resources, creating forensic blind spots across the infrastructure.
Logging is enabled on some asset categories (e.g., domain controllers) but not others (e.g., Linux servers, network appliances, SaaS applications), leaving significant portions of the environment without audit trails.
Log storage volumes are not monitored for capacity, and no alerts fire when storage approaches capacity thresholds, resulting in silent log loss when disks fill up during high-activity periods or attacks.
Log storage capacity is insufficient to retain logs for the period defined by the organization's retention policy, forcing either premature log deletion or logging failures that compromise both compliance and forensic capability.
Enterprise assets use different or no NTP servers, causing clock drift between systems that degrades the accuracy and reliability of time-stamped audit log entries used for correlation and forensic analysis.
Assets are configured with only one time source, and if that source becomes unavailable or compromised, clocks drift without detection, degrading the integrity of all time-dependent security operations.
...and 16 more. See individual safeguards for complete list.
Threat Scenarios
Outdated or unsupported browsers contain known vulnerabilities that exploit kits target to deliver malware through malicious advertisements, compromised websites, or watering hole attacks without requiring any user interaction beyond visiting a page.
Unsupported email clients with known rendering or parsing vulnerabilities are exploited to execute malicious code when users preview or open specially crafted emails, bypassing attachment-based security controls.
Outdated browsers supporting deprecated TLS versions or weak cipher suites allow man-in-the-middle attackers to intercept and decrypt sensitive web sessions, including banking, email, and enterprise application traffic.
Malware on enterprise assets communicates with known malicious domains for command-and-control instructions, payload downloads, and data exfiltration, and without DNS filtering these connections succeed unimpeded.
Users click phishing links that resolve to known malicious domains mimicking legitimate login pages, and without DNS-level blocking these domains are freely accessible, enabling credential harvesting at scale.
Enterprise assets connect to domains hosting cryptomining scripts or malicious advertisements that deliver drive-by downloads, consuming resources and potentially installing malware because no DNS filtering blocks these known threats.
Users visit legitimate but compromised websites that redirect to malicious URLs hosting exploit kits, and without network-based URL filtering these malicious redirects succeed in delivering malware payloads.
Sophisticated phishing campaigns use newly created domains that mimic corporate login portals, and without URL reputation filtering and category-based blocking these sites are accessible to all enterprise users.
...and 13 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Enterprise assets run end-of-life browser versions that no longer receive security patches from vendors, accumulating exploitable vulnerabilities with each new disclosure while remaining the primary interface to web applications.
The organization has no technical controls (GPO, MDM, or configuration management) to enforce minimum browser versions or prevent the use of unsupported browsers, allowing users to operate with dangerously outdated software.
Enterprise assets resolve DNS queries without any filtering, allowing connections to known malicious domains, phishing infrastructure, and threat actor command-and-control servers without any prevention or alerting.
Even where DNS filtering exists, endpoints can bypass it by using hardcoded IP addresses or external DNS resolvers (DoH, DoT) that are not blocked at the network perimeter, negating the protection.
The organization does not enforce URL filtering at the network level, allowing enterprise assets to connect to any website regardless of its reputation, category, or known threat status.
URL filtering exists but block lists and category databases are not regularly updated with current threat intelligence, allowing recently identified malicious URLs to bypass filtering controls.
Users can install any browser extension without restriction, including extensions requesting permissions to read all website data, modify pages, and access authentication cookies across all domains.
Email client plugins and add-ons are not restricted through group policy or configuration management, allowing users to install unvetted third-party extensions that can access all email content and attachments.
...and 6 more. See individual safeguards for complete list.
Threat Scenarios
Without anti-malware software deployed, enterprise assets are vulnerable to commodity malware including ransomware, banking trojans, information stealers, and cryptominers that are routinely blocked by even basic AV solutions.
Ransomware variants like LockBit, BlackCat, or Cl0p execute and encrypt data on systems without anti-malware protection, causing operational disruption and potential data loss because no software exists to detect or prevent the encryption process.
