CIS Risk Assessment Method (CIS RAM) v2.1

Comprehensive reference for the CIS RAM methodology based on Duty of Care Risk Analysis (DoCRA).

Overview

CIS RAM is a risk assessment method that helps organizations implement the CIS Critical Security Controls (CIS Controls) in a way that is informed by the organization's specific risk environment. It provides a structured approach to evaluating cybersecurity risks and selecting appropriate safeguards based on the principle of Duty of Care Risk Analysis (DoCRA).

DoCRA Foundation

CIS RAM is built on the DoCRA (Duty of Care Risk Analysis) standard, which establishes that organizations have a duty to protect against reasonably foreseeable threats and that safeguards should be proportionate to the risks they address. DoCRA is codified in the CIS Controls and recognized by regulators and courts as a reasonable standard of care.

CIS RAM Versions by Implementation Group

CIS RAM for IG1

Simplified risk assessment for organizations implementing IG1 (Essential Cyber Hygiene). Uses a 3-point impact and likelihood scale. Suitable for small to medium organizations with limited cybersecurity resources.

Impact Scale: 1-3 | Risk Matrix: 3x3

CIS RAM for IG2

Intermediate risk assessment for organizations implementing IG2 (Risk-Managed Enterprise). Uses a 5-point impact and likelihood scale with more detailed analysis. Suitable for organizations with moderate cybersecurity resources and compliance requirements.

Impact Scale: 1-5 | Risk Matrix: 5x5

CIS RAM for IG3

Comprehensive risk assessment for organizations implementing IG3 (Comprehensive Security). Uses a 5-point impact and likelihood scale with the most detailed analysis including advanced threat modeling. Suitable for organizations with significant cybersecurity resources managing sensitive data or critical infrastructure.

Impact Scale: 1-5 | Risk Matrix: 5x5

3 Core Principles

1

Risk analysis must reasonably consider all interested parties that may be harmed

Risk assessments must not only consider the organization's own interests but also the interests of customers, partners, employees, regulators, and the general public who could be affected by a security incident. This principle ensures that risk analysis is comprehensive and accounts for the full scope of potential harm.

Key Points

  • Identify all parties who could be affected by a security failure
  • Consider the impact on customers, partners, employees, and the public
  • Regulatory and legal obligations to third parties must be factored in
  • The organization cannot simply accept risk on behalf of others without their consent
  • Business associate agreements and contractual obligations define shared risk responsibilities

Examples

  • A healthcare organization must consider patients when assessing risk to electronic health records
  • A financial institution must consider account holders when assessing risk to banking systems
  • A cloud service provider must consider its customers when assessing risk to its infrastructure
2

Risks must be reduced to a level that no authority can call negligent

Organizations must reduce risks to a level that a reasonable authority (court, regulator, industry body) would consider adequate. This does not mean eliminating all risk, but rather demonstrating that reasonable and proportionate measures have been taken. The standard is one of reasonableness, not perfection.

Key Points

  • The 'reasonable person' standard applies to cybersecurity decisions
  • Industry standards and frameworks (like CIS Controls) help define what is reasonable
  • Documentation of risk decisions is essential for demonstrating due care
  • Risk acceptance must be justified and documented with clear rationale
  • Compliance with regulations alone may not be sufficient -- actual risk reduction matters

Examples

  • Implementing IG1 safeguards demonstrates basic due care for any organization
  • Failing to patch known critical vulnerabilities within a reasonable timeframe could be considered negligent
  • Not having basic access controls on sensitive data systems would likely be viewed as unreasonable
3

Safeguards must not be more burdensome than the risks they protect against

The cost and burden of implementing security safeguards must be proportionate to the risks they address. Over-securing can be just as problematic as under-securing, as excessive safeguards can impede business operations, waste resources, and create their own risks. This principle ensures balanced, practical security.

Key Points

  • Safeguard costs include financial, operational, and human factors
  • The 'Safeguard Risk' concept captures the burden a safeguard creates
  • If a safeguard creates more disruption than the risk it addresses, it may not be appropriate
  • This principle prevents 'security theater' -- measures that look good but add burden without proportionate benefit
  • Organizations should seek the least burdensome effective safeguard

Examples

  • Requiring MFA for all systems is proportionate; requiring hardware tokens for a break room kiosk may not be
  • Full disk encryption for laptops handling sensitive data is proportionate to the risk of device theft
  • Blocking all USB devices may be disproportionate if the organization does not handle highly classified data

10 Practices

Understand the organization's mission, business objectives, legal and contractual obligations, and risk tolerance before beginning the assessment. This ensures risk analysis is grounded in the enterprise's actual context.

Activities

  • 1. Review the organization's mission statement and strategic objectives
  • 2. Identify legal, regulatory, and contractual compliance requirements
  • 3. Understand existing risk management frameworks and governance structures
  • 4. Interview key stakeholders to understand business priorities and risk appetite
  • 5. Document the organization's risk tolerance thresholds

Create a comprehensive picture of the organization's current security posture by understanding its assets, threats, vulnerabilities, and existing controls. This model serves as the baseline for risk evaluation.

Activities

  • 1. Inventory enterprise assets and data flows
  • 2. Identify threat sources relevant to the organization
  • 3. Assess current implementation of CIS Controls safeguards
  • 4. Map assets to the safeguards that protect them
  • 5. Document existing security capabilities and gaps

Define the boundaries and focus areas for the risk assessment. This ensures the assessment is manageable and focused on the most important areas.

Activities

  • 1. Determine which CIS Controls Implementation Group (IG) applies
  • 2. Identify the systems, processes, and data in scope
  • 3. Define organizational units and geographic locations in scope
  • 4. Document any exclusions and the rationale for excluding them
  • 5. Prioritize assessment areas based on business criticality

Identify realistic threat sources and develop criteria for evaluating the impact of security incidents on the organization's mission, operations, finances, and legal obligations.

Activities

  • 1. Identify threat sources (criminal, nation-state, insider, accidental, environmental)
  • 2. Develop impact criteria across four dimensions: Mission, Operational, Financial, Obligations
  • 3. Calibrate impact scales to the organization's context and IG level
  • 4. Define scoring thresholds with specific examples relevant to the organization
  • 5. Validate impact criteria with executive leadership

Establish criteria for estimating inherent risk -- the risk that exists before safeguards are applied. This helps prioritize which risks need the most attention.

Activities

  • 1. Define likelihood scales based on threat intelligence and incident history
  • 2. Use VCDB (VERIS Community Database) Index as a reference for likelihood estimation
  • 3. Map inherent risk to scenarios without CIS Controls implementation
  • 4. Calculate inherent risk scores using Expectancy x Impact formula
  • 5. Document the basis for each inherent risk estimation

Apply the developed criteria to evaluate the inherent risk for each in-scope safeguard area. This provides a prioritized view of where the organization faces the greatest unmitigated risk.

Activities

  • 1. Score each safeguard area for likelihood of exploitation if unprotected
  • 2. Score each safeguard area for impact across all four impact dimensions
  • 3. Calculate inherent risk scores (Expectancy x highest Impact score)
  • 4. Classify risks as Acceptable, Unacceptable, or High
  • 5. Document justification for each risk rating

Based on the inherent risk evaluation, recommend specific CIS Controls safeguards that would reduce unacceptable risks to acceptable levels.

Activities

  • 1. Map unacceptable and high inherent risks to appropriate CIS safeguards
  • 2. Prioritize safeguards based on risk reduction potential
  • 3. Consider the organization's IG level when selecting safeguards
  • 4. Document the expected risk reduction from each recommended safeguard
  • 5. Identify safeguard implementation dependencies and sequencing

Assess whether recommended safeguards create their own risks or burdens that could be disproportionate. This implements Principle 3 of CIS RAM.

Activities

  • 1. Evaluate the financial cost of implementing each safeguard
  • 2. Assess operational impact (productivity, workflow changes, user friction)
  • 3. Consider technical complexity and maintenance burden
  • 4. Evaluate whether the safeguard could create new vulnerabilities
  • 5. Compare safeguard burden against the risk it mitigates

After applying recommended safeguards, evaluate the remaining (residual) risk to ensure it has been reduced to an acceptable level.

Activities

  • 1. Recalculate risk scores with recommended safeguards in place
  • 2. Verify residual risk falls within acceptable thresholds
  • 3. Identify any remaining unacceptable risks requiring additional treatment
  • 4. Document risk acceptance decisions for any residual risks above threshold
  • 5. Obtain executive sign-off on residual risk acceptance

Develop and execute risk treatment plans for all identified risks, including implementation timelines, responsible parties, and success metrics.

Activities

  • 1. Create risk treatment plans for each unacceptable risk
  • 2. Assign owners and deadlines for safeguard implementation
  • 3. Define success metrics and verification criteria
  • 4. Establish monitoring and review cadence for risk treatment progress
  • 5. Document formal risk acceptance for any risks that cannot be further reduced

Risk Assessment Process

CIS RAM Risk Assessment Activities: Five key activities that comprise the CIS RAM risk assessment.

1

Develop Impact Criteria

Create organization-specific criteria for measuring the impact of security incidents across four dimensions.

Mission

Impact on the organization's ability to fulfill its primary mission or purpose. For commercial entities, this is the ability to deliver products/services. For government, this is the ability to serve constituents.

IG1 Scale (1-3)
Score Label Description
1 Low Minor disruption to mission; easily recoverable within normal operations
2 Moderate Noticeable disruption to mission; requires dedicated effort to recover
3 High Severe disruption to mission; may threaten organizational viability
IG2/IG3 Scale (1-5)
Score Label Description
1 Negligible No meaningful impact on mission delivery
2 Low Minor, short-term disruption to some mission functions
3 Moderate Significant disruption to mission functions; recovery requires days
4 High Major disruption to most mission functions; recovery requires weeks
5 Critical Complete loss of mission capability; may threaten organizational survival

Operational Objectives

Impact on day-to-day business operations, productivity, and service delivery. This includes internal operations, customer-facing services, and supply chain interactions.

