Module 3: Risk & Planning

Treatment Strategies

15 min
+50 XP

Risk Treatment Strategies

Introduction to Risk Treatment

Risk treatment is where information security risk management transforms from analysis to action. After identifying, assessing, and documenting risks, you must decide how to address each one. ISO 27001 Clause 6.1.3 requires organizations to define and implement a risk treatment process that systematically addresses identified risks.

What is Risk Treatment?

Risk treatment is the process of selecting and implementing measures to:

  • Reduce risk to acceptable levels
  • Align risk exposure with organizational risk appetite
  • Optimize resource allocation across security investments
  • Demonstrate due diligence to stakeholders and regulators
  • Enable business objectives while managing security concerns

Why Multiple Treatment Options?

Different risks require different approaches:

  • Not all risks can be eliminated (cost, feasibility, business needs)
  • Not all risks need to be eliminated (low likelihood or impact)
  • Some risks are better transferred than managed internally
  • Some risks can be avoided by changing business processes

The four treatment options provide flexibility to address risks in the most efficient and effective way for your organization.


The Four Risk Treatment Options

ISO 27001 and ISO 31000 define four fundamental risk treatment strategies:

1. Modify (Treat/Reduce)

Definition: Apply controls to reduce likelihood and/or impact

When to Use:

  • Residual risk exceeds acceptable levels
  • Cost-effective controls are available
  • Risk is within your control
  • Business activity must continue

Examples:

  • Implement multi-factor authentication to reduce unauthorized access likelihood
  • Deploy data loss prevention (DLP) to reduce data breach impact
  • Apply security patches to reduce vulnerability exploitation likelihood
  • Add encryption to reduce data theft impact

Typical Investment: Moderate to High


2. Retain (Accept)

Definition: Accept the risk as-is with no additional treatment

When to Use:

  • Residual risk is within acceptable levels
  • Treatment cost exceeds potential loss
  • No practical treatment options exist
  • Risk likelihood or impact is very low

Examples:

  • Accept risk of minor website defacement (low business impact)
  • Accept risk of office equipment theft (cost of advanced security > asset value)
  • Accept low-priority data corruption risk with existing backups
  • Accept residual risk after implementing all cost-effective controls

Typical Investment: None (monitoring costs only)


3. Avoid (Eliminate)

Definition: Eliminate the risk by discontinuing the activity that creates it

When to Use:

  • Risk is unacceptably high and cannot be reduced sufficiently
  • Treatment costs are prohibitive
  • Business value doesn't justify the risk
  • Alternative approaches achieve same business objective with less risk

Examples:

  • Discontinue processing credit cards in-house, use third-party payment processor
  • Shut down vulnerable legacy system that cannot be patched
  • Cancel high-risk project or business initiative
  • Exit high-risk markets or business lines
  • Stop storing sensitive data that isn't required

Typical Investment: None (but may have business opportunity cost)


4. Share (Transfer)

Definition: Transfer or share the risk with another party

When to Use:

  • Risk is outside your core competence
  • Third party can manage risk more effectively
  • Financial protection is available at reasonable cost
  • Want to share financial impact while maintaining operations

Examples:

  • Purchase cyber insurance to transfer financial impact
  • Outsource to specialized service provider with better security capabilities
  • Use cloud services with strong SLAs and security guarantees
  • Include contractual liability provisions with vendors
  • Use managed security service providers (MSSPs)

Typical Investment: Low to Moderate (insurance premiums, vendor fees)


Treatment Selection Matrix

Decision Framework

Use this matrix to select appropriate treatment option(s):

Residual Risk LevelBusiness CriticalityTreatment FeasibilityRecommended TreatmentPriority
Extreme (20-25)HighFeasibleMODIFY (urgent)Critical
Extreme (20-25)HighNot FeasibleAVOID or SHARECritical
Extreme (20-25)LowAnyAVOIDHigh
High (15-19)HighFeasibleMODIFYHigh
High (15-19)HighNot FeasibleSHARE + MODIFYHigh
High (15-19)LowFeasibleMODIFY or AVOIDMedium
Medium (10-14)HighCost-effectiveMODIFYMedium
Medium (10-14)HighNot cost-effectiveSHARE or RETAIN (with approval)Medium
Medium (10-14)LowCost-effectiveMODIFYLow
Medium (10-14)LowNot cost-effectiveRETAINLow
Low (5-9)AnyCost-effectiveMODIFY (opportunistic)Low
Low (5-9)AnyNot cost-effectiveRETAINLow
Very Low (1-4)AnyAnyRETAINLow