Information-stealing malware (RedLine, Raccoon, Vidar) executes on unprotected endpoints, harvesting saved browser credentials, session cookies, cryptocurrency wallets, and VPN configurations for sale on dark web marketplaces.
Anti-malware software with stale signature databases fails to detect recently released malware variants that would be caught by current signatures, leaving endpoints vulnerable to threats that are days or weeks old.
New ransomware variants released after the last signature update execute freely on endpoints with stale definitions, encrypting files before the anti-malware engine recognizes the threat pattern.
Malware-laden USB devices automatically execute malicious payloads when inserted into systems with autorun enabled, a technique used in targeted attacks (Stuxnet-style) and opportunistic campaigns where infected USB drives are distributed in public areas.
Self-propagating worms spread across the enterprise via removable media by leveraging autorun functionality to copy themselves to every USB device inserted, then executing automatically on each new system the device connects to.
Attackers deliberately leave infected USB drives in parking lots, lobbies, or conference rooms, and autorun functionality causes malicious payloads to execute immediately when curious employees insert the devices into their workstations.
...and 11 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Some or all enterprise assets lack anti-malware software, providing no automated defense against known malware families, exploit payloads, or malicious scripts that endpoint protection would normally detect and block.
Anti-malware is deployed on Windows workstations but not on servers, Linux systems, macOS devices, or virtual machines, leaving significant portions of the infrastructure without malware detection capabilities.
Anti-malware signature updates are not configured for automatic delivery, relying on manual updates or infrequent scheduled checks that leave detection databases hours or days behind current threat intelligence.
Automatic update mechanisms fail silently due to network issues, proxy misconfigurations, or expired licenses, and without monitoring for update success, endpoints operate with increasingly stale detection capabilities.
Windows autorun and autoplay features remain enabled at default settings, allowing removable media to automatically execute programs, scripts, or installers without requiring explicit user action beyond inserting the device.
Group policies or configuration management tools have not been configured to disable autorun and autoplay across all enterprise assets, leaving systems vulnerable to automatic execution of removable media content.
Anti-malware software is not configured to automatically scan removable media upon connection, relying on users to manually initiate scans or waiting for scheduled scans that may not run before infected files are accessed.
Anti-malware policies specifically exclude removable media from real-time scanning due to performance concerns, allowing malicious files on USB devices to be copied to local storage without triggering detection.
...and 6 more. See individual safeguards for complete list.
Threat Scenarios
Ransomware encrypts critical business data and the organization has no documented recovery process, recovery priorities, or tested procedures, resulting in chaotic response, extended downtime, and potential permanent data loss.
A major incident destroys data across multiple systems, and without a documented recovery process defining which systems and data sets to restore first, teams waste time recovering low-priority systems while critical business operations remain offline.
Backup data is stored without encryption or access controls because the recovery process documentation does not address backup security requirements, allowing attackers to access sensitive backup data or encrypt backup repositories.
Hardware failures, storage corruption, or accidental deletion destroy critical data, and without automated backups running on a defined schedule the organization cannot restore to a recent state, resulting in permanent data loss.
After a ransomware attack, the organization discovers that backups are weeks or months old because automated backup schedules were never configured, forcing a choice between paying the ransom or accepting significant data loss.
Manual backup processes are skipped during busy periods, staff transitions, or organizational changes, creating gaps in backup coverage that are only discovered when data recovery is needed during an incident.
Ransomware operators specifically target backup systems and encrypt or delete backup data that is stored without adequate protection, eliminating the organization's ability to recover without paying the ransom.
Unencrypted backup media or repositories are accessed by unauthorized parties, exposing sensitive data including PII, financial records, and intellectual property that exists in an easily restorable format within the backup archives.
...and 7 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
The organization has no written data recovery process defining recovery scope, priorities, responsible parties, or procedures, leaving data recovery dependent on ad-hoc individual knowledge during crisis situations.