IG1 Scale (1-3)
Score Label Description
1 Low Operations continue with minor inconvenience
2 Moderate Operations degraded; workarounds needed for days
3 High Operations halted or severely degraded for extended period
IG2/IG3 Scale (1-5)
Score Label Description
1 Negligible No impact on operations
2 Low Minor operational disruption; resolved within hours
3 Moderate Noticeable operational impact; resolved within days
4 High Major operational disruption; resolved within weeks
5 Critical Complete operational failure; extended recovery timeline

Financial Objectives

Direct and indirect financial impact including revenue loss, remediation costs, legal fees, regulatory fines, and reputational damage leading to customer loss.

IG1 Scale (1-3)
Score Label Description
1 Low Financial impact easily absorbed; less than 1% of annual revenue
2 Moderate Significant financial impact; 1-5% of annual revenue
3 High Severe financial impact; greater than 5% of annual revenue or threatening solvency
IG2/IG3 Scale (1-5)
Score Label Description
1 Negligible Minimal financial impact; within normal operating variance
2 Low Minor financial impact; less than 1% of annual revenue
3 Moderate Material financial impact; 1-3% of annual revenue
4 High Major financial impact; 3-10% of annual revenue
5 Critical Existential financial impact; greater than 10% of annual revenue

Obligations

Impact on regulatory compliance, contractual commitments, legal obligations, and duty of care responsibilities. Includes obligations to customers, partners, regulators, and the public.

IG1 Scale (1-3)
Score Label Description
1 Low Minor compliance gap; self-reported with minimal consequence
2 Moderate Regulatory notice or contractual breach; fines or penalties likely
3 High Major regulatory action, litigation, or loss of operating authority
IG2/IG3 Scale (1-5)
Score Label Description
1 Negligible No compliance impact
2 Low Minor compliance gap; correctable through self-reporting
3 Moderate Regulatory inquiry or audit finding; fines possible
4 High Formal regulatory action; significant fines or sanctions
5 Critical Loss of license, criminal liability, or class-action litigation
2

Estimate Inherent Risk Criteria

Determine the likelihood and impact of threats when no CIS Controls safeguards are in place.

CIS RAM uses the VERIS Community Database (VCDB) Index as a reference point for estimating the likelihood that a threat will exploit an unprotected system. The VCDB contains thousands of real-world security incidents, providing an empirical basis for likelihood estimation.

Expectancy Calculation

Expectancy represents the likelihood that a threat event will occur. It is derived from two factors: the VCDB Index (frequency of similar incidents in the real world) and the Maturity Score (the organization's current implementation maturity for the relevant safeguard).

Expectancy = VCDB_Index_Score adjusted by Maturity_Score

IG1 VCDB Index Scores
Score Label Description
1 Low Incident type rarely seen in VCDB for similar organizations
2 Moderate Incident type occasionally seen in VCDB for similar organizations
3 High Incident type frequently seen in VCDB for similar organizations
IG2/IG3 VCDB Index Scores
Score Label Description
1 Very Low Less than 1% of VCDB incidents for similar organizations
2 Low 1-10% of VCDB incidents for similar organizations
3 Moderate 10-30% of VCDB incidents for similar organizations
4 High 30-60% of VCDB incidents for similar organizations
5 Very High Greater than 60% of VCDB incidents for similar organizations
3

Evaluate Risks

Calculate risk scores by combining expectancy and impact, then classify risks by severity level.

Risk Score = Expectancy x Highest Impact Score (across all four dimensions)

IG1 Risk Matrix (3x3)

Expectancy \ Impact 1 (Low) 2 (Moderate) 3 (High)
1 (Low) 1 2 3
2 (Moderate) 2 4 6
3 (High) 3 6 9
1-2: Acceptable
3-4: Unacceptable
6-9: High

IG2/IG3 Risk Matrix (5x5)

Expectancy \ Impact 1 2 3 4 5
1 1 2 3 4 5
2 2 4 6 8 10
3 3 6 9 12 15
4 4 8 12 16 20
5 5 10 15 20 25
1-4: Acceptable
5-9: Unacceptable
10-25: High
4

Recommend Safeguards

For each unacceptable or high risk, recommend specific CIS Controls safeguards that would reduce the risk to an acceptable level. Safeguard selection should consider the organization's IG level, existing capabilities, and implementation feasibility.

  • Start with the safeguards in the organization's target IG level
  • Prioritize safeguards that address the highest risks first
  • Consider safeguard dependencies (some safeguards build on others)
  • Evaluate whether partial implementation provides meaningful risk reduction
  • Document the expected risk reduction for each recommended safeguard
5

Evaluate Recommended Safeguards

Assess whether the recommended safeguards themselves create unacceptable burden or risk (Safeguard Risk). This implements CIS RAM Principle 3: safeguards must not be more burdensome than the risks they protect against.

Safeguard Risk Factors

Financial Cost

Total cost of ownership including procurement, deployment, training, and ongoing maintenance

Operational Impact

Effect on productivity, user experience, workflow efficiency, and business agility

Technical Complexity

Implementation difficulty, integration challenges, and ongoing technical maintenance burden

Organizational Change

Required changes to processes, culture, staffing, and organizational structure

New Vulnerabilities

Whether the safeguard itself introduces new attack surfaces or failure modes

Threats & Vulnerabilities by Control

CIS RAM risk assessments require identifying threats and vulnerabilities for each control. Below is an aggregated summary of threats and vulnerabilities across all safeguards for each of the 18 CIS Controls. Click individual safeguards for safeguard-specific threats and tool recommendations.

Threat Scenarios

Shadow IT Asset Exploitation Confidentiality

Attackers compromise untracked devices connected to the network that are invisible to security tooling, using them as persistent footholds for lateral movement.

Incomplete Patch Coverage Due to Unknown Assets Availability

Critical vulnerabilities remain unpatched on devices not included in the asset inventory, allowing ransomware or worms to propagate through unmanaged endpoints.

Regulatory Non-Compliance from Untracked Data Stores Confidentiality

Sensitive data resides on assets not captured in the inventory, leading to unprotected PII/PHI exposure during a breach and regulatory penalties.

Rogue Device Network Infiltration Confidentiality

An attacker or insider connects an unauthorized device (e.g., rogue wireless AP, USB-tethered device) to the corporate network to intercept traffic or establish a backdoor.

Compromised IoT Device Persistence Integrity

Unauthorized IoT devices with default credentials remain on the network indefinitely, providing persistent attack vectors that bypass endpoint security controls.

BYOD Malware Introduction Availability

Unmanaged personal devices infected with malware connect to the enterprise network without quarantine or review, spreading infections to production systems.

Undetected Compromised Host on Network Confidentiality

Without active scanning, attacker-controlled devices or compromised hosts remain invisible on the network, enabling long-term data exfiltration campaigns.

Network Segmentation Bypass via Undiscovered Assets Integrity

Assets that bridge network segments but are not discovered by active tools allow attackers to pivot between zones that should be isolated.

...and 4 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Centralized Asset Visibility

Without a detailed asset inventory, the organization cannot determine the full scope of devices storing or processing data, leaving blind spots in security coverage.

Stale or Inaccurate Asset Records

Absence of a maintained inventory means decommissioned, relocated, or repurposed assets are not tracked, creating inconsistencies between assumed and actual network state.

Inability to Scope Incident Response

When a breach occurs, responders cannot quickly identify all potentially affected assets, extending dwell time and increasing the blast radius of incidents.

No Process to Quarantine or Remove Unauthorized Assets

Without a defined process for addressing unauthorized assets, rogue devices persist on the network indefinitely with no accountability or remediation timeline.

Delayed Response to Network Intrusions

The absence of a weekly review cycle for unauthorized assets means malicious or non-compliant devices can operate undetected for extended periods.

No Automated Network Asset Discovery

Relying solely on manual inventory processes means new or transient devices connected to the network are not detected in a timely manner.

Infrequent Discovery Scanning

Without daily active discovery scans, the gap between a device connecting to the network and its detection grows, increasing the window for unauthorized activity.

No DHCP Log Correlation with Asset Inventory

Without DHCP logging feeding the asset inventory, dynamically addressed devices are not tracked, creating gaps in visibility for devices that come and go.

...and 3 more. See individual safeguards for complete list.

Threat Scenarios

Supply Chain Compromise via Untracked Software Integrity

Malicious or backdoored software installed without inventory tracking evades security review, enabling supply chain attacks like those seen in SolarWinds-type compromises.

License Compliance Exploitation Confidentiality

Unlicensed or pirated software installed outside inventory controls introduces trojanized versions or cracks that contain embedded malware and credential stealers.

Abandoned Software as Attack Surface Integrity

Applications installed for past projects but never inventoried remain on systems with known vulnerabilities, providing easy exploitation targets for attackers.

Exploitation of End-of-Life Software Vulnerabilities Integrity

Unsupported software no longer receives security patches, allowing attackers to exploit publicly disclosed CVEs with readily available exploit code.

Zero-Day Persistence in Legacy Applications Confidentiality

Unsupported applications with zero-day vulnerabilities will never be patched by the vendor, giving attackers permanent exploitation capabilities against those systems.

Malware Masquerading as Legitimate Applications Confidentiality

Unauthorized software including remote access trojans, cryptominers, or backdoors persists on endpoints because no process exists to identify and remove them.

Shadow SaaS Data Leakage Confidentiality

Employees install unauthorized cloud sync clients or SaaS tools that exfiltrate corporate data to unmanaged cloud storage outside organizational visibility.