Treatment Priority Guidelines

Critical Priority (Immediate action, 0-7 days):

  • Extreme risks affecting critical business processes
  • Active exploitation detected
  • Regulatory non-compliance with immediate penalties
  • Imminent threat based on intelligence

High Priority (Urgent action, 7-30 days):

  • High risks affecting critical or important processes
  • Extreme risks affecting non-critical processes
  • Regulatory compliance requirements
  • Significant control gaps identified

Medium Priority (Timely action, 30-90 days):

  • Medium risks affecting critical processes
  • High risks affecting non-critical processes
  • Control improvement opportunities
  • Industry best practice alignment

Low Priority (Standard timeline, 90-365 days):

  • Low risks (any process)
  • Medium risks affecting non-critical processes
  • Enhancement opportunities
  • Risk monitoring improvements

Cost-Benefit Analysis

Treatment Investment Framework

Before committing to risk treatment, evaluate the return on security investment (ROSI).

Simple Cost-Benefit Formula

Risk Exposure (before treatment) = Annual Loss Expectancy (ALE)
ALE = Annual Rate of Occurrence (ARO) × Single Loss Expectancy (SLE)

Treatment Cost = Implementation Cost + Annual Operating Cost

Net Benefit = Risk Reduction - Treatment Cost
ROSI = (Risk Reduction - Treatment Cost) / Treatment Cost × 100%

Example Calculation: Unauthorized Database Access

Current State (before additional treatment):

  • Residual Likelihood: 2 (Unlikely) = 0.3 probability (30% chance per year)
  • Residual Impact: 4 (Major) = $5M average loss if occurs
  • Current ALE: 0.3 × $5M = $1.5M per year

Proposed Treatment:

  • Implement passwordless authentication + enhanced monitoring
  • Implementation Cost: $150K (one-time)
  • Annual Operating Cost: $30K per year
  • Total Year 1 Cost: $180K
  • Total Year 2-3 Cost: $30K per year

Expected Outcome:

  • Reduces Residual Likelihood to 1 (Rare) = 0.1 probability (10% chance per year)
  • Reduces Residual Impact to 3 (Moderate) = $2M average loss if occurs
  • New ALE: 0.1 × $2M = $200K per year
  • Risk Reduction: $1.5M - $200K = $1.3M per year

Cost-Benefit Analysis:

Year 1:
Net Benefit = $1.3M - $180K = $1.12M
ROSI = ($1.3M - $180K) / $180K × 100% = 622%
Payback Period = 1.7 months

Year 2-3 (annual):
Net Benefit = $1.3M - $30K = $1.27M
ROSI = ($1.3M - $30K) / $30K × 100% = 4,233%

3-Year Total:
Total Cost: $180K + $30K + $30K = $240K
Total Benefit: $1.3M × 3 years = $3.9M
Net Benefit: $3.6M
ROSI: 1,500%

Decision: APPROVE - Excellent return on investment

When Cost-Benefit Analysis Says "Don't Treat"

Example: Minor Office Equipment Theft

Current State:

  • Residual Likelihood: 3 (Possible) = 0.5 probability (50% chance per year)
  • Residual Impact: 1 (Insignificant) = $2K average loss if occurs
  • Current ALE: 0.5 × $2K = $1K per year

Proposed Treatment:

  • Install advanced access control system with biometric scanners
  • Implementation Cost: $50K
  • Annual Operating Cost: $5K
  • Total Year 1 Cost: $55K

Expected Outcome:

  • Reduces Likelihood to 1 (Rare) = 0.1 probability
  • New ALE: 0.1 × $2K = $200 per year
  • Risk Reduction: $1K - $200 = $800 per year

Cost-Benefit Analysis:

Year 1:
Net Benefit = $800 - $55K = -$54.2K (NEGATIVE)
ROSI = ($800 - $55K) / $55K × 100% = -98.5%
Payback Period = 69 years

Decision: REJECT - Treatment cost far exceeds risk exposure
Alternative: RETAIN risk or implement low-cost controls (locked doors, signage)

Factors Beyond Financial Analysis

Cost-benefit analysis is important but not the only consideration:

Regulatory Requirements:

  • Some controls are mandatory regardless of cost
  • GDPR, PCI-DSS, HIPAA, SOX may require specific controls
  • Regulatory penalties may exceed calculated risk exposure

Reputational Impact:

  • Hard to quantify but can exceed direct financial loss
  • Brand damage affects customer acquisition and retention
  • May impact stock price for public companies

Strategic Importance:

  • Risks to strategic initiatives may warrant higher investment
  • Competitive advantage considerations
  • Market positioning and customer trust

Cumulative Risk:

  • Individual low risks may combine into significant exposure
  • Common control gaps across multiple risks
  • Systemic vulnerabilities

Stakeholder Expectations:

  • Board of directors risk tolerance
  • Customer security requirements
  • Insurance requirements
  • Investor expectations

Decision Framework and Flowchart

Risk Treatment Decision Process

START: Risk Identified and Assessed

   ↓

QUESTION 1: Is residual risk within acceptable limits?
   │
   ├─ YES → RETAIN (Accept) → Document acceptance → Monitor → END
   │
   └─ NO → Continue to Question 2

   ↓

QUESTION 2: Must the risk-generating activity continue?
   │
   ├─ NO → AVOID (Eliminate) → Discontinue activity → END
   │
   └─ YES → Continue to Question 3

   ↓

QUESTION 3: Can risk be reduced to acceptable level with controls?
   │
   ├─ YES → Continue to Question 4
   │
   └─ NO → Continue to Question 5

   ↓

QUESTION 4: Is cost of controls justified by risk reduction?
   │
   ├─ YES → MODIFY (Treat) → Implement controls → Monitor → END
   │
   └─ NO → Continue to Question 5

   ↓

QUESTION 5: Can risk be transferred to another party?
   │
   ├─ YES → SHARE (Transfer) → Contract/Insurance → Monitor → END
   │
   └─ NO → Continue to Question 6

   ↓

QUESTION 6: Can activity be modified to reduce risk?
   │
   ├─ YES → AVOID (Partial) → Modify activity → Reassess → START
   │
   └─ NO → Continue to Question 7

   ↓

QUESTION 7: Escalate to executive leadership for decision
   │
   ├─ Accept with formal approval → RETAIN (Approved) → Monitor → END
   │
   └─ Reject activity → AVOID (Forced) → Discontinue → END

Decision Documentation Requirements

For each treatment decision, document:

Minimum Requirements:

  1. Risk ID and description
  2. Treatment option selected (Modify/Retain/Avoid/Share)
  3. Rationale for selection
  4. Cost-benefit analysis (if applicable)
  5. Risk owner approval
  6. Implementation plan (if Modify or Share)
  7. Acceptance authority (if Retain with residual risk >Low)
  8. Monitoring approach

Example Documentation:

RISK TREATMENT DECISION

Risk ID: RISK-2024-045
Risk: Unauthorized access to customer database
Residual Risk: 8 (Low) - Likelihood 2 × Impact 4

Treatment Option Selected: MODIFY + SHARE

Rationale:
Current residual risk (8) is at upper bound of acceptable range but below
critical business asset justifies reduction to Very Low (≤6). Cost-benefit
analysis shows strong ROI (1,500% over 3 years). Industry best practices
and customer expectations support additional investment.

Treatment Plan:
PRIMARY: MODIFY
- Implement passwordless authentication (reduces likelihood 2→1)
- Deploy enhanced real-time monitoring (reduces impact 4→3)
- Expected outcome: Reduce residual risk from 8 to 3 (Very Low)
- Cost: $240K over 3 years
- Timeline: 6 months implementation

SECONDARY: SHARE
- Purchase cyber insurance with $10M coverage
- Transfers financial impact of any remaining risk
- Cost: $50K annual premium
- Reduces potential uninsured loss from $2M to $0

Cost-Benefit Analysis:
- Risk reduction: $1.3M per year
- Treatment cost: $80K per year (amortized)
- Net benefit: $1.22M per year
- ROSI: 1,525%

Alternatives Considered:
1. RETAIN: Rejected - Risk too high for critical asset
2. AVOID: Rejected - Database essential for business operations
3. SHARE only: Rejected - Doesn't reduce likelihood, only transfers financial impact

Risk Owner Approval:
Sarah Johnson, VP Customer Operations
Approved: 2024-11-18
Comments: "Approved. This investment is essential for customer trust and
regulatory compliance. Prioritize implementation by Q2 2025."

Treatment Owner:
Mike Chen, IT Security Manager
Contact: [email protected]

Executive Acceptance (for current state during implementation):
John Smith, CIO
Approved: 2024-11-20
Conditions: Treatment must be completed by 2025-06-30. Monthly progress
reporting to executive leadership required.