Without a documented recovery process, the organization has no defined Recovery Time Objectives (RTO) or Recovery Point Objectives (RPO) for different data classifications, preventing informed decisions about backup frequency and recovery sequencing.
Critical enterprise data is not backed up on an automated schedule, relying on manual processes that are inconsistently followed, resulting in unpredictable backup currency and unknown recovery point capability.
Automated backups cover some systems but miss critical databases, file shares, SaaS application data, or cloud workloads, leaving significant portions of enterprise data without any backup protection.
Backup repositories and media are not encrypted, meaning anyone with access to the storage location can read all backed-up data, including sensitive information that is encrypted or access-controlled in production environments.
Recovery data is stored with access controls that are less restrictive than those protecting the original data, allowing individuals who cannot access production data to freely access the same data through backup systems.
All backup data resides on the same network or in the same physical location as production systems, meaning any event that compromises the primary environment also threatens the only recovery copies.
Backup repositories are mounted as network shares or accessible via standard network protocols from production systems, allowing ransomware, attackers, or compromised accounts to reach and destroy backup data.
...and 2 more. See individual safeguards for complete list.
Threat Scenarios
Attackers exploit known vulnerabilities in outdated router, switch, and firewall firmware (such as CVEs in Cisco IOS, Fortinet FortiOS, or Palo Alto PAN-OS) to gain control of network infrastructure and intercept, redirect, or disrupt all traffic flowing through compromised devices.
Network infrastructure running end-of-life firmware that no longer receives security patches accumulates exploitable vulnerabilities, and attackers who compromise these devices gain persistent network-level access that is difficult to detect and remediate.
Network devices running unsupported software experience stability issues and crashes that cannot be resolved because vendor support has ended, causing unpredictable network outages that affect business operations.
Attackers who compromise a single endpoint move freely across the entire network because no segmentation exists, accessing databases, file servers, and critical systems that should be isolated from general user traffic.
Ransomware spreads to every reachable system on the network because the lack of segmentation provides no barriers to propagation, turning a single-host infection into an enterprise-wide encryption event.
A network architecture that does not enforce least privilege allows users and systems to access network resources far beyond their operational needs, enabling attackers to reach high-value targets from any compromised entry point.
Attackers intercept network device management traffic using insecure protocols (Telnet, HTTP, SNMPv1/v2) to capture administrative credentials, then use those credentials to reconfigure devices, create backdoor access, or disrupt network services.
Network device configurations are modified without version control, change management, or audit trails, and unauthorized changes create security gaps such as opened firewall rules, disabled logging, or new route entries that redirect traffic.
...and 16 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Routers, switches, firewalls, and other network devices run firmware versions that are months or years behind current releases, containing known and publicly documented vulnerabilities with no scheduled update cadence.
The organization does not maintain an inventory of network device software versions or track them against vendor support timelines, making it impossible to identify devices running unsupported or vulnerable firmware.
The network architecture provides no segmentation between user workstations, servers, databases, management interfaces, and critical infrastructure, allowing unrestricted lateral communication between all network zones.
Network access rules do not enforce least privilege principles, allowing systems and users to communicate with any network resource rather than only those required for their specific business function.
Network devices are managed using unencrypted protocols (Telnet, HTTP, SNMPv1/v2c) that transmit credentials and configuration data in cleartext, allowing network-positioned attackers to intercept administrative access.
Network device configurations are not managed through version-controlled infrastructure-as-code or change management processes, making it impossible to detect unauthorized changes, roll back misconfigurations, or audit who changed what.
The organization has no up-to-date architecture diagrams showing network topology, segmentation boundaries, trust zones, data flows, and external connections, leaving security teams without the visibility needed for effective defense.
Network architecture diagrams exist but are not updated when changes are made, rendering them inaccurate and potentially misleading for security analysis, compliance audits, and incident response activities.