Undetected Software Installation by Threat Actors Confidentiality

Attackers install persistence tools, keyloggers, or lateral movement utilities that go undetected because no automated tooling monitors for new software installations.

...and 9 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Centralized Software Inventory

Without a maintained software inventory, the organization cannot determine what applications are installed across endpoints, leaving unknown software unpatched and unmonitored.

Inability to Verify Software Legitimacy

Without records of publisher, version, and business purpose, the organization cannot distinguish authorized software from unauthorized or malicious installations.

Unsupported Software in Production Without Mitigating Controls

Running end-of-life software without documented exceptions and compensating controls leaves known vulnerabilities permanently unaddressed in the environment.

No Tracking of Software Support Lifecycle

Without monitoring vendor support status, the organization is unaware when critical software transitions to end-of-life, continuing to rely on it without risk acceptance.

No Remediation Process for Unauthorized Software

Without a process to remove or exception unauthorized software, non-compliant and potentially malicious applications accumulate across the enterprise unchecked.

Lack of Regular Software Compliance Reviews

Unauthorized software is never flagged because no regular review cycle compares installed applications against the approved software inventory.

Manual-Only Software Discovery

Relying on manual processes to track installed software across the enterprise is error-prone and cannot scale, resulting in chronically incomplete and outdated inventories.

No Real-Time Visibility into Software Changes

Without automated inventory tools, there is no mechanism to detect when new software is installed or existing software is modified between manual audit cycles.

...and 6 more. See individual safeguards for complete list.

Threat Scenarios

Uncontrolled Sensitive Data Sprawl Confidentiality

Without a data management process, sensitive data proliferates across uncontrolled locations including personal drives, shadow IT services, and unsecured file shares.

Regulatory Violation from Undefined Data Handling Confidentiality

Absence of defined data sensitivity levels and handling requirements leads to GDPR, HIPAA, or PCI DSS violations when regulated data is processed without appropriate safeguards.

Data Hoarding Leading to Increased Breach Impact Confidentiality

Without data retention and disposal requirements, organizations retain data indefinitely, massively increasing the volume and sensitivity of data exposed during a breach.

Unknown Data Exposure During Breach Confidentiality

Without a data inventory, the organization cannot determine what sensitive data was exposed in a breach, leading to delayed notifications and underestimated impact assessments.

Orphaned Sensitive Data in Decommissioned Systems Confidentiality

Sensitive data on systems being decommissioned or migrated is not properly handled because no inventory tracks where sensitive data resides.

Unauthorized Data Access by Overprivileged Users Confidentiality

Users with excessive file system, database, or application permissions access sensitive data beyond their need-to-know, increasing insider threat risk and breach blast radius.

Lateral Movement via Open File Shares Confidentiality

Attackers who compromise a single user account gain access to broadly shared file systems and databases lacking access control lists, enabling rapid data harvesting.

Data Tampering by Unauthorized Parties Integrity

Without proper access control lists, unauthorized users or compromised accounts can modify critical business data, financial records, or configuration files.

...and 24 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Formal Data Management Process

Without established data management procedures, there are no consistent rules for how data is classified, handled, retained, or disposed of across the enterprise.

Undefined Data Ownership and Accountability

The absence of designated data owners means no one is accountable for ensuring sensitive data receives appropriate protection throughout its lifecycle.

No Inventory of Sensitive Data Locations

Without a data inventory, the organization does not know where sensitive data is stored, processed, or transmitted, making it impossible to apply appropriate protections.

Inability to Scope Data Protection Controls

Security controls like encryption, access restrictions, and monitoring cannot be properly targeted without knowing which assets contain sensitive data.

Overly Permissive Data Access Permissions

Without need-to-know-based access control lists, data repositories default to broad access, granting users permissions far exceeding their role requirements.

Inconsistent Access Controls Across Data Stores

Without a policy-driven ACL configuration, access permissions vary inconsistently across file systems, databases, and applications with no unified enforcement.

No Defined Data Retention Timelines

Without minimum and maximum retention periods, data accumulates indefinitely, expanding the attack surface and increasing regulatory exposure.

No Automated Enforcement of Retention Policies

Without enforced retention schedules, data deletion depends on individual judgment, leading to inconsistent practices and perpetual data hoarding.

...and 20 more. See individual safeguards for complete list.

Threat Scenarios

Exploitation of Default or Weak System Configurations Integrity

Attackers exploit out-of-box default configurations including open ports, unnecessary services, and weak security settings that were never hardened according to a secure baseline.

Configuration Drift Enabling Attack Vectors Confidentiality

Over time, systems drift from secure configurations through ad-hoc changes, reintroducing vulnerabilities that were previously mitigated and creating inconsistent security postures.

Ransomware Exploiting Unhardened Systems Availability

Ransomware propagates rapidly through systems lacking hardened configurations, exploiting enabled-by-default protocols like SMBv1 and unnecessary remote access services.

Network Device Compromise via Default Credentials Confidentiality

Attackers gain administrative access to routers, switches, and firewalls using well-known default credentials or SNMP community strings that were never changed from vendor defaults.

Router/Switch Misconfiguration Enabling Traffic Interception Confidentiality

Network devices configured without security hardening allow traffic mirroring, unauthorized VLAN access, or routing manipulation enabling man-in-the-middle attacks.

Unauthorized Physical Access to Unlocked Workstation Confidentiality

An attacker or malicious insider accesses sensitive data, installs malware, or executes commands on an unattended workstation that never locked due to missing auto-lock configuration.

Shoulder Surfing and Session Hijacking Confidentiality

In shared office spaces or public locations, unlocked idle sessions expose sensitive data on screen and allow passersby to interact with authenticated application sessions.

Lateral Movement Through Unprotected Server Ports Confidentiality

Attackers who compromise one server move laterally to others through open ports and services that a host-based firewall would have blocked, escalating the breach scope.

...and 19 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Defined Secure Configuration Baseline

Without a documented secure configuration process, systems are deployed with vendor defaults that prioritize ease of use over security, leaving known attack surfaces exposed.

No Configuration Review or Update Cadence

Without annual review of secure configuration standards, baselines become outdated as new attack techniques emerge and vendor recommendations change.

Unhardened Network Infrastructure Devices

Without a secure configuration process for network devices, routers, switches, and firewalls run with default settings that expose management interfaces and unnecessary services.

No Compliance Verification Against Network Hardening Standards

Without documented configuration processes referencing standards like CIS Benchmarks or DISA STIGs, there is no way to verify network devices meet security requirements.

No Automatic Session Locking on Idle Devices

Without configured automatic session locking, unattended devices remain logged in indefinitely, granting physical access equal to authenticated user access.

Inconsistent Lock Timeout Across Device Types

Without standardized lock policies, some devices lock after minutes while others never lock, creating inconsistent protection that users cannot rely on.

No Host-Based Firewall on Servers

Without server firewalls, all network-accessible services on the server are exposed to any device that can route to it, relying entirely on perimeter controls.

Servers Accessible on All Ports from Internal Network

Absence of host-based firewalls means internal network compromise provides unrestricted access to all server services, negating defense-in-depth strategies.

...and 16 more. See individual safeguards for complete list.

Threat Scenarios

Orphaned Account Abuse by Former Employees Confidentiality

Former employees, contractors, or third parties retain active accounts that are not tracked in an inventory, using them to access systems and data after their authorization has ended.

Privilege Accumulation in Untracked Accounts Confidentiality

Accounts not tracked in an inventory accumulate permissions over time through role changes without review, creating over-privileged accounts that represent high-value targets.

Compromised Shared Account Without Attribution Integrity

Shared or generic accounts not captured in the inventory are compromised, and investigations cannot attribute actions to a specific individual due to lack of account tracking.

Credential Stuffing Attacks Using Breached Passwords Confidentiality

Attackers use credentials leaked from third-party breaches to access enterprise accounts where employees reused the same password across personal and work systems.

Password Spraying with Common Weak Passwords Confidentiality

Attackers perform password spraying attacks using common passwords like 'Spring2026!' that meet basic complexity rules but are predictable, compromising multiple accounts simultaneously.

Offline Password Cracking of Stolen Hashes Confidentiality

Attackers who obtain password hashes crack short or simple passwords rapidly using GPU-accelerated brute force or rainbow tables, gaining access to accounts with weak passwords.

Dormant Account Takeover by External Attackers Confidentiality

Attackers compromise dormant accounts through credential stuffing or phishing, using them for persistent access since inactive accounts are rarely monitored for suspicious activity.

Former Contractor Access via Inactive Account Confidentiality

A former contractor's account remains active and unmonitored for months after contract end, providing an entry point if the contractor turns hostile or their credentials are leaked.

...and 7 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Centralized Account Inventory

Without a maintained inventory of all accounts, the organization cannot determine how many accounts exist, who owns them, or whether they are all still authorized.

No Recurring Account Authorization Validation

Without quarterly reviews against the account inventory, unauthorized or orphaned accounts persist indefinitely without detection or remediation.

Weak or Reused Passwords Across Enterprise Accounts

Without unique password requirements and minimum length enforcement, users choose weak, predictable, or previously compromised passwords that are easily guessed or cracked.

No Password Policy Enforcement Mechanism

Without technical controls enforcing password length and uniqueness requirements, users default to the shortest, simplest, most memorable passwords possible.

Dormant Accounts Remain Active Indefinitely

Without automatic disabling after 45 days of inactivity, dormant accounts from departed users, completed projects, or seasonal workers persist as latent access vectors.

No Automated Inactivity Detection for Accounts

Without automated monitoring of account login activity, the organization cannot identify which accounts are dormant and should be disabled or reviewed.

Administrative Privileges Used for Daily Activities

Administrators using their privileged accounts for email, browsing, and general work expose their elevated credentials to phishing, malware, and credential theft attacks.

