"Risk is the language executives understand. CVSS scores tell them severity; business impact tells them
why they should care."
— Security Leadership Principle
You've identified vulnerabilities across infrastructure, web applications, and
cloud environments. Now comes the critical transition: transforming technical
findings into business-relevant risk assessments. A Critical CVSS vulnerability
on an isolated test server isn't the same risk as a Medium finding on a
payment processing system. Context determines priority.
Learning Outcomes
By the end of this week, you will be able to:
LO1: Apply risk assessment frameworks to contextualize technical vulnerability
findings
LO2: Calculate risk scores using likelihood and impact factors relevant to the
organization
LO3: Prioritize vulnerabilities based on business context, asset criticality, and
threat landscape
LO4: Create a risk register that maps technical findings to business risks
LO5: Communicate risk in terms meaningful to non-technical stakeholders
Introduction: The Risk Analysis Phase
Over the past four weeks, you've accumulated substantial findings:
Infrastructure vulnerabilities from Week 3
Web application vulnerabilities from Week 4
Exploitation proof-of-concepts from Week 5
Cloud misconfigurations from Week 6
Raw findings alone don't drive remediation. NovaTech's leadership needs to
understand which issues demand immediate attention, which can wait, and how
to allocate limited security resources effectively. This week transforms your
technical findings into a prioritized risk register that enables informed
decision-making.
Risk in cybersecurity combines the likelihood of a threat exploiting a
vulnerability with the resulting business impact. Understanding this
relationship is essential for effective prioritization.
These terms are often confused. Understanding the distinction is critical
for accurate risk communication:
Concept
Definition
Example
Vulnerability
A weakness that could be exploited
SQL injection in search function
Threat
A potential cause of unwanted impact
External attacker, insider threat
Exploit
Method of leveraging a vulnerability
SQLMap attack extracting data
Risk
Potential for loss when threat exploits vulnerability
Customer data breach via SQL injection
Control
Measure that modifies risk
WAF blocking SQL injection patterns
Risk Assessment Frameworks
Several frameworks provide structured approaches to risk assessment:
NIST Risk Management Framework
Federal standard (SP 800-37) defining a comprehensive approach to
organizational risk management. Emphasizes continuous monitoring
and iterative assessment.
FAIR (Factor Analysis of Information Risk)
Quantitative risk framework that breaks risk into measurable factors.
Enables financial quantification of cyber risk for business cases.
OWASP Risk Rating Methodology
Practical framework for rating application security risks. Considers
threat agent factors, vulnerability factors, and business impact.
CVSS Environmental Metrics
Extension of CVSS base scores that incorporates organizational context.
Adjusts severity based on security requirements and mitigation presence.
2. Likelihood Assessment
Likelihood evaluates how probable it is that a vulnerability will be exploited.
This goes beyond CVSS scores to consider real-world factors.
EPSS provides a probability score (0-1) estimating the likelihood that a
vulnerability will be exploited in the wild within the next 30 days.
This data-driven approach complements CVSS scores.
# Query EPSS for a specific CVE
curl "https://api.first.org/data/v1/epss?cve=CVE-2021-44228"
# Response example:
{
"status": "OK",
"data": [
{
"cve": "CVE-2021-44228",
"epss": "0.97548", # 97.5% probability of exploitation
"percentile": "0.99996" # Higher than 99.99% of all CVEs
}
]
}
# Interpretation:
# EPSS > 0.7: Very high likelihood - prioritize immediately
# EPSS 0.4-0.7: High likelihood - address urgently
# EPSS 0.1-0.4: Moderate likelihood - planned remediation
# EPSS < 0.1: Lower likelihood - risk-based scheduling
3. Impact Assessment
Impact evaluates the consequences if a vulnerability is successfully exploited.
This requires understanding NovaTech's business context, data classification,
and regulatory obligations.
If multiple systems have the same vulnerability, create one risk entry
with multiple affected assets rather than separate entries. This helps
identify systemic issues.
Assign Clear Ownership
Every risk needs an owner responsible for remediation. Use team names
rather than individuals to survive personnel changes.
Set Realistic Due Dates
Due dates should reflect both risk urgency and remediation complexity.
Immediate timelines for critical findings; 30-90 days for medium issues.