Implementation Status: In Progress (60% complete as of 2024-12-01)
Target Completion: 2025-06-30
Next Review: 2025-02-15

Deep Dive: Modify/Treat Strategy

When to Modify Risk

Ideal Scenarios:

  • Residual risk exceeds acceptable levels
  • Risk is within your control to manage
  • Cost-effective controls available
  • Business activity must continue
  • Regulatory requirements mandate controls
  • Industry best practices support investment

Control Selection Process

Step 1: Identify Control Objectives

What do you need the control to achieve?

Examples:

  • Reduce Likelihood: Prevent the risk from occurring
  • Reduce Impact: Limit the damage if risk occurs
  • Detect Quickly: Identify when risk materializes
  • Respond Effectively: Recover quickly from incidents

Step 2: Research Control Options

Sources:

  • ISO 27001 Annex A controls (93 control categories)
  • NIST Cybersecurity Framework
  • CIS Critical Security Controls
  • Industry-specific standards (PCI-DSS, HIPAA, etc.)
  • Vendor security solutions
  • Peer organizations and industry groups

Step 3: Evaluate Control Alternatives

Control OptionEffectivenessCostImplementation TimeComplexityDependencies
Passwordless AuthenticationHigh (80%)$150K6 monthsMediumIdentity platform
Enhanced MFA (biometric)High (75%)$80K3 monthsLowExisting MFA
Privileged Access ManagementHigh (70%)$200K9 monthsHighDirectory services
Just-in-Time AccessMedium (50%)$50K3 monthsMediumExisting PAM

Step 4: Select Optimal Control Combination

Often, multiple controls in layers (defense in depth) provide best results:

Risk: Unauthorized database access
Target: Reduce likelihood from 2 (Unlikely) to 1 (Rare)

Control Strategy:
1. Passwordless Authentication (Primary - 60% likelihood reduction)
   + Enhanced MFA (Backup - Additional 15% reduction)
   + Just-in-Time Access (Supporting - Additional 10% reduction)
   = Combined 85% likelihood reduction (exceeds target)

Total Cost: $230K
Timeline: 6 months (parallel implementation)
Dependencies: Existing identity platform

Implementation Planning

Key Components:

  1. Technical Design

    • Architecture and integration requirements
    • Configuration and customization
    • Testing and validation approach
  2. Project Plan

    • Milestones and deliverables
    • Resource requirements
    • Timeline and critical path
  3. Change Management

    • User communication and training
    • Phased rollout approach
    • Support and helpdesk preparation
  4. Testing and Validation

    • Functional testing
    • Security testing (penetration testing)
    • User acceptance testing
    • Control effectiveness validation
  5. Monitoring and Measurement

    • Key Risk Indicators (KRIs)
    • Control performance metrics
    • Incident tracking
    • Regular reassessment schedule

Deep Dive: Retain/Accept Strategy

When to Retain Risk

Ideal Scenarios:

  • Residual risk is Low or Very Low
  • Treatment cost exceeds potential loss
  • No practical treatment options exist
  • Controls are already optimized
  • Risk is acceptable to stakeholders

Risk Acceptance Criteria

Define organizational thresholds:

RISK ACCEPTANCE POLICY

Automatic Acceptance (no additional approval required):
- Residual risk score: 1-4 (Very Low)
- Any likelihood/impact combination in blue zone

Risk Owner Acceptance (business unit leader approval):
- Residual risk score: 5-9 (Low)
- Likelihood ≤2 AND Impact ≤4

Executive Acceptance (CIO/CISO/CFO approval):
- Residual risk score: 10-14 (Medium)
- Must demonstrate:
  - Cost-benefit analysis showing treatment not justified
  - All reasonable controls already implemented
  - Monitoring plan in place
  - Annual reassessment commitment

Board Acceptance (Board of Directors approval):
- Residual risk score: 15-25 (High or Extreme)
- Requires:
  - Comprehensive analysis of alternatives
  - Documented business justification
  - Explicit acknowledgment of potential consequences
  - Quarterly reporting to Board
  - Mandatory insurance or financial reserves

UNACCEPTABLE RISKS (cannot be accepted):
- Risks violating laws or regulations
- Risks exceeding insurance coverage limits
- Risks threatening organization's existence
- Risks involving personal safety

These risks must be Modified, Avoided, or Shared.