No Separation Between Admin and Standard User Accounts

Without dedicated admin accounts separate from daily-use accounts, compromise of any admin user's session immediately grants the attacker full administrative access.

...and 4 more. See individual safeguards for complete list.

Threat Scenarios

Excessive Access Granted to New Hires Confidentiality

Without a formal granting process, new employees receive access by cloning another user's permissions, inheriting unnecessary privileges accumulated through that user's role changes.

Unauthorized Access During Role Transitions Confidentiality

Users changing roles accumulate access from both old and new positions because no structured process ensures previous access is reviewed when new access is granted.

Terminated Employee Retains System Access Confidentiality

A terminated employee retains access to enterprise systems for days or weeks after departure because no revocation process exists, enabling data theft or sabotage out of retaliation.

Contractor Access Persists After Engagement Ends Confidentiality

Third-party contractor accounts remain active indefinitely after their engagement ends because no revocation process triggers deprovisioning when the business relationship terminates.

Privilege Accumulation Without Revocation on Role Change Integrity

Users who change departments or roles retain their previous access in addition to new role permissions, gradually accumulating excessive privileges across the enterprise.

Credential Stuffing Against External Applications Confidentiality

Attackers use leaked credential databases to perform automated login attempts against externally-exposed applications that rely solely on passwords without MFA.

Phished Credentials Used to Access External Portals Confidentiality

An employee's credentials stolen through a phishing campaign provide immediate access to externally-exposed applications because no second factor is required for authentication.

Brute-Force Attack on Internet-Facing Login Portal Availability

Attackers perform sustained brute-force attacks against internet-facing login pages where single-factor authentication allows unlimited credential guessing at scale.

...and 11 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Formal Access Granting Process

Without a defined process for granting access, provisioning decisions are ad-hoc, inconsistent, and not tied to verified business need, leading to over-provisioning.

No Approval Workflow for Access Requests

Without a structured approval process, access is granted based on informal requests without management authorization or documentation of the business justification.

No Formal Access Revocation Process

Without a defined process for revoking access upon termination or role change, accounts remain active and privileged long after the user's authorization has ended.

No Integration Between HR and IT for Deprovisioning

Without automated or procedural links between HR termination events and IT account deprovisioning, there is no trigger to disable accounts when users leave the organization.

Single-Factor Authentication on External Applications

Externally-exposed applications protected only by passwords are vulnerable to credential theft, stuffing, spraying, and brute-force attacks from anywhere on the internet.

No MFA Enforcement for Third-Party SaaS Applications

Third-party applications used by the enterprise lack MFA requirements, meaning a compromised password grants full access to potentially sensitive cloud-hosted data.

No MFA for Remote Network Access

Remote access connections (VPN, remote desktop gateway) protected only by passwords can be compromised by any attacker who obtains or guesses valid credentials.

Remote Access as Single Point of Failure

Without MFA, the VPN or remote access gateway becomes a single-password-away entry point to the entire internal network from anywhere on the internet.

...and 8 more. See individual safeguards for complete list.

Threat Scenarios

Ad-Hoc Vulnerability Response Leading to Missed Critical CVEs Confidentiality

Without a documented vulnerability management process, critical vulnerabilities like Log4Shell or MOVEit are addressed inconsistently, with some teams patching immediately while others remain exposed for months.

Inconsistent Vulnerability Prioritization Enabling Exploitation Integrity

Absence of a formal process means vulnerabilities are triaged based on individual judgment rather than risk-based criteria, allowing high-severity vulnerabilities in internet-facing assets to persist while low-risk internal issues consume remediation resources.

Regulatory Non-Compliance from Undocumented Vulnerability Handling Availability

Auditors and regulators find no evidence of a structured vulnerability management program, resulting in compliance failures and potential fines under frameworks like PCI DSS or HIPAA that mandate documented vulnerability management.

Exploitation of Vulnerabilities with No Remediation SLA Confidentiality

Attackers exploit known vulnerabilities that persist for months because no risk-based remediation timeline exists, allowing threat actors to weaponize public exploits long before patches are applied.

Patch Rollback Attacks Due to Untested Remediation Availability

Without a structured remediation process, hastily applied patches cause system instability and are rolled back, re-exposing the vulnerability while the organization scrambles for a stable fix.

Exception Abuse from Unmanaged Remediation Deferrals Integrity

Vulnerabilities are permanently deferred without documented risk acceptance or compensating controls, creating a growing backlog of unpatched systems that accumulate exploitable weaknesses over time.

Mass Exploitation of Unpatched Operating Systems Availability

Threat actors leverage automated scanning tools to identify enterprise systems running unpatched operating systems and deploy ransomware or cryptominers through known OS-level vulnerabilities like EternalBlue or PrintNightmare.

Wormable OS Vulnerability Propagation Availability

A wormable vulnerability in an unpatched operating system allows malware to propagate laterally across the network without user interaction, as seen with WannaCry and NotPetya, because automated OS patching is not in place.

...and 13 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Defined Vulnerability Management Policy or Procedures

The organization has no written policy defining vulnerability identification, assessment, and remediation responsibilities, leaving each team to handle vulnerabilities independently with no accountability.

Undefined Roles and Responsibilities for Vulnerability Handling

Without a documented process, there is no clear ownership of vulnerability scanning, triage, remediation, or exception approval, causing critical vulnerabilities to fall through the cracks between IT and security teams.

No Vulnerability Severity Classification Framework

The organization lacks a standardized severity classification scheme (such as CVSS-based thresholds) for prioritizing vulnerability remediation, resulting in inconsistent treatment of similar risks across business units.

No Risk-Based Remediation Timelines

The organization has no defined SLAs linking vulnerability severity to remediation deadlines (e.g., critical within 48 hours, high within 14 days), allowing dangerous vulnerabilities to remain open indefinitely.

No Formal Exception or Risk Acceptance Process

When vulnerabilities cannot be immediately remediated, there is no process for documenting exceptions, compensating controls, or risk acceptance decisions, leaving unpatched systems without any mitigating oversight.

Manual or Ad-Hoc OS Patching Process

Operating system patches are applied manually or on an irregular schedule, resulting in significant patch lag where critical OS updates may not be deployed for weeks or months after release.

No Centralized Patch Management Platform for OS Updates

The organization lacks a centralized tool (such as WSUS, SCCM, or Jamf) to automate OS patch distribution and verification, making it impossible to ensure consistent patch levels across all enterprise assets.

Inconsistent Patch Coverage Across OS Platforms

Automated patching may cover Windows endpoints but miss Linux servers, macOS devices, or specialized operating systems, leaving significant portions of the fleet running vulnerable OS versions.

...and 9 more. See individual safeguards for complete list.

Threat Scenarios

Undetected Persistent Threats Due to Inconsistent Logging Confidentiality

Advanced persistent threat actors operate undetected for months because the organization has no standardized logging requirements, leaving critical assets without the audit trails needed to identify malicious activity.

Failed Incident Investigation from Incomplete Log Coverage Integrity

When a breach is discovered, incident responders cannot determine the scope, root cause, or timeline because the audit log management process was never defined, resulting in inconsistent and incomplete log collection across systems.

Regulatory Penalties for Inadequate Audit Logging Program Availability

Regulatory audits reveal that the organization has no formal audit log management process, resulting in compliance violations under SOX, HIPAA, PCI DSS, or GDPR that require documented logging standards and retention policies.

Blind Spots Enabling Undetected Compromise Confidentiality

Attackers specifically target assets where audit logging is disabled or not collected, knowing their activities will leave no forensic trail, enabling prolonged dwell times and undetected data exfiltration.

Tampering Without Evidence on Unlogged Systems Integrity

Malicious insiders or external attackers modify critical data, configurations, or access controls on systems where audit logs are not collected, making it impossible to detect or attribute unauthorized changes.

Anti-Forensics Exploitation of Logging Gaps Confidentiality

Sophisticated attackers route their activities through assets without log collection, using these blind spots as staging areas for lateral movement and data staging while remaining invisible to security monitoring.

Log Data Loss from Storage Exhaustion Integrity

Critical audit log data is silently overwritten or discarded when logging destinations run out of storage, destroying evidence of ongoing attacks or compliance-required records during the exact periods when they are most needed.

Denial of Logging via Storage Flooding Attack Availability

Attackers intentionally generate massive volumes of log entries to exhaust available storage, causing legitimate audit events to be dropped and creating a window of unmonitored activity for their actual malicious operations.

...and 24 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Documented Logging Policy Defining Collection Requirements

The organization lacks a formal policy specifying which assets must generate logs, what events must be captured, how logs are reviewed, and how long they are retained, resulting in ad-hoc logging that varies widely across systems.

Undefined Log Review Responsibilities and Procedures

Without a documented audit log management process, no one is responsible for reviewing logs, and no procedures exist for escalating suspicious findings, allowing malicious activity captured in logs to go unnoticed.

Audit Logging Disabled on Critical Enterprise Assets

Key servers, databases, network devices, and cloud services have audit logging disabled by default or intentionally turned off to conserve resources, creating forensic blind spots across the infrastructure.

Inconsistent Log Collection Across Asset Types

Logging is enabled on some asset categories (e.g., domain controllers) but not others (e.g., Linux servers, network appliances, SaaS applications), leaving significant portions of the environment without audit trails.

No Storage Capacity Monitoring for Log Destinations

Log storage volumes are not monitored for capacity, and no alerts fire when storage approaches capacity thresholds, resulting in silent log loss when disks fill up during high-activity periods or attacks.

Undersized Log Storage Without Retention Alignment

Log storage capacity is insufficient to retain logs for the period defined by the organization's retention policy, forcing either premature log deletion or logging failures that compromise both compliance and forensic capability.

No Standardized NTP Configuration Across Enterprise Assets

Enterprise assets use different or no NTP servers, causing clock drift between systems that degrades the accuracy and reliability of time-stamped audit log entries used for correlation and forensic analysis.