...and 8 more. See individual safeguards for complete list.
Threat Scenarios
An attacker compromises a single endpoint and moves laterally across the network undetected because security events from different sources are not correlated in a centralized platform.
A data exfiltration campaign persists for months because firewall, endpoint, and authentication logs are reviewed independently rather than correlated, preventing analysts from connecting related indicators of compromise.
Analysts miss critical attack indicators buried across dozens of independent log sources, allowing ransomware operators to complete their kill chain before detection.
An attacker deploys fileless malware using PowerShell or WMI that operates entirely in memory, evading network-level detection because no host-based intrusion detection solution is monitoring process behavior.
A malicious insider installs credential harvesting tools or keyloggers on their workstation, which go undetected without host-based intrusion detection monitoring local system activity.
An attacker installs a kernel-level rootkit that persists across reboots and hides malicious processes from standard OS tools, remaining invisible without a dedicated HIDS examining system integrity.
An attacker establishes encrypted C2 communications over HTTPS or DNS tunneling that bypass perimeter firewalls, remaining undetected because no network intrusion detection system is inspecting traffic patterns.
An attacker exploits a vulnerability in an internal service, and the exploit traffic crosses network segments without triggering any alert because no NIDS is deployed to analyze east-west traffic.
...and 25 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without a SIEM or centralized alerting platform, related attack indicators across multiple systems cannot be correlated, resulting in fragmented visibility and missed detections.
Each security tool generates alerts independently with no unified triage process, creating blind spots where multi-stage attacks span tool boundaries without triggering a consolidated alert.
Without host-based intrusion detection, suspicious process executions, file integrity changes, and registry modifications on individual endpoints go unmonitored, allowing attackers to operate freely post-compromise.
Absent HIDS capabilities, attacks that never touch disk such as in-memory exploits, living-off-the-land techniques, and process injection cannot be identified at the endpoint level.
Without a NIDS, malicious network traffic patterns such as port scans, exploit payloads, and beaconing behavior are not identified, leaving the network blind to active intrusions.
Internal network segments lack inspection capabilities, allowing attackers who have gained initial access to freely probe and exploit other systems within the environment.
Without traffic filtering between segments, all network zones can communicate freely, eliminating containment boundaries and allowing compromises to spread across the entire network.
Absence of inter-segment filtering means high-security zones like payment processing or database tiers are reachable from lower-trust zones such as guest Wi-Fi or general workstations.
...and 14 more. See individual safeguards for complete list.
Threat Scenarios
A sophisticated phishing campaign targets employees who have received no security awareness training, resulting in widespread credential compromise because staff cannot recognize social engineering tactics.
An employee unknowingly installs malware by clicking a malicious link or opens a weaponized attachment because they have never been educated on safe computing practices through a formal awareness program.
An attacker impersonates a vendor over the phone and convinces an employee to share system credentials, succeeding because no security awareness program has established a culture of verification and skepticism.
An attacker sends a targeted spear-phishing email mimicking an internal executive, and the recipient enters credentials on a fake login page because they were never trained to identify phishing indicators.
An attacker impersonates a CEO via email and instructs finance staff to wire funds to a fraudulent account, succeeding because employees have not been trained to recognize pretexting and verify unusual requests.
An unauthorized person follows an employee through a badge-controlled door by carrying boxes and appearing to need help, gaining physical access because staff have not been trained on tailgating awareness.
An attacker uses credentials leaked from a third-party breach to access enterprise accounts because employees were never trained on password uniqueness and the dangers of credential reuse across services.
An attacker tricks an employee into approving a fraudulent MFA push notification because the employee was never trained on how MFA fatigue attacks work or how to recognize unauthorized authentication requests.
...and 18 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without an established security awareness program, employees receive no structured education on security threats, safe practices, or organizational policies, leaving human behavior as the weakest link.
Absence of onboarding security training means new employees begin handling enterprise assets and data without understanding the threat landscape or their role in maintaining security.