Track Status Updates
The register should be a living document. Status options: Open, In Progress,
Remediated, Accepted (risk acknowledged), Transferred (to third party).
6. Communicating Risk to Stakeholders
Different audiences need different levels of detail and framing. Effective
risk communication translates technical findings into business terms.
The security assessment identified 3 critical,
5 high, 8 medium, and
12 low severity findings across infrastructure,
applications, and cloud environments.
Key Business Risks
Customer Data Breach Risk: Vulnerabilities in the
WorkflowPro application could allow unauthorized access to customer
data, triggering GDPR notification requirements and potential fines
up to 4% of annual revenue.
Supply Chain Compromise: The CI/CD pipeline
(Jenkins) contains critical vulnerabilities that could allow
attackers to inject malicious code into customer deployments.
SOC 2 Certification Risk: Multiple findings
represent control deficiencies that could impact the upcoming
SOC 2 Type II audit.
Recommended Actions
Immediate: Address 3 critical findings within 48 hours
Urgent: Remediate 5 high findings within 2 weeks
Allocate engineering resources for security remediation sprint
Engage with SOC 2 auditor regarding identified control gaps
Resource Requirements
Estimated remediation effort: 2-3 engineering sprints. Critical and
high findings require immediate attention; medium findings can be
incorporated into normal development cycles.
Risk Communication Tips
Lead with Business Impact
Don't start with "we found SQL injection." Start with "customer data
is at risk of exposure due to a vulnerability that could result in
GDPR fines and customer notification requirements."
Quantify Where Possible
"Potential GDPR fine of up to €4M" is more impactful than "regulatory
risk." "50,000 customer records at risk" contextualizes better than
"database exposure."
Provide Actionable Recommendations
Executives want to know what to do. "Allocate 2 engineering sprints
to security remediation" is actionable. "Fix the vulnerabilities" is not.
Use Comparisons and Analogies
"This is similar to the vulnerability that caused the Equifax breach"
provides context for non-technical stakeholders.
7. Risk Acceptance and Exceptions
Not every risk will be remediated immediately. Organizations may accept
certain risks based on business constraints. Document these decisions formally.
When Risk Acceptance May Be Appropriate
Compensating controls: Other controls sufficiently mitigate the risk
Business constraints: System cannot be changed due to business requirements
Temporary acceptance: Remediation planned but timeline extended
Cost-benefit: Remediation cost exceeds potential loss (rare for high risks)
End of life: System being decommissioned; remediation not worth investment
Risk Acceptance Documentation
Risk Acceptance Form Template
Field
Content
Risk ID
R-010
Finding Description
TLS 1.0 enabled on legacy internal API
Risk Level
Medium (Score: 6)
Business Justification
Legacy ERP integration requires TLS 1.0; vendor does not support newer protocols. System
scheduled for replacement in Q3.
Compensating Controls
System isolated on separate VLAN; access restricted to specific IP ranges; additional
monitoring enabled.
Acceptance Duration
Until Q3 system replacement (6 months)
Review Date
Quarterly review required
Accepted By
Marcus Webb, CISO
Date
2025-01-25
Critical Risks Should Rarely Be Accepted
Risk acceptance is generally not appropriate for Critical-level risks.
If stakeholders push to accept a critical risk, document your professional
recommendation against acceptance and escalate to appropriate leadership.
Self-Check Questions
Test your understanding of risk analysis concepts:
Question 1
A vulnerability scanner reports a Critical (CVSS 9.8) finding on an
isolated test server that contains no sensitive data and is only
accessible from the internal network. How would you rate this risk,
and why might it differ from the CVSS score?
Reveal Answer
This would likely be rated as Medium or Low risk despite
the Critical CVSS score:
Impact: 2 (Low) - no sensitive data, non-critical system
Risk Score: 2 × 2 = 4 (Low)
This illustrates why contextual risk assessment matters more than raw
CVSS scores for prioritization.
Question 2
NovaTech's marketing website has a Medium severity XSS vulnerability
(CVSS 5.4). The production WorkflowPro application has the same
vulnerability with the same CVSS score. Should these be prioritized
equally? Why or why not?