Single NTP Source with No Redundancy

Assets are configured with only one time source, and if that source becomes unavailable or compromised, clocks drift without detection, degrading the integrity of all time-dependent security operations.

...and 16 more. See individual safeguards for complete list.

Threat Scenarios

Browser-Based Exploit Kit Delivery Confidentiality

Outdated or unsupported browsers contain known vulnerabilities that exploit kits target to deliver malware through malicious advertisements, compromised websites, or watering hole attacks without requiring any user interaction beyond visiting a page.

Email Client Vulnerability Exploitation for Initial Access Integrity

Unsupported email clients with known rendering or parsing vulnerabilities are exploited to execute malicious code when users preview or open specially crafted emails, bypassing attachment-based security controls.

Session Hijacking via Outdated Browser TLS Implementation Confidentiality

Outdated browsers supporting deprecated TLS versions or weak cipher suites allow man-in-the-middle attackers to intercept and decrypt sensitive web sessions, including banking, email, and enterprise application traffic.

Malware Callback to Known Command-and-Control Domains Confidentiality

Malware on enterprise assets communicates with known malicious domains for command-and-control instructions, payload downloads, and data exfiltration, and without DNS filtering these connections succeed unimpeded.

Phishing Domain Access Leading to Credential Theft Confidentiality

Users click phishing links that resolve to known malicious domains mimicking legitimate login pages, and without DNS-level blocking these domains are freely accessible, enabling credential harvesting at scale.

Cryptojacking and Malvertising Domain Connections Availability

Enterprise assets connect to domains hosting cryptomining scripts or malicious advertisements that deliver drive-by downloads, consuming resources and potentially installing malware because no DNS filtering blocks these known threats.

Drive-By Download from Compromised Legitimate Websites Integrity

Users visit legitimate but compromised websites that redirect to malicious URLs hosting exploit kits, and without network-based URL filtering these malicious redirects succeed in delivering malware payloads.

Credential Harvesting via Category-Spoofed Phishing Sites Confidentiality

Sophisticated phishing campaigns use newly created domains that mimic corporate login portals, and without URL reputation filtering and category-based blocking these sites are accessible to all enterprise users.

...and 13 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

Unsupported Browser Versions in Production Use

Enterprise assets run end-of-life browser versions that no longer receive security patches from vendors, accumulating exploitable vulnerabilities with each new disclosure while remaining the primary interface to web applications.

No Browser Version Enforcement Policy

The organization has no technical controls (GPO, MDM, or configuration management) to enforce minimum browser versions or prevent the use of unsupported browsers, allowing users to operate with dangerously outdated software.

No DNS Filtering Service Deployed

Enterprise assets resolve DNS queries without any filtering, allowing connections to known malicious domains, phishing infrastructure, and threat actor command-and-control servers without any prevention or alerting.

DNS Filtering Bypass via Direct IP or External DNS

Even where DNS filtering exists, endpoints can bypass it by using hardcoded IP addresses or external DNS resolvers (DoH, DoT) that are not blocked at the network perimeter, negating the protection.

No Network-Based URL Filtering or Secure Web Gateway

The organization does not enforce URL filtering at the network level, allowing enterprise assets to connect to any website regardless of its reputation, category, or known threat status.

URL Filter Policies Not Updated with Current Threat Intelligence

URL filtering exists but block lists and category databases are not regularly updated with current threat intelligence, allowing recently identified malicious URLs to bypass filtering controls.

No Browser Extension Allowlist or Restriction Policy

Users can install any browser extension without restriction, including extensions requesting permissions to read all website data, modify pages, and access authentication cookies across all domains.

Unmanaged Email Client Add-Ons and Plugins

Email client plugins and add-ons are not restricted through group policy or configuration management, allowing users to install unvetted third-party extensions that can access all email content and attachments.

...and 6 more. See individual safeguards for complete list.

Threat Scenarios

Commodity Malware Infection Across Unprotected Endpoints Availability

Without anti-malware software deployed, enterprise assets are vulnerable to commodity malware including ransomware, banking trojans, information stealers, and cryptominers that are routinely blocked by even basic AV solutions.

Ransomware Encryption of Enterprise Data Availability

Ransomware variants like LockBit, BlackCat, or Cl0p execute and encrypt data on systems without anti-malware protection, causing operational disruption and potential data loss because no software exists to detect or prevent the encryption process.

Information Stealer Deployment for Credential Harvesting Confidentiality

Information-stealing malware (RedLine, Raccoon, Vidar) executes on unprotected endpoints, harvesting saved browser credentials, session cookies, cryptocurrency wallets, and VPN configurations for sale on dark web marketplaces.

Newly Released Malware Evading Outdated Signatures Integrity

Anti-malware software with stale signature databases fails to detect recently released malware variants that would be caught by current signatures, leaving endpoints vulnerable to threats that are days or weeks old.

Ransomware Variant Bypassing Outdated Detection Rules Availability

New ransomware variants released after the last signature update execute freely on endpoints with stale definitions, encrypting files before the anti-malware engine recognizes the threat pattern.

USB-Based Malware Auto-Execution Integrity

Malware-laden USB devices automatically execute malicious payloads when inserted into systems with autorun enabled, a technique used in targeted attacks (Stuxnet-style) and opportunistic campaigns where infected USB drives are distributed in public areas.

Removable Media Worm Propagation Availability

Self-propagating worms spread across the enterprise via removable media by leveraging autorun functionality to copy themselves to every USB device inserted, then executing automatically on each new system the device connects to.

Social Engineering via Dropped USB Devices Confidentiality

Attackers deliberately leave infected USB drives in parking lots, lobbies, or conference rooms, and autorun functionality causes malicious payloads to execute immediately when curious employees insert the devices into their workstations.

...and 11 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Anti-Malware Software Deployed on Enterprise Assets

Some or all enterprise assets lack anti-malware software, providing no automated defense against known malware families, exploit payloads, or malicious scripts that endpoint protection would normally detect and block.

Inconsistent Anti-Malware Coverage Across Asset Types

Anti-malware is deployed on Windows workstations but not on servers, Linux systems, macOS devices, or virtual machines, leaving significant portions of the infrastructure without malware detection capabilities.

Manual or Infrequent Anti-Malware Signature Updates

Anti-malware signature updates are not configured for automatic delivery, relying on manual updates or infrequent scheduled checks that leave detection databases hours or days behind current threat intelligence.

Signature Update Failures Going Undetected

Automatic update mechanisms fail silently due to network issues, proxy misconfigurations, or expired licenses, and without monitoring for update success, endpoints operate with increasingly stale detection capabilities.

Autorun and Autoplay Enabled on Enterprise Assets

Windows autorun and autoplay features remain enabled at default settings, allowing removable media to automatically execute programs, scripts, or installers without requiring explicit user action beyond inserting the device.

No Group Policy Enforcement Disabling Auto-Execute

Group policies or configuration management tools have not been configured to disable autorun and autoplay across all enterprise assets, leaving systems vulnerable to automatic execution of removable media content.

No Automatic Removable Media Scanning Configured

Anti-malware software is not configured to automatically scan removable media upon connection, relying on users to manually initiate scans or waiting for scheduled scans that may not run before infected files are accessed.

Removable Media Scanning Excluded from AV Policy

Anti-malware policies specifically exclude removable media from real-time scanning due to performance concerns, allowing malicious files on USB devices to be copied to local storage without triggering detection.

...and 6 more. See individual safeguards for complete list.

Threat Scenarios

Ransomware Destroying Data with No Recovery Path Availability

Ransomware encrypts critical business data and the organization has no documented recovery process, recovery priorities, or tested procedures, resulting in chaotic response, extended downtime, and potential permanent data loss.

Extended Outage from Undefined Recovery Priorities Availability

A major incident destroys data across multiple systems, and without a documented recovery process defining which systems and data sets to restore first, teams waste time recovering low-priority systems while critical business operations remain offline.

Backup Data Compromise Due to Undefined Security Requirements Confidentiality

Backup data is stored without encryption or access controls because the recovery process documentation does not address backup security requirements, allowing attackers to access sensitive backup data or encrypt backup repositories.

Data Loss from System Failure Without Current Backups Availability

Hardware failures, storage corruption, or accidental deletion destroy critical data, and without automated backups running on a defined schedule the organization cannot restore to a recent state, resulting in permanent data loss.

Ransomware Recovery Failure Due to Stale Backups Availability

After a ransomware attack, the organization discovers that backups are weeks or months old because automated backup schedules were never configured, forcing a choice between paying the ransom or accepting significant data loss.

Business Continuity Failure from Manual Backup Neglect Availability

Manual backup processes are skipped during busy periods, staff transitions, or organizational changes, creating gaps in backup coverage that are only discovered when data recovery is needed during an incident.

Ransomware Encrypting Unprotected Backup Repositories Availability

Ransomware operators specifically target backup systems and encrypt or delete backup data that is stored without adequate protection, eliminating the organization's ability to recover without paying the ransom.

Backup Data Breach Exposing Sensitive Information Confidentiality

Unencrypted backup media or repositories are accessed by unauthorized parties, exposing sensitive data including PII, financial records, and intellectual property that exists in an easily restorable format within the backup archives.

...and 7 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Documented Data Recovery Process

The organization has no written data recovery process defining recovery scope, priorities, responsible parties, or procedures, leaving data recovery dependent on ad-hoc individual knowledge during crisis situations.

Undefined Recovery Prioritization and RTO/RPO Targets

Without a documented recovery process, the organization has no defined Recovery Time Objectives (RTO) or Recovery Point Objectives (RPO) for different data classifications, preventing informed decisions about backup frequency and recovery sequencing.