Without specific social engineering recognition training, employees cannot distinguish phishing emails from legitimate correspondence or identify pretexting, vishing, and tailgating attempts.
Absence of practical training exercises means employees have no experiential learning to reinforce recognition of social engineering tactics in real-world scenarios.
Without authentication best practices training, employees commonly reuse passwords, choose weak credentials, and store passwords insecurely, dramatically increasing the attack surface for credential-based attacks.
Employees who have not been trained on MFA best practices may share one-time codes, approve unsolicited push notifications, or fail to report suspicious authentication attempts.
Without data handling training, employees do not understand how to classify data by sensitivity or follow proper procedures for storing, transferring, archiving, and destroying sensitive information.
Absence of training on workspace security practices leads to sensitive data being left visible on screens, desks, and whiteboards where unauthorized individuals can view it.
...and 10 more. See individual safeguards for complete list.
Threat Scenarios
A service provider with access to enterprise data is compromised, but the organization cannot assess impact or respond effectively because it has no inventory of which providers have access to what data.
A department independently contracts a cloud service provider that processes sensitive data, and the security team is unaware of the relationship because no centralized service provider inventory exists.
A former service provider retains active access to enterprise systems months after the contract ended because no inventory tracks provider relationships or designated contacts responsible for lifecycle management.
Different business units apply varying and often inadequate security requirements to service providers because no unified management policy defines standards for vendor assessment, monitoring, and decommissioning.
A service provider handling sensitive regulated data is engaged without any security assessment because no policy exists that mandates evaluation criteria before onboarding vendors.
A service provider processing large volumes of sensitive regulated data is treated with the same minimal oversight as a low-risk office supply vendor because no classification system distinguishes provider risk levels.
An organization fails a regulatory audit because it cannot demonstrate risk-appropriate oversight of service providers handling protected health or financial data, as no classification scheme exists.
A service provider suffers a breach affecting enterprise data but delays disclosure for months because no contractual requirement mandates timely breach notification, leaving the organization unable to respond.
...and 10 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without a maintained inventory of all service providers, the organization has no visibility into which third parties have access to enterprise data, systems, or networks.
Absence of service provider classification and designated contacts means the organization cannot quickly determine risk exposure or coordinate response when a provider experiences a security incident.
Without a service provider management policy, there are no standardized requirements for classifying, assessing, monitoring, or decommissioning vendors, leading to inconsistent and often inadequate third-party risk management.
Absence of a policy addressing the full vendor lifecycle means providers are onboarded without security requirements and remain active without periodic reassessment or proper offboarding.
Without classifying providers by data sensitivity, volume, availability requirements, and regulatory exposure, the organization applies uniform and often insufficient controls regardless of actual risk.
Absence of classification prevents the organization from focusing security oversight resources on the highest-risk service providers, resulting in inadequate attention to critical vendor relationships.
Without contractual security requirements, providers have no legal obligation to implement encryption, notify the enterprise of breaches, maintain minimum security programs, or securely dispose of data.
Absence of security clauses in contracts means the organization has no right to audit, assess, or verify the service provider's security posture or compliance with expected standards.
...and 6 more. See individual safeguards for complete list.
Threat Scenarios
Multiple applications developed in-house contain the same categories of vulnerabilities such as injection flaws and broken authentication because no secure development process defines coding standards or security requirements.
Developers incorporate open-source libraries with known critical vulnerabilities into production applications because the development process has no requirements for vetting third-party code security.
Applications are rushed to production without any security testing because no formal secure development process mandates security gates in the release pipeline.
A security researcher publicly discloses a vulnerability in the organization's application after responsible disclosure attempts fail because no process exists to receive and triage vulnerability reports.
An attacker discovers and exploits a vulnerability that had been reported by a user but was never processed because the organization has no intake mechanism for vulnerability reports.