Acceptance Documentation

RISK ACCEPTANCE FORM

Risk ID: RISK-2024-156
Risk Description: Minor website defacement via SQL injection on public
marketing website (no customer data, no business transactions)

Residual Risk Assessment:
- Likelihood: 2 (Unlikely) - Website has WAF and regular scanning
- Impact: 2 (Minor) - Marketing content only, no business disruption
- Risk Score: 4 (Very Low)

Rationale for Acceptance:
1. Residual risk (4) is within Very Low range (automatic acceptance threshold)
2. Existing controls adequate:
   - Web Application Firewall (WAF) blocks most SQL injection attempts
   - Quarterly vulnerability scanning and patching
   - Daily website backup allows rapid restore (< 1 hour)
   - Separate infrastructure from business systems (no lateral movement)
3. Additional treatment options evaluated:
   - Advanced WAF: $25K/year - Not justified for risk level
   - Real-time monitoring: $15K/year - Not cost-effective
   - Code rewrite: $100K - Website being replaced in 12 months
4. Potential loss: $5K (restore time + reputation) vs Treatment: $25K+

Monitoring Approach:
- Continue quarterly vulnerability scans
- Monitor WAF logs for attack attempts (monthly review)
- Maintain daily backups
- Reassess when new website deployed (2025-Q4)

Risk Owner Acceptance:
Jennifer Martinez, VP Marketing
Signature: ___________________________
Date: 2024-11-25

Comments: "Acceptable risk for marketing website. Focus security investments
on business-critical systems. Website replacement project will address
underlying vulnerabilities."

Next Review Date: 2025-03-01 (or when website replacement complete)

Monitoring Accepted Risks

Just because a risk is accepted doesn't mean it's ignored:

Monitoring Requirements:

  1. Regular Reassessment: Quarterly or semi-annual review
  2. KRI Tracking: Monitor indicators that risk level may be changing
  3. Trigger Events: Immediate reassessment if conditions change
  4. Control Validation: Ensure accepted risks still have effective controls
  5. Trend Analysis: Watch for patterns indicating risk is increasing

Example Monitoring Plan:

Risk: RISK-2024-156 (Website defacement)
Status: Accepted (Very Low - 4)

KRIs:
- SQL injection attempts: Currently 50/month, Threshold: >200/month
- Successful attacks: Currently 0, Threshold: Any incident
- WAF effectiveness: Currently 99.5%, Threshold: <95%
- Scan findings: Currently 2 low, Threshold: Any medium/high
- Backup success rate: Currently 100%, Threshold: <100%

Trigger Events for Immediate Reassessment:
- Any successful defacement
- Discovery of critical vulnerability
- WAF failure or significant downtime
- Increase in attack sophistication
- Regulatory changes affecting website security
- Sensitive data added to website
- Website traffic increases 10x (becomes higher-value target)

Review Schedule:
- Next scheduled review: 2025-03-01
- Annual comprehensive reassessment: 2025-11-25
- Review with website replacement project: 2025-Q4

Report To:
- Monthly: IT Security Manager (KRI dashboard)
- Quarterly: VP Marketing (risk owner)
- Annually: CIO (comprehensive risk review)

Deep Dive: Avoid Strategy

When to Avoid Risk

Ideal Scenarios:

  • Risk is unacceptably high and cannot be reduced sufficiently
  • Treatment costs are prohibitive
  • Business value doesn't justify the risk
  • Alternative approaches exist with lower risk
  • Activity is discretionary or low-value

Avoidance Decision Process

Questions to Ask:

  1. Is the activity essential?

    • Is it required by law or regulation?
    • Is it core to business model?
    • Are there contractual obligations?
    • What happens if we stop?
  2. Are there lower-risk alternatives?

    • Different technology approaches?
    • Different business processes?
    • Third-party services?
    • Outsourcing options?
  3. What is the opportunity cost?

    • Revenue impact?
    • Customer impact?
    • Competitive disadvantage?
    • Strategic implications?
  4. Can the activity be modified rather than eliminated?

    • Reduced scope?
    • Different implementation?
    • Phased approach?
    • Pilot with limited exposure?

Avoidance Examples

Example 1: In-House Payment Processing

Original State:

Activity: Process credit card payments in-house using custom application
Risk: Credit card data breach due to PCI-DSS compliance gaps

Inherent Risk:
- Likelihood: 4 (Likely) - Custom app has vulnerabilities
- Impact: 5 (Catastrophic) - $10M+ in penalties and fraud losses
- Risk Score: 20 (Extreme)

Residual Risk (with controls):
- Likelihood: 3 (Possible) - Controls reduce but don't eliminate
- Impact: 5 (Catastrophic) - Impact remains catastrophic
- Risk Score: 15 (High)

Treatment Options Evaluated:
1. MODIFY: Upgrade to PCI-DSS compliant system
   - Cost: $500K implementation + $100K annual
   - Residual risk: Still 12 (Medium) due to in-house responsibility
   - Ongoing compliance burden high