No Automated Backup Schedule for Enterprise Assets

Critical enterprise data is not backed up on an automated schedule, relying on manual processes that are inconsistently followed, resulting in unpredictable backup currency and unknown recovery point capability.

Incomplete Backup Scope Missing Critical Data Stores

Automated backups cover some systems but miss critical databases, file shares, SaaS application data, or cloud workloads, leaving significant portions of enterprise data without any backup protection.

Backup Data Stored Without Encryption

Backup repositories and media are not encrypted, meaning anyone with access to the storage location can read all backed-up data, including sensitive information that is encrypted or access-controlled in production environments.

Backup Access Controls Weaker Than Production Data

Recovery data is stored with access controls that are less restrictive than those protecting the original data, allowing individuals who cannot access production data to freely access the same data through backup systems.

No Isolated or Off-Site Backup Instance

All backup data resides on the same network or in the same physical location as production systems, meaning any event that compromises the primary environment also threatens the only recovery copies.

Backup Systems Accessible from Production Network

Backup repositories are mounted as network shares or accessible via standard network protocols from production systems, allowing ransomware, attackers, or compromised accounts to reach and destroy backup data.

...and 2 more. See individual safeguards for complete list.

Threat Scenarios

Exploitation of Unpatched Network Device Firmware Confidentiality

Attackers exploit known vulnerabilities in outdated router, switch, and firewall firmware (such as CVEs in Cisco IOS, Fortinet FortiOS, or Palo Alto PAN-OS) to gain control of network infrastructure and intercept, redirect, or disrupt all traffic flowing through compromised devices.

Network Device Compromise via End-of-Life Software Integrity

Network infrastructure running end-of-life firmware that no longer receives security patches accumulates exploitable vulnerabilities, and attackers who compromise these devices gain persistent network-level access that is difficult to detect and remediate.

Service Disruption from Unsupported Network Equipment Failure Availability

Network devices running unsupported software experience stability issues and crashes that cannot be resolved because vendor support has ended, causing unpredictable network outages that affect business operations.

Lateral Movement Through Flat Network Architecture Confidentiality

Attackers who compromise a single endpoint move freely across the entire network because no segmentation exists, accessing databases, file servers, and critical systems that should be isolated from general user traffic.

Widespread Ransomware Propagation Across Unsegmented Network Availability

Ransomware spreads to every reachable system on the network because the lack of segmentation provides no barriers to propagation, turning a single-host infection into an enterprise-wide encryption event.

Privilege Escalation via Network Architecture Flaws Integrity

A network architecture that does not enforce least privilege allows users and systems to access network resources far beyond their operational needs, enabling attackers to reach high-value targets from any compromised entry point.

Network Device Compromise via Insecure Management Protocols Confidentiality

Attackers intercept network device management traffic using insecure protocols (Telnet, HTTP, SNMPv1/v2) to capture administrative credentials, then use those credentials to reconfigure devices, create backdoor access, or disrupt network services.

Unauthorized Network Configuration Changes via Uncontrolled Access Integrity

Network device configurations are modified without version control, change management, or audit trails, and unauthorized changes create security gaps such as opened firewall rules, disabled logging, or new route entries that redirect traffic.

...and 16 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

Outdated Network Device Firmware Without Update Schedule

Routers, switches, firewalls, and other network devices run firmware versions that are months or years behind current releases, containing known and publicly documented vulnerabilities with no scheduled update cadence.

No Network Infrastructure Software Version Tracking

The organization does not maintain an inventory of network device software versions or track them against vendor support timelines, making it impossible to identify devices running unsupported or vulnerable firmware.

Flat Network with No Segmentation

The network architecture provides no segmentation between user workstations, servers, databases, management interfaces, and critical infrastructure, allowing unrestricted lateral communication between all network zones.

No Network Architecture Based on Least Privilege

Network access rules do not enforce least privilege principles, allowing systems and users to communicate with any network resource rather than only those required for their specific business function.

Insecure Network Management Protocols in Use

Network devices are managed using unencrypted protocols (Telnet, HTTP, SNMPv1/v2c) that transmit credentials and configuration data in cleartext, allowing network-positioned attackers to intercept administrative access.

No Version Control or Change Management for Network Configurations

Network device configurations are not managed through version-controlled infrastructure-as-code or change management processes, making it impossible to detect unauthorized changes, roll back misconfigurations, or audit who changed what.

No Current Network Architecture Documentation

The organization has no up-to-date architecture diagrams showing network topology, segmentation boundaries, trust zones, data flows, and external connections, leaving security teams without the visibility needed for effective defense.

Architecture Diagrams Not Updated With Network Changes

Network architecture diagrams exist but are not updated when changes are made, rendering them inaccurate and potentially misleading for security analysis, compliance audits, and incident response activities.

...and 8 more. See individual safeguards for complete list.

Threat Scenarios

Undetected Lateral Movement Due to Siloed Log Analysis Confidentiality

An attacker compromises a single endpoint and moves laterally across the network undetected because security events from different sources are not correlated in a centralized platform.

Delayed Breach Detection from Fragmented Alert Sources Confidentiality

A data exfiltration campaign persists for months because firewall, endpoint, and authentication logs are reviewed independently rather than correlated, preventing analysts from connecting related indicators of compromise.

Alert Fatigue from Uncorrelated Security Events Availability

Analysts miss critical attack indicators buried across dozens of independent log sources, allowing ransomware operators to complete their kill chain before detection.

Fileless Malware Execution on Unmonitored Endpoints Confidentiality

An attacker deploys fileless malware using PowerShell or WMI that operates entirely in memory, evading network-level detection because no host-based intrusion detection solution is monitoring process behavior.

Insider Threat Data Harvesting on Endpoints Confidentiality

A malicious insider installs credential harvesting tools or keyloggers on their workstation, which go undetected without host-based intrusion detection monitoring local system activity.

Rootkit Persistence Without Host-Level Detection Integrity

An attacker installs a kernel-level rootkit that persists across reboots and hides malicious processes from standard OS tools, remaining invisible without a dedicated HIDS examining system integrity.

Command-and-Control Traffic Over Encrypted Channels Confidentiality

An attacker establishes encrypted C2 communications over HTTPS or DNS tunneling that bypass perimeter firewalls, remaining undetected because no network intrusion detection system is inspecting traffic patterns.

Network-Based Exploitation Traversing Unmonitored Segments Integrity

An attacker exploits a vulnerability in an internal service, and the exploit traffic crosses network segments without triggering any alert because no NIDS is deployed to analyze east-west traffic.

...and 25 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

Absence of Centralized Log Correlation

Without a SIEM or centralized alerting platform, related attack indicators across multiple systems cannot be correlated, resulting in fragmented visibility and missed detections.

Inconsistent Alerting Across Security Tools

Each security tool generates alerts independently with no unified triage process, creating blind spots where multi-stage attacks span tool boundaries without triggering a consolidated alert.

No Visibility into Host-Level Attack Indicators

Without host-based intrusion detection, suspicious process executions, file integrity changes, and registry modifications on individual endpoints go unmonitored, allowing attackers to operate freely post-compromise.

Inability to Detect Memory-Resident Threats

Absent HIDS capabilities, attacks that never touch disk such as in-memory exploits, living-off-the-land techniques, and process injection cannot be identified at the endpoint level.

No Network Traffic Anomaly Detection

Without a NIDS, malicious network traffic patterns such as port scans, exploit payloads, and beaconing behavior are not identified, leaving the network blind to active intrusions.

Unmonitored East-West Network Traffic

Internal network segments lack inspection capabilities, allowing attackers who have gained initial access to freely probe and exploit other systems within the environment.

Flat Network Architecture Without Segmentation Enforcement

Without traffic filtering between segments, all network zones can communicate freely, eliminating containment boundaries and allowing compromises to spread across the entire network.

No Access Control Between Trust Zones

Absence of inter-segment filtering means high-security zones like payment processing or database tiers are reachable from lower-trust zones such as guest Wi-Fi or general workstations.

...and 14 more. See individual safeguards for complete list.

Threat Scenarios

Enterprise-Wide Phishing Campaign Targeting Untrained Workforce Confidentiality

A sophisticated phishing campaign targets employees who have received no security awareness training, resulting in widespread credential compromise because staff cannot recognize social engineering tactics.

Accidental Insider Threat from Security-Unaware Employee Integrity

An employee unknowingly installs malware by clicking a malicious link or opens a weaponized attachment because they have never been educated on safe computing practices through a formal awareness program.

Social Engineering Attack Exploiting Lack of Security Culture Confidentiality

An attacker impersonates a vendor over the phone and convinces an employee to share system credentials, succeeding because no security awareness program has established a culture of verification and skepticism.

Spear-Phishing Attack with Credential Harvesting Payload Confidentiality

An attacker sends a targeted spear-phishing email mimicking an internal executive, and the recipient enters credentials on a fake login page because they were never trained to identify phishing indicators.

Business Email Compromise via Pretexting Integrity

An attacker impersonates a CEO via email and instructs finance staff to wire funds to a fraudulent account, succeeding because employees have not been trained to recognize pretexting and verify unusual requests.

Physical Tailgating into Secure Facility Confidentiality

An unauthorized person follows an employee through a badge-controlled door by carrying boxes and appearing to need help, gaining physical access because staff have not been trained on tailgating awareness.

Credential Stuffing Attack Using Reused Passwords Confidentiality

An attacker uses credentials leaked from a third-party breach to access enterprise accounts because employees were never trained on password uniqueness and the dangers of credential reuse across services.

MFA Bypass Through Social Engineering of Untrained User Confidentiality

An attacker tricks an employee into approving a fraudulent MFA push notification because the employee was never trained on how MFA fatigue attacks work or how to recognize unauthorized authentication requests.

...and 18 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Formal Security Awareness Training Program

Without an established security awareness program, employees receive no structured education on security threats, safe practices, or organizational policies, leaving human behavior as the weakest link.