The same class of vulnerability such as SQL injection recurs across multiple applications because individual flaws are patched without analyzing the root cause, allowing the systemic coding error to persist.
A development team continues producing code with the same authentication bypass flaw because no root cause analysis identifies the underlying process or knowledge gap causing the recurring vulnerability.
A widely used third-party library included in the application is compromised by an attacker who injects malicious code into an update, and the organization is unaware because it has no inventory of third-party components.
...and 30 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without a secure development process, there are no defined standards for secure design, coding practices, vulnerability management, or security testing, resulting in applications with systemic security weaknesses.
Absence of a formalized process means security testing, code review, and vulnerability assessment are not required stages in the software release lifecycle.
Without a process to accept and address software vulnerability reports, the organization cannot receive, triage, or remediate reported flaws, leaving known vulnerabilities unpatched.
Absence of a public-facing channel for external researchers to report vulnerabilities means the organization misses early warnings about exploitable flaws in its applications.
Without root cause analysis, the organization only addresses symptoms (individual bugs) rather than underlying causes (insecure coding patterns, missing training, flawed architecture), leading to recurring vulnerabilities.
Absence of root cause analysis keeps the development team in a purely reactive mode, patching individual vulnerabilities without improving the systemic security of the codebase.
Without an inventory of third-party components, the organization cannot identify which applications use vulnerable or compromised libraries when new threats are disclosed.
Absence of a maintained component inventory means risks associated with each dependency such as known vulnerabilities, licensing issues, and support status are not evaluated or monitored.
...and 20 more. See individual safeguards for complete list.
Threat Scenarios
A security incident escalates because no designated personnel exist to coordinate the response, resulting in ad hoc decision-making, duplicated efforts, and extended attacker dwell time.
The only person with incident handling knowledge is unreachable during a ransomware attack, and no backup is designated, leaving the organization paralyzed during the critical early hours of the incident.
After a data breach, the organization fails to notify required regulatory agencies within mandated timeframes because no maintained contact list exists for incident reporting parties.
The organization's cyber insurance claim is denied because the insurer was not notified within the required timeframe, as the insurance provider's incident contact information was not readily available.
During an active ransomware attack, critical hours are lost trying to identify the correct law enforcement contacts because no pre-established contact list exists for security incident reporting.
An employee observes indicators of compromise but does not report them because no enterprise reporting process defines how, when, or to whom incidents should be reported.
An employee reports a suspected breach to their direct manager instead of the security team, and the information takes days to reach the right people because no formal reporting process exists.
During a significant breach, response efforts are uncoordinated because no documented process defines roles, responsibilities, escalation paths, or communication plans, leading to evidence destruction and extended attacker access.
...and 14 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without a designated incident handler and backup, there is no clear ownership of incident coordination, leading to confusion, delayed response, and lack of accountability during security events.
If incident response is outsourced without an internal designee to oversee the work, the organization loses control over response priorities, evidence handling, and communication during incidents.
Without a current list of incident reporting contacts including regulators, law enforcement, insurers, and partners, critical notifications are delayed or missed during the time-sensitive incident response phase.
Absence of annual contact verification means that during an incident, the organization may attempt to reach stakeholders at outdated phone numbers or email addresses, causing communication failures.
Without a defined reporting process, employees lack clear guidance on reporting timeframes, who to contact, how to report, and what minimum information to include, resulting in unreported or poorly reported incidents.
Even if a reporting process exists, it is ineffective if not readily accessible to all workforce members, resulting in employees being unable to find reporting instructions during a suspected incident.
Without a documented incident response process, the organization has no predefined playbook for roles, responsibilities, compliance requirements, or communication during security incidents.
Absence of a communication plan within the incident response process means internal and external communications during incidents are ad hoc, inconsistent, and potentially damaging.
...and 10 more. See individual safeguards for complete list.
Threat Scenarios
Critical exploitable vulnerabilities in the enterprise's network, applications, and services remain undiscovered because no penetration testing program exists to proactively identify them before attackers do.