2. SHARE: Cyber insurance
   - Cost: $75K annual premium
   - Doesn't reduce likelihood or impact, only transfers financial loss
   - Still have PCI-DSS compliance burden
   - Insurance may not cover all penalties

3. AVOID: Stop processing credit cards in-house
   - Cost: $25K integration + $15K annual payment processing fees
   - Eliminates risk entirely (no card data in our environment)
   - Reduces PCI-DSS scope to SAQ-A (simplest)
   - Third-party processor is PCI-DSS Level 1 certified

Decision: AVOID - Implement third-party payment processor (Stripe/PayPal)

Rationale:
- Eliminates Extreme/High risk entirely
- Reduces costs ($500K → $25K implementation, $100K → $15K annual)
- Simplifies compliance (full PCI-DSS → SAQ-A)
- Transfers risk to party with better capabilities
- No material business impact (customers don't care who processes)
- Industry best practice (most organizations don't process cards in-house)

Implementation:
1. Select payment processor (Stripe chosen)
2. Integrate payment API into application
3. Migrate customer payment data (encrypted, handled by processor)
4. Decommission old payment system
5. Update PCI-DSS scope and compliance documentation

Outcome:
- Risk eliminated from risk register (replaced with lower third-party risk)
- Compliance burden reduced 90%
- Cost savings: $60K/year ongoing
- Implementation: 3 months
- Status: Completed 2024-09-15

Example 2: Legacy System Decommissioning

Original State:

Activity: Maintain legacy mainframe system for archived customer records
Risk: Unauthorized access due to unsupported OS and no security patches

Inherent Risk:
- Likelihood: 4 (Likely) - Known vulnerabilities, active exploits
- Impact: 4 (Major) - 10 years of historical customer data
- Risk Score: 16 (High)

Residual Risk (with controls):
- Likelihood: 3 (Possible) - Network isolation reduces but doesn't eliminate
- Impact: 4 (Major) - Impact unchanged
- Risk Score: 12 (Medium)

Business Value Assessment:
- System accessed 2-3 times per month for historical record lookups
- Alternative: Export data to secure modern system
- No ongoing business processes depend on system

Treatment Options Evaluated:
1. MODIFY: Isolate system, implement enhanced monitoring
   - Cost: $50K + $20K annual monitoring
   - Residual risk: Still 12 (Medium) - can't patch unsupported system
   - Ongoing maintenance burden

2. AVOID: Decommission system, migrate data to modern platform
   - Cost: $75K data migration project
   - Eliminates risk entirely
   - Ongoing cost savings: $30K/year (maintenance + power + space)
   - One-time effort

Decision: AVOID - Decommission legacy system

Rationale:
- Cannot achieve acceptable risk level with reasonable controls
- Business value low (< 5 accesses per month)
- Modern alternative exists (data warehouse)
- Cost-effective: Pays for itself in 2.5 years from maintenance savings
- Eliminates technical debt
- Frees up datacenter space

Implementation Plan:
Phase 1 (Month 1-2): Data Migration
- Export all archived records from mainframe
- Transform to modern format
- Import to secure data warehouse
- Validate data completeness and integrity

Phase 2 (Month 3): Access Recreation
- Build search and retrieval interface in data warehouse
- Train users on new access method
- Parallel operation (both systems) for 30 days

Phase 3 (Month 4): Decommissioning
- Final data validation
- Disconnect mainframe from network
- Secure wipe mainframe storage
- Physical decommissioning
- Update documentation and procedures

Outcome:
- Risk eliminated (removed from register)
- Cost savings: $30K/year ongoing
- Improved usability (modern search interface)
- Status: Completed 2024-10-30

Partial Avoidance

Sometimes you can avoid part of the risk while retaining core functionality:

Example: Cloud Storage of Sensitive Data

Original: Store all customer data (including PII and payment info) in cloud

Partial Avoidance:
- Store non-sensitive data in cloud (90% of data)
- Store PII in on-premises encrypted database (5% of data)
- Don't store payment data at all - use tokenization (5% of data)

Result:
- Reduces cloud breach impact from 5 (Catastrophic) to 2 (Minor)
- Eliminates payment data risk entirely
- Retains cloud benefits for majority of data
- Risk reduced from 15 (High) to 6 (Low)

Deep Dive: Share/Transfer Strategy

When to Share Risk

Ideal Scenarios:

  • Risk is outside your core competence
  • Third party has better capabilities to manage risk
  • Want financial protection without changing operations
  • Contractual relationships allow risk allocation
  • Industry standard to share this type of risk