Untrained New Hires Immediately Exposed to Threats

Absence of onboarding security training means new employees begin handling enterprise assets and data without understanding the threat landscape or their role in maintaining security.

Workforce Unable to Identify Social Engineering Techniques

Without specific social engineering recognition training, employees cannot distinguish phishing emails from legitimate correspondence or identify pretexting, vishing, and tailgating attempts.

No Simulated Phishing or Social Engineering Exercises

Absence of practical training exercises means employees have no experiential learning to reinforce recognition of social engineering tactics in real-world scenarios.

Poor Password Hygiene Across Workforce

Without authentication best practices training, employees commonly reuse passwords, choose weak credentials, and store passwords insecurely, dramatically increasing the attack surface for credential-based attacks.

Misunderstanding of MFA Mechanisms

Employees who have not been trained on MFA best practices may share one-time codes, approve unsolicited push notifications, or fail to report suspicious authentication attempts.

Workforce Unaware of Data Classification and Handling Procedures

Without data handling training, employees do not understand how to classify data by sensitivity or follow proper procedures for storing, transferring, archiving, and destroying sensitive information.

No Clear Desk and Clear Screen Practices

Absence of training on workspace security practices leads to sensitive data being left visible on screens, desks, and whiteboards where unauthorized individuals can view it.

...and 10 more. See individual safeguards for complete list.

Threat Scenarios

Supply Chain Compromise via Unknown Service Provider Confidentiality

A service provider with access to enterprise data is compromised, but the organization cannot assess impact or respond effectively because it has no inventory of which providers have access to what data.

Shadow IT Service Provider Operating Without Oversight Confidentiality

A department independently contracts a cloud service provider that processes sensitive data, and the security team is unaware of the relationship because no centralized service provider inventory exists.

Orphaned Service Provider Access After Contract End Integrity

A former service provider retains active access to enterprise systems months after the contract ended because no inventory tracks provider relationships or designated contacts responsible for lifecycle management.

Inconsistent Vendor Security Standards Across Departments Confidentiality

Different business units apply varying and often inadequate security requirements to service providers because no unified management policy defines standards for vendor assessment, monitoring, and decommissioning.

High-Risk Provider Onboarded Without Security Evaluation Confidentiality

A service provider handling sensitive regulated data is engaged without any security assessment because no policy exists that mandates evaluation criteria before onboarding vendors.

Disproportionate Trust Granted to High-Risk Service Provider Confidentiality

A service provider processing large volumes of sensitive regulated data is treated with the same minimal oversight as a low-risk office supply vendor because no classification system distinguishes provider risk levels.

Regulatory Non-Compliance from Unclassified Provider Handling Regulated Data Integrity

An organization fails a regulatory audit because it cannot demonstrate risk-appropriate oversight of service providers handling protected health or financial data, as no classification scheme exists.

Service Provider Data Breach Without Contractual Notification Obligation Confidentiality

A service provider suffers a breach affecting enterprise data but delays disclosure for months because no contractual requirement mandates timely breach notification, leaving the organization unable to respond.

...and 10 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Centralized Inventory of Service Providers

Without a maintained inventory of all service providers, the organization has no visibility into which third parties have access to enterprise data, systems, or networks.

Untracked Service Provider Classifications and Contacts

Absence of service provider classification and designated contacts means the organization cannot quickly determine risk exposure or coordinate response when a provider experiences a security incident.

No Formal Service Provider Management Policy

Without a service provider management policy, there are no standardized requirements for classifying, assessing, monitoring, or decommissioning vendors, leading to inconsistent and often inadequate third-party risk management.

No Defined Lifecycle for Service Provider Relationships

Absence of a policy addressing the full vendor lifecycle means providers are onboarded without security requirements and remain active without periodic reassessment or proper offboarding.

No Risk-Based Classification of Service Providers

Without classifying providers by data sensitivity, volume, availability requirements, and regulatory exposure, the organization applies uniform and often insufficient controls regardless of actual risk.

Inability to Prioritize Vendor Risk Management Efforts

Absence of classification prevents the organization from focusing security oversight resources on the highest-risk service providers, resulting in inadequate attention to critical vendor relationships.

Service Provider Contracts Lack Security Requirements

Without contractual security requirements, providers have no legal obligation to implement encryption, notify the enterprise of breaches, maintain minimum security programs, or securely dispose of data.

No Contractual Basis for Security Audits or Compliance Verification

Absence of security clauses in contracts means the organization has no right to audit, assess, or verify the service provider's security posture or compliance with expected standards.

...and 6 more. See individual safeguards for complete list.

Threat Scenarios

Systemic Security Flaws in Internally Developed Applications Integrity

Multiple applications developed in-house contain the same categories of vulnerabilities such as injection flaws and broken authentication because no secure development process defines coding standards or security requirements.

Vulnerable Third-Party Code Integrated Without Review Integrity

Developers incorporate open-source libraries with known critical vulnerabilities into production applications because the development process has no requirements for vetting third-party code security.

Security Bypassed to Meet Release Deadlines Confidentiality

Applications are rushed to production without any security testing because no formal secure development process mandates security gates in the release pipeline.

Publicly Disclosed Vulnerability in Custom Application Goes Unremediated Confidentiality

A security researcher publicly discloses a vulnerability in the organization's application after responsible disclosure attempts fail because no process exists to receive and triage vulnerability reports.

Zero-Day Exploit Targeting Unreported Application Flaw Integrity

An attacker discovers and exploits a vulnerability that had been reported by a user but was never processed because the organization has no intake mechanism for vulnerability reports.

Recurring Vulnerability Pattern Exploited Across Multiple Applications Integrity

The same class of vulnerability such as SQL injection recurs across multiple applications because individual flaws are patched without analyzing the root cause, allowing the systemic coding error to persist.

Development Team Repeatedly Introduces Same Vulnerability Type Confidentiality

A development team continues producing code with the same authentication bypass flaw because no root cause analysis identifies the underlying process or knowledge gap causing the recurring vulnerability.

Supply Chain Attack via Compromised Third-Party Library Integrity

A widely used third-party library included in the application is compromised by an attacker who injects malicious code into an update, and the organization is unaware because it has no inventory of third-party components.

...and 30 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Secure Software Development Lifecycle (SSDLC)

Without a secure development process, there are no defined standards for secure design, coding practices, vulnerability management, or security testing, resulting in applications with systemic security weaknesses.

No Security Requirements in Development Pipeline

Absence of a formalized process means security testing, code review, and vulnerability assessment are not required stages in the software release lifecycle.

No Vulnerability Intake and Handling Process

Without a process to accept and address software vulnerability reports, the organization cannot receive, triage, or remediate reported flaws, leaving known vulnerabilities unpatched.

No External Vulnerability Reporting Mechanism

Absence of a public-facing channel for external researchers to report vulnerabilities means the organization misses early warnings about exploitable flaws in its applications.

No Root Cause Analysis on Security Vulnerabilities

Without root cause analysis, the organization only addresses symptoms (individual bugs) rather than underlying causes (insecure coding patterns, missing training, flawed architecture), leading to recurring vulnerabilities.

Reactive-Only Vulnerability Management

Absence of root cause analysis keeps the development team in a purely reactive mode, patching individual vulnerabilities without improving the systemic security of the codebase.

No Software Bill of Materials (SBOM)

Without an inventory of third-party components, the organization cannot identify which applications use vulnerable or compromised libraries when new threats are disclosed.

Untracked Third-Party Component Risks

Absence of a maintained component inventory means risks associated with each dependency such as known vulnerabilities, licensing issues, and support status are not evaluated or monitored.

...and 20 more. See individual safeguards for complete list.

Threat Scenarios

Uncoordinated Incident Response Leads to Extended Breach Confidentiality

A security incident escalates because no designated personnel exist to coordinate the response, resulting in ad hoc decision-making, duplicated efforts, and extended attacker dwell time.

Key Person Unavailability During Critical Incident Availability

The only person with incident handling knowledge is unreachable during a ransomware attack, and no backup is designated, leaving the organization paralyzed during the critical early hours of the incident.

Regulatory Notification Deadline Missed After Breach Integrity

After a data breach, the organization fails to notify required regulatory agencies within mandated timeframes because no maintained contact list exists for incident reporting parties.

Cyber Insurance Claim Denied Due to Late Notification Availability

The organization's cyber insurance claim is denied because the insurer was not notified within the required timeframe, as the insurance provider's incident contact information was not readily available.

Law Enforcement Engagement Delayed During Active Attack Availability

During an active ransomware attack, critical hours are lost trying to identify the correct law enforcement contacts because no pre-established contact list exists for security incident reporting.

Security Incident Unreported by Employee Who Witnessed It Confidentiality

An employee observes indicators of compromise but does not report them because no enterprise reporting process defines how, when, or to whom incidents should be reported.

Delayed Incident Response Due to Informal Reporting Chain Confidentiality

An employee reports a suspected breach to their direct manager instead of the security team, and the information takes days to reach the right people because no formal reporting process exists.

Chaotic Response to Major Security Incident Confidentiality

During a significant breach, response efforts are uncoordinated because no documented process defines roles, responsibilities, escalation paths, or communication plans, leading to evidence destruction and extended attacker access.

...and 14 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Designated Incident Management Personnel

Without a designated incident handler and backup, there is no clear ownership of incident coordination, leading to confusion, delayed response, and lack of accountability during security events.

No Oversight of Third-Party Incident Response Vendors

If incident response is outsourced without an internal designee to oversee the work, the organization loses control over response priorities, evidence handling, and communication during incidents.

No Maintained Contact List for Incident Reporting

Without a current list of incident reporting contacts including regulators, law enforcement, insurers, and partners, critical notifications are delayed or missed during the time-sensitive incident response phase.

