Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

🤹‍♂️ Risks management

Identify and prioritize risks based on their probability and severity. Then define what further actions you need to take to control the risks, and who needs to carry out these actions.


Risk rating

LOW

MEDIUM

HIGH

EXTREME

  • Acceptable

  • Ok to proceed

  • As low as reasonably practicable - provide justification

  • Take mitigation efforts

  • Generally unacceptable

  • Seek support

  • Intolerable

  • Place event on hold



LIKELIHOOD

SEVERITY

ACCEPTABLE
Little to no effect on event

TOLERABLE
Effects are felt, but not critical to outcome

UNDESIRABLE
Serious impact to the course of action and outcome

INTOLERABLE
Could result in disaster

IMPROBABLE
Risk is unlikely to occur

POSSIBLE
Risk will likely occur

PROBABLE
Risk will occur

Risk

Before Mitigation

Mitigation/Justification

After Mitigation

Risk Type

Likelihood

Severity

Score

Likelihood

Severity

Score After Mitigation

AIMS Platform security is compromised

Product

Possible

Intolerable

Vulnerability Scans

Sensitive data is breached

Product

Possible

Intolerable

Sensitive data not stored

Vulnerability Scans

TES Content does not properly associate codes with conditions

Product

Value Sets pulled from trusted, field-proven sources. New groupers curated and validated by RCKMS content team (experts)

User cannot remember password

Product

Probable

Acceptable

Medium

SMTP password reset

Improbable

Acceptable

Low

Customers are unsatisfied with TES

Business

✅ Action items

  •  
  • No labels