Risk Sharing Mechanisms

1. Cyber Insurance

What It Covers:

  • Data breach response costs (forensics, notification, credit monitoring)
  • Regulatory fines and penalties
  • Legal defense costs
  • Business interruption losses
  • Cyber extortion (ransomware payments)
  • Third-party liability claims
  • Crisis management and PR costs

What It Doesn't Cover (typically):

  • Pre-existing vulnerabilities
  • Unpatched known vulnerabilities
  • Intentional acts
  • Insider threats (sometimes)
  • Nation-state attacks (sometimes)
  • Reputational damage (beyond direct costs)

Typical Costs:

  • Small business ($1M coverage): $2K-$5K/year
  • Mid-size business ($5M coverage): $15K-$50K/year
  • Large enterprise ($25M+ coverage): $100K-$500K/year

Coverage depends heavily on:

  • Security controls in place (questionnaire required)
  • Industry and risk profile
  • Claims history
  • Coverage limits and deductibles
  • Policy terms and exclusions

Example:

Risk: Ransomware attack causing business interruption
Residual Risk: 12 (Medium) - Likelihood 3 × Impact 4
Potential Loss: $2M (1 week downtime + recovery costs)

Cyber Insurance:
- Coverage: $5M per occurrence
- Premium: $35K/year
- Deductible: $100K

Treatment Strategy: MODIFY + SHARE
- MODIFY: Implement backup/recovery controls (reduces likelihood 3→2)
- SHARE: Cyber insurance (transfers financial impact)
- New Residual Risk: 8 (Low) - Likelihood 2 × Impact 4
- Net Insured Loss: $0-$100K (deductible) vs $2M (uninsured)

Cost-Benefit:
- Premium: $35K/year
- Risk reduction value: $1.4M/year (expected loss reduction)
- Net benefit: $1.365M/year
- ROSI: 3,900%

2. Outsourcing to Specialized Providers

Examples:

  • Managed Security Service Providers (MSSPs)
  • Cloud Service Providers (AWS, Azure, Google Cloud)
  • Payment Processors (Stripe, PayPal, Square)
  • Email Security Services (Proofpoint, Mimecast)
  • Identity Providers (Okta, Auth0)

Benefits:

  • Provider has specialized expertise
  • Economies of scale (security controls amortized across customers)
  • Provider may have certifications (SOC 2, ISO 27001, PCI-DSS)
  • Contractual SLAs and liability provisions
  • Faster access to latest security technology

Risks to Consider:

  • Vendor security practices (perform due diligence)
  • Vendor financial stability (will they be around?)
  • Data location and sovereignty (regulatory compliance)
  • Vendor lock-in (can you switch providers?)
  • Shared responsibility (what's still your responsibility?)

Example:

Risk: Email-based phishing and malware attacks
Current State:
- In-house email security (basic spam filter)
- Residual Risk: 15 (High) - Likelihood 4 × Impact 4
- Annual phishing incidents: 8-12 (2-3 result in compromise)

Outsourcing Option: Managed email security service (Proofpoint)
- Service: Advanced threat protection, URL rewriting, sandbox analysis
- Cost: $15/user/year = $75K for 5,000 users
- Provider SLA: 99.99% uptime, <0.01% false positive rate
- Provider certifications: SOC 2 Type II, ISO 27001

Expected Outcome:
- Reduces likelihood 4→2 (provider blocks 95%+ of threats)
- Impact unchanged (if attack succeeds, impact same)
- New Residual Risk: 8 (Low) - Likelihood 2 × Impact 4
- Expected incidents: 0-1 per year (vs 8-12 currently)

Treatment Strategy: SHARE
- Transfer email security operations to specialized provider
- Provider has better capabilities than in-house team
- Provider assumes some liability (per contract)
- We retain responsibility for user training and incident response

Cost-Benefit:
- Service cost: $75K/year
- Avoided incident costs: ~8 incidents × $50K = $400K/year
- In-house security staff reduction: 0.5 FTE = $75K/year savings
- Net benefit: $400K/year
- ROSI: 533%

3. Contractual Risk Transfer

Mechanisms:

  • Indemnification clauses (vendor agrees to cover losses)
  • Liability caps and limitations
  • Insurance requirements (vendor must carry insurance)
  • Service Level Agreements (penalties for failures)
  • Right to audit (verify vendor security controls)
  • Data breach notification requirements

Example Contract Language:

VENDOR SECURITY AND INDEMNIFICATION CLAUSE

1. Security Requirements:
   Vendor shall implement and maintain security controls consistent with
   ISO 27001 and provide annual SOC 2 Type II report.