Reveal Answer
No, they should not be prioritized equally. The WorkflowPro
vulnerability is significantly higher risk:
Marketing website XSS:
Impact: Low - no sensitive data, no authentication, no customer data
Risk: Low to Medium
WorkflowPro XSS:
Impact: High - authenticated users, customer data access, potential
session hijacking, trust relationship with enterprise customers
Risk: High
Key difference: Asset criticality and data sensitivity
dramatically change impact assessment, even for identical technical
vulnerabilities.
Question 3
You've calculated a risk score of 16 (High) for a finding. The development
team says they can't address it for 3 months due to a product launch.
What options should you present?
Reveal Answer
Present these options to management:
Temporary compensating controls: WAF rules, additional
monitoring, access restrictions that reduce likelihood while permanent
fix is developed
Risk acceptance: Formal documentation of accepted risk
with business justification, compensating controls, and mandatory review
date. Requires CISO or executive approval.
Prioritization discussion: Escalate the conflict between
security risk and business timeline to appropriate leadership for decision
Partial remediation: Quick fixes that reduce (but don't
eliminate) the vulnerability while full fix is developed
Document everything: Your recommendation, the business
decision, and the rationale. This protects everyone if an incident occurs.
Question 4
How would you explain the difference between a CVSS score of 9.8 and
a risk score of 20 (Critical) to NovaTech's CEO?
Reveal Answer
Executive-friendly explanation:
"The CVSS score (9.8) is like a car's crash test rating—it tells us how
dangerous this type of vulnerability could be in general. But risk score
(20) is like asking 'how dangerous is this specific car, driven by this
driver, on these roads?'"
"CVSS says 'this vulnerability is technically severe.' Our risk score
says 'this vulnerability, on our customer-facing system, holding customer
data, with attackers actively exploiting it elsewhere, represents a
critical business risk to NovaTech specifically.'"
"The risk score incorporates what's unique to us: our business, our data,
our customers, and our regulatory obligations."
Question 5
Your risk register has 28 findings. How would you present this to
NovaTech's board in a way that's actionable without overwhelming them?
Decision points: What do you need from the board?
Budget approval? Timeline acceptance?
Supporting materials: Full risk register available in
appendix for those who want details.
Key principle: Executives need to make decisions, not
understand technical details. Focus on "what should we do?" not "what did we find?"
Question 6
Explain how EPSS complements CVSS in risk prioritization. When might
EPSS lead you to prioritize differently than CVSS alone?
Reveal Answer
CVSS measures: Theoretical severity (how bad could it be?)
EPSS measures: Exploitation probability (how likely is it to be exploited?)
Scenarios where EPSS changes prioritization:
High CVSS, Low EPSS: Complex vulnerability requiring
specialized skills, no public exploit. May deprioritize despite severity.
Medium CVSS, High EPSS: "Easy" vulnerability being
actively exploited by automated tools. Prioritize over higher CVSS findings.
Old vulnerabilities: CVSS doesn't change, but EPSS
reflects current threat landscape. Old CVE with new exploit kit inclusion
shows EPSS spike.
✓ Best practice
Use CVSS for impact understanding, EPSS
for likelihood refinement, and organizational context for final prioritization.
Lab: Building NovaTech's Risk Register
Objective
Create a comprehensive risk register from your accumulated assessment
findings, applying business context to calculate risk scores and
developing executive-ready risk communication materials.
Deliverables
Complete Risk Register: All findings with risk scores and prioritization
Executive Risk Summary: 1-2 page summary for NovaTech leadership
Risk Visualization: Charts/graphs showing risk distribution
Time Estimate
4-5 hours
Lab Tasks
Part 1: Consolidate Findings (LO1)
Gather all findings from previous weeks:
Infrastructure vulnerabilities (Week 3)
Web application vulnerabilities (Week 4)
Exploitation results (Week 5)
Cloud misconfigurations (Week 6)
Create master finding list with unique identifiers
Eliminate duplicates and consolidate related findings
Reflect on the transition from technical assessment to risk analysis.
How did applying business context change your perception of which
findings are most important? Were there cases where a "lower severity"
technical finding became higher priority due to business impact, or
vice versa?
Consider the challenges of communicating risk to non-technical stakeholders.
How would you explain your risk register to NovaTech's CEO compared to
their development team? What language and framing changes are necessary
for effective communication across these audiences?