The organization relies solely on automated vulnerability scanning, which misses complex attack chains and configuration weaknesses that only a structured penetration testing program would uncover.
The organization fails to meet regulatory or contractual requirements for penetration testing because no program with defined scope, frequency, and remediation processes has been established.
An attacker exploits a misconfigured external-facing service that would have been identified through an external penetration test, gaining initial access to the enterprise network.
Publicly available information such as exposed credentials, internal documents, or infrastructure details is leveraged by an attacker because no external penetration test with reconnaissance phase identified the exposure.
An attacker discovers an overlooked external entry point such as an old VPN endpoint or forgotten subdomain that perimeter security controls do not cover, because no external penetration test mapped the full attack surface.
An attacker exploits a vulnerability that was identified in a penetration test but never remediated because no process exists to track and prioritize the remediation of pentest findings.
A critical penetration test finding is deprioritized by a development team focused on features because no organizational policy mandates remediation timelines based on finding severity.
...and 6 more. See individual safeguards for complete list.
Vulnerabilities (When Control Absent)
Without a penetration testing program defining scope, frequency, methodology, and remediation processes, the organization has no proactive mechanism to discover exploitable vulnerabilities before attackers do.
Absence of a program means that even ad hoc penetration tests produce findings with no defined process for routing, prioritizing, and tracking remediation of discovered vulnerabilities.
Without periodic external penetration testing, internet-facing systems, services, and configurations are not evaluated from an attacker's perspective, leaving exploitable weaknesses in the perimeter undiscovered.
Absence of external testing with reconnaissance means publicly exposed enterprise information such as leaked credentials, misconfigured services, and OSINT data is not identified or remediated.
Without a defined remediation scope and prioritization policy, penetration test findings are not systematically addressed, leaving identified vulnerabilities exploitable long after discovery.
Absence of remediation requirements means penetration test reports become shelf-ware, with findings acknowledged but never assigned, tracked, or verified as fixed.
Without validating security measures after penetration tests, the organization does not know whether its detection and prevention controls can actually identify and block the techniques used during testing.
Absence of post-test validation means SIEM rules, IDS signatures, and firewall policies are not tuned to detect the specific attack techniques that penetration testers successfully employed.
...and 2 more. See individual safeguards for complete list.
Risk Treatment Options
Reduce (Mitigate)
Implement safeguards to reduce the risk to an acceptable level. This is the most common treatment for cybersecurity risks identified through CIS RAM.
When to Use
When effective safeguards exist that are not more burdensome than the risk itself.
Documentation Required
Risk treatment plan with specific safeguards, implementation timeline, responsible parties, and success metrics.
Accept
Formally acknowledge and accept the risk without implementing additional safeguards. Risk acceptance must be documented with clear justification and approved by appropriate authority.
When to Use
When the risk is within acceptable thresholds, or when available safeguards would be more burdensome than the risk (Principle 3). Also appropriate when the cost of remediation significantly exceeds the potential impact.
Documentation Required
Formal risk acceptance statement signed by an authorized executive, including: risk description, impact assessment, justification for acceptance, review date, and conditions that would trigger reassessment.
Transfer
Transfer the risk to a third party through insurance, outsourcing, or contractual arrangements. Note that while financial risk can be transferred, reputational risk and duty-of-care obligations generally cannot.
When to Use
When the financial impact of a risk can be offset by insurance or when a specialized third party can manage the risk more effectively.
Documentation Required
Insurance policies, service level agreements, contractual risk allocation clauses, and evidence that the third party's controls are adequate.
Avoid
Eliminate the risk by removing the activity, system, or process that creates it. This is the most effective but also most disruptive treatment option.
When to Use
When the risk cannot be reduced to an acceptable level and the activity is not essential to the organization's mission.
Documentation Required
Business case for eliminating the activity, migration plan, and verification that the risk source has been removed.