Outdated Contact Information for Key Stakeholders

Absence of annual contact verification means that during an incident, the organization may attempt to reach stakeholders at outdated phone numbers or email addresses, causing communication failures.

No Standardized Incident Reporting Process for Workforce

Without a defined reporting process, employees lack clear guidance on reporting timeframes, who to contact, how to report, and what minimum information to include, resulting in unreported or poorly reported incidents.

Reporting Process Not Publicly Available to All Staff

Even if a reporting process exists, it is ineffective if not readily accessible to all workforce members, resulting in employees being unable to find reporting instructions during a suspected incident.

No Documented Incident Response Process

Without a documented incident response process, the organization has no predefined playbook for roles, responsibilities, compliance requirements, or communication during security incidents.

No Incident Communication Plan

Absence of a communication plan within the incident response process means internal and external communications during incidents are ad hoc, inconsistent, and potentially damaging.

...and 10 more. See individual safeguards for complete list.

Threat Scenarios

Unknown Vulnerabilities Persist Due to No Penetration Testing Confidentiality

Critical exploitable vulnerabilities in the enterprise's network, applications, and services remain undiscovered because no penetration testing program exists to proactively identify them before attackers do.

False Sense of Security from Automated Scanning Alone Integrity

The organization relies solely on automated vulnerability scanning, which misses complex attack chains and configuration weaknesses that only a structured penetration testing program would uncover.

Compliance Gap from Absent Penetration Testing Capability Integrity

The organization fails to meet regulatory or contractual requirements for penetration testing because no program with defined scope, frequency, and remediation processes has been established.

Internet-Facing Vulnerability Exploited by External Attacker Confidentiality

An attacker exploits a misconfigured external-facing service that would have been identified through an external penetration test, gaining initial access to the enterprise network.

Sensitive Information Exposed via OSINT Reconnaissance Confidentiality

Publicly available information such as exposed credentials, internal documents, or infrastructure details is leveraged by an attacker because no external penetration test with reconnaissance phase identified the exposure.

Perimeter Defense Bypassed Through Undiscovered Attack Path Integrity

An attacker discovers an overlooked external entry point such as an old VPN endpoint or forgotten subdomain that perimeter security controls do not cover, because no external penetration test mapped the full attack surface.

Known Vulnerability Exploited After Unremediated Pentest Finding Confidentiality

An attacker exploits a vulnerability that was identified in a penetration test but never remediated because no process exists to track and prioritize the remediation of pentest findings.

Critical Finding Deprioritized Without Remediation Policy Integrity

A critical penetration test finding is deprioritized by a development team focused on features because no organizational policy mandates remediation timelines based on finding severity.

...and 6 more. See individual safeguards for complete list.

Vulnerabilities (When Control Absent)

No Established Penetration Testing Program

Without a penetration testing program defining scope, frequency, methodology, and remediation processes, the organization has no proactive mechanism to discover exploitable vulnerabilities before attackers do.

No Defined Remediation Path for Penetration Test Findings

Absence of a program means that even ad hoc penetration tests produce findings with no defined process for routing, prioritizing, and tracking remediation of discovered vulnerabilities.

External Attack Surface Not Tested

Without periodic external penetration testing, internet-facing systems, services, and configurations are not evaluated from an attacker's perspective, leaving exploitable weaknesses in the perimeter undiscovered.

No External Reconnaissance to Identify Information Exposure

Absence of external testing with reconnaissance means publicly exposed enterprise information such as leaked credentials, misconfigured services, and OSINT data is not identified or remediated.

No Remediation Process for Penetration Test Findings

Without a defined remediation scope and prioritization policy, penetration test findings are not systematically addressed, leaving identified vulnerabilities exploitable long after discovery.

Penetration Tests Produce Reports Without Accountability

Absence of remediation requirements means penetration test reports become shelf-ware, with findings acknowledged but never assigned, tracked, or verified as fixed.

No Post-Pentest Validation of Security Controls

Without validating security measures after penetration tests, the organization does not know whether its detection and prevention controls can actually identify and block the techniques used during testing.

Security Rulesets Not Updated Based on Test Results

Absence of post-test validation means SIEM rules, IDS signatures, and firewall policies are not tuned to detect the specific attack techniques that penetration testers successfully employed.

...and 2 more. See individual safeguards for complete list.

Risk Treatment Options

Reduce (Mitigate)

Implement safeguards to reduce the risk to an acceptable level. This is the most common treatment for cybersecurity risks identified through CIS RAM.

When to Use

When effective safeguards exist that are not more burdensome than the risk itself.

Documentation Required

Risk treatment plan with specific safeguards, implementation timeline, responsible parties, and success metrics.

Accept

Formally acknowledge and accept the risk without implementing additional safeguards. Risk acceptance must be documented with clear justification and approved by appropriate authority.

When to Use

When the risk is within acceptable thresholds, or when available safeguards would be more burdensome than the risk (Principle 3). Also appropriate when the cost of remediation significantly exceeds the potential impact.

Documentation Required

Formal risk acceptance statement signed by an authorized executive, including: risk description, impact assessment, justification for acceptance, review date, and conditions that would trigger reassessment.

Transfer

Transfer the risk to a third party through insurance, outsourcing, or contractual arrangements. Note that while financial risk can be transferred, reputational risk and duty-of-care obligations generally cannot.

When to Use

When the financial impact of a risk can be offset by insurance or when a specialized third party can manage the risk more effectively.

Documentation Required

Insurance policies, service level agreements, contractual risk allocation clauses, and evidence that the third party's controls are adequate.

Avoid

Eliminate the risk by removing the activity, system, or process that creates it. This is the most effective but also most disruptive treatment option.

When to Use

When the risk cannot be reduced to an acceptable level and the activity is not essential to the organization's mission.

Documentation Required

Business case for eliminating the activity, migration plan, and verification that the risk source has been removed.

Glossary

Acceptable Risk
A risk level that falls within the organization's defined risk tolerance thresholds. In CIS RAM for IG1, a risk score of 1-2. For IG2/IG3, a risk score of 1-4.
CIS Controls
A prioritized set of 18 security control groups (with 153 individual safeguards) that provide specific and actionable ways to defend against the most prevalent cyber attacks. Maintained by the Center for Internet Security (CIS).
CIS RAM
CIS Risk Assessment Method. A risk assessment methodology designed specifically to help organizations implement CIS Controls in a manner proportionate to their risk environment. Based on DoCRA principles.
DoCRA
Duty of Care Risk Analysis. A risk analysis standard that establishes the principle that organizations have a duty to implement safeguards that are proportionate to foreseeable threats and that balance security with usability and cost.
Enterprise Asset
Any device, system, network, or technology component owned by, managed by, or under the responsibility of the organization, including end-user devices, servers, network equipment, IoT devices, and cloud resources.
Expectancy
The likelihood component of a risk score in CIS RAM. Derived from the VCDB Index (frequency of similar real-world incidents) and adjusted by the organization's maturity score for the relevant safeguard.
IG1 (Implementation Group 1)
Essential Cyber Hygiene. The minimum standard of information security for all enterprises. Contains 56 safeguards that every organization should implement regardless of size or complexity. Suitable for small to medium enterprises with limited IT and cybersecurity expertise.
IG2 (Implementation Group 2)
Risk-Managed Enterprise. Contains 130 safeguards (including all of IG1). Suitable for enterprises that manage IT infrastructure of varying complexity, store and process sensitive data, and need to address increased operational complexity. These enterprises often have dedicated IT staff and regulatory compliance requirements.
IG3 (Implementation Group 3)
Comprehensive Security. Contains all 153 safeguards. Suitable for enterprises that manage data or systems involving regulatory and compliance oversight, handle sensitive data at scale, and must ensure service availability and data integrity. Often includes dedicated security teams, SOCs, and advanced threat detection capabilities.
Impact
The magnitude of harm that could result from a security incident, measured across four dimensions: Mission, Operational Objectives, Financial Objectives, and Obligations. CIS RAM uses the highest impact score across all dimensions.
Inherent Risk
The risk that exists before any safeguards or controls are applied. Represents the 'worst case' risk level if the organization had no security measures in place for a particular threat scenario.
Maturity Score
An assessment of how well an organization has implemented a specific safeguard, used to adjust the VCDB Index when calculating Expectancy. Higher maturity means lower likelihood of the corresponding threat being realized.
Residual Risk
The risk that remains after safeguards have been implemented. Should fall within the organization's acceptable risk thresholds. If residual risk is still unacceptable, additional safeguards or risk treatment is needed.
Risk Score
The product of Expectancy and the highest Impact score across all four dimensions. Risk Score = Expectancy x max(Mission Impact, Operational Impact, Financial Impact, Obligations Impact).
Safeguard
A specific, actionable security measure defined within a CIS Control. Each of the 153 safeguards addresses a particular aspect of cybersecurity defense. Safeguards are tagged with their applicable Implementation Group(s).
Safeguard Risk
The burden or negative impact that implementing a safeguard creates for the organization. Includes financial cost, operational disruption, technical complexity, and any new vulnerabilities introduced. Per CIS RAM Principle 3, safeguard risk must not exceed the risk being mitigated.
Unacceptable Risk
A risk level that exceeds the organization's defined risk tolerance. Requires implementation of safeguards to reduce the risk to an acceptable level, or formal risk acceptance with executive sign-off.
VCDB Index
VERIS Community Database Index. An empirical reference derived from thousands of real-world security incidents cataloged in the VERIS Community Database. Used in CIS RAM to estimate the likelihood component of risk based on the frequency of similar incidents affecting similar organizations.
VERIS
Vocabulary for Event Recording and Incident Sharing. A standardized framework for describing security incidents, maintained by the Verizon RISK team. The VERIS Community Database (VCDB) is a publicly available dataset of incidents described using this vocabulary.