Adding Risks
Learn how to add new risks to your Risk Registry.
Adding Risks
While PartnerAlly automatically identifies some risks through document analysis and gap detection, you'll often need to add risks manually. This guide covers how to create comprehensive risk entries.
When to Add Risks Manually
Add risks when:
- Completing risk assessments
- Reviewing vendor relationships
- Identifying operational risks
- Recording audit findings
- Documenting security concerns
- Tracking business risks
Not every concern is a risk. A risk should represent a potential negative outcome with identifiable likelihood and impact.
Creating a Risk
Basic Process
Navigate to Risks
Go to the Risk Registry from the sidebar.
Click "Add Risk"
Find the button in the top right corner.
Enter Risk Details
Fill in the required and optional fields (described below).
Save the Risk
Click "Create Risk" to add it to the registry.
Risk Form Fields
Required Fields
| Field | Description | Tips |
|---|---|---|
| Title | Brief risk description | Be specific and clear |
| Description | Detailed explanation | Include context and potential consequences |
| Category | Risk type | Choose the most applicable category |
| Severity | Overall risk level | Based on likelihood × impact |
Optional Fields
| Field | Description | Tips |
|---|---|---|
| Likelihood | Probability (1-5) | 1=Rare, 5=Almost Certain |
| Impact | Business impact (1-5) | 1=Minimal, 5=Catastrophic |
| Owner | Responsible person | Assign for accountability |
| Due Date | Target resolution | When should this be addressed? |
| Related Gaps | Linked compliance gaps | Connect to gaps this risk relates to |
| Related Controls | Associated controls | Which controls mitigate this? |
| Notes | Additional context | Any other relevant information |
Assessing Likelihood
Use this scale to assess how probable the risk is:
| Score | Likelihood | Description | Example |
|---|---|---|---|
| 1 | Rare | Unlikely to ever occur | Once in 50 years |
| 2 | Unlikely | Could happen but doubtful | Once in 10 years |
| 3 | Possible | Might occur at some time | Once in 3 years |
| 4 | Likely | Will probably occur | Once per year |
| 5 | Almost Certain | Expected to occur | Multiple times per year |
Assessing Impact
Use this scale to assess potential business impact:
| Score | Impact | Description | Example |
|---|---|---|---|
| 1 | Minimal | Negligible effect | Minor inconvenience |
| 2 | Minor | Some effect, easily managed | Small financial loss |
| 3 | Moderate | Significant but recoverable | Medium financial loss, reputational impact |
| 4 | Major | Serious damage | Large financial loss, regulatory action |
| 5 | Catastrophic | Existential threat | Company survival at risk |
Severity Assignment
Severity is typically calculated from likelihood × impact:
| Calculation | Result | Severity |
|---|---|---|
| L × I = 1-4 | Very Low | Low |
| L × I = 5-9 | Low-Medium | Low/Medium |
| L × I = 10-14 | Medium | Medium |
| L × I = 15-19 | Medium-High | High |
| L × I = 20-25 | Very High | Critical |
Or assign severity directly based on judgment.
Risk Categories
Security
Examples:
- Unauthorized access to systems
- Data breach through vulnerability
- Malware infection
- Insider threat
- Social engineering attackCompliance
Examples:
- Failure to meet SOC 2 requirements
- GDPR violation
- Audit finding not remediated
- Regulatory penalty risk
- Certification lapseOperational
Examples:
- Key system downtime
- Process failure
- Staff capacity shortage
- Critical skill dependency
- Communication breakdownVendor/Third-Party
Examples:
- Vendor data breach
- Service availability failure
- Contract non-compliance
- Concentration risk
- Vendor financial instabilityFinancial
Examples:
- Revenue loss
- Unexpected costs
- Currency exposure
- Credit risk
- FraudWriting Good Risk Descriptions
Risk Title
Good titles are:
- Specific and clear
- Action or outcome focused
- Scannable
| Bad Title | Good Title |
|---|---|
| "Security" | "Unauthorized access to customer data" |
| "Vendor issue" | "Cloud provider outage affecting production" |
| "Compliance thing" | "SOC 2 audit failure due to access control gaps" |
Risk Description
Include:
- What could happen
- How it could happen
- What the impact would be
- Any context or history
Example:
Our primary cloud provider could experience an extended outage (>4 hours), causing our SaaS platform to become unavailable to customers. This would result in SLA violations, potential customer churn, and reputational damage. We have had 2 minor outages in the past year.
Linking to Other Items
Linking to Gaps
Connect risks to related compliance gaps:
- In the risk form, find "Related Gaps"
- Search for and select relevant gaps
- The risk and gaps are linked
Why link:
- Closing gaps may mitigate risks
- Shows relationship between compliance and risk
- Helps prioritize gap remediation
Linking to Controls
Connect risks to controls that mitigate them:
- In the risk form, find "Related Controls"
- Search for and select controls
- Control status affects risk assessment
Linking risks to controls and gaps creates a complete picture of how compliance activities affect your risk posture.
Creating Risks from Gaps
You can create a risk directly from a gap:
- Open a compliance gap
- Click "Create Risk"
- Risk form pre-populates with gap info
- Adjust and complete the risk details
- Risk is automatically linked to the gap
Bulk Risk Import
Import multiple risks at once:
Download Template
Click "Import" then "Download Template" to get the CSV format.
Fill in Data
Complete the spreadsheet with your risk data.
Upload File
Click "Import" and select your completed file.
Review and Confirm
Check the preview and confirm the import.
Risk from Assessment
When completing a risk assessment:
- Document findings in your assessment tool
- Export or manually enter significant risks
- Link assessment document as evidence
- Track remediation via workflows
Common Mistakes to Avoid
| Mistake | Better Approach |
|---|---|
| Too vague | Be specific about the risk |
| No owner | Always assign accountability |
| Wrong category | Choose the primary category |
| Duplicate risks | Search before adding |
| Severity mismatch | Base on likelihood × impact |
After Adding a Risk
Once a risk is created:
- Assign owner if not already done
- Link to gaps that relate to the risk
- Create workflow if mitigation is needed
- Set reminders for periodic review
- Communicate to stakeholders if significant
Next Steps
- Risk Details - View and manage risks
- Priority Queue - See where your risk ranks
- Workflows - Create remediation plans