📋 Background
🤹♂️ Risks management
Identify and prioritize risks based on their probability and severity. Then define what further actions you need to take to control the risks, and who needs to carry out these actions.
...
Risk rating
LOW | MEDIUM | HIGH | EXTREME |
|
|
|
|
...
| SEVERITY | |||
---|---|---|---|---|
ACCEPTABLE | TOLERABLE | UNDESIRABLE | INTOLERABLE | |
IMPROBABLE |
PROBABLE
Risk will occur
POSSIBLE |
PROBABLE |
Risk | Before Mitigation | Mitigation/Justification | After Mitigation | |||||
---|---|---|---|---|---|---|---|---|
Risk Type | Likelihood | Severity | Score | Likelihood | Severity | Score After Mitigation | ||
AIMS Platform security is compromised | Product | Possible | Intolerable | Vulnerability Scans | ||||
Sensitive data is breached | Product | Possible | Intolerable | Sensitive data not stored Vulnerability Scans | ||||
TES Content does not properly associate codes with conditions | Product | Value Sets pulled from trusted, field-proven sources. New groupers curated and validated by RCKMS content team (experts) | ||||||
User cannot remember password | Product | Probable | Acceptable | Medium | SMTP password reset | Improbable | Acceptable | Low |
Customers are unsatisfied with TES | Business |