2. Data Protection:
   Vendor shall encrypt all Customer Data in transit (TLS 1.2+) and at
   rest (AES-256). Vendor shall not share Customer Data with third parties
   without prior written consent.

3. Incident Notification:
   Vendor shall notify Customer within 24 hours of discovering any security
   incident affecting Customer Data.

4. Indemnification:
   Vendor shall indemnify and hold harmless Customer from all claims, losses,
   damages, and expenses (including reasonable attorney fees) arising from:
   a) Vendor's breach of security obligations
   b) Unauthorized access to Customer Data due to Vendor's negligence
   c) Vendor's violation of applicable data protection laws

5. Liability Cap Exception:
   Notwithstanding general liability cap of $1M, Vendor's liability for
   security breaches shall be uncapped.

6. Insurance:
   Vendor shall maintain cyber liability insurance of at least $10M per
   occurrence and provide certificate of insurance annually.

7. Right to Audit:
   Customer may audit Vendor's security controls annually with 30 days notice.
   Vendor shall remediate any findings within 90 days.

8. Data Return/Destruction:
   Upon termination, Vendor shall return or securely destroy all Customer Data
   within 30 days and provide certification of destruction.

Note: Contracts transfer financial liability but don't eliminate the risk of business disruption, reputational damage, or regulatory scrutiny. Always combine with preventive controls.


Combining Treatment Options

Often, the most effective approach combines multiple treatment strategies:

Example 1: Multi-Layered Treatment

Risk: Ransomware attack on business-critical systems
Inherent Risk: 25 (Extreme) - Likelihood 5 × Impact 5
Potential Loss: $5M (1 week downtime, $2M ransom, $3M recovery)

Combined Treatment Strategy:

1. MODIFY (Primary): Reduce likelihood and impact
   Controls:
   - Email security filtering (blocks 95% of phishing)
   - Endpoint detection and response (EDR)
   - Network segmentation
   - Privileged access management
   - Immutable backups (offline, tested monthly)
   - Incident response plan with regular drills

   Investment: $300K implementation + $100K annual
   Effect: Reduces likelihood 5→2, impact 5→3
   New Residual Risk: 6 (Low) - Likelihood 2 × Impact 3

2. SHARE (Financial Protection): Transfer residual financial risk
   - Cyber insurance: $10M coverage
   - Premium: $50K/year
   - Deductible: $250K

   Effect: Caps maximum loss at $250K (deductible)

3. AVOID (Partial): Eliminate highest-risk attack vector
   - Discontinue use of macros in Office documents
   - Block executable attachments at email gateway

   Investment: Minimal (policy + technical enforcement)
   Effect: Additional likelihood reduction (2→1.5)

4. RETAIN (Residual): Accept remaining low-level risk
   - Final Residual Risk: 4.5 (Very Low) - Likelihood 1.5 × Impact 3
   - Maximum Uninsured Loss: $250K (deductible)

   Risk Owner Acceptance: Acceptable residual risk

Total Investment: $350K first year, $150K annual
Risk Reduction: $5M → $250K maximum exposure (95% reduction)
ROSI: 3,166% (first year), 31,667% (annual)

Result: Comprehensive defense-in-depth strategy addressing risk from
multiple angles while remaining cost-effective.

Example 2: Phased Treatment

Risk: Weak authentication across enterprise applications
Residual Risk: 14 (Medium) - Likelihood 3 × Impact 5
Target: Reduce to ≤6 (Low)

Phased Treatment Approach:

Phase 1 (0-3 months): MODIFY - Quick wins
- Implement MFA on all internet-facing applications
- Enforce password complexity on all systems
- Investment: $50K
- Effect: Reduces likelihood 3→2, risk 14→10 (Medium)

Phase 2 (3-6 months): SHARE - Financial protection during transition
- Purchase cyber insurance ($5M coverage)
- Premium: $30K/year
- Effect: Transfers financial risk during implementation

Phase 3 (6-12 months): MODIFY - Comprehensive solution
- Deploy enterprise single sign-on (SSO) with MFA
- Implement passwordless authentication (FIDO2)
- Investment: $200K
- Effect: Reduces likelihood 2→1, risk 10→5 (Low)

Phase 4 (12+ months): RETAIN - Monitor optimized state
- Continue insurance (now at lower premium due to reduced risk)
- Final Residual Risk: 5 (Low)
- Ongoing monitoring and annual reassessment

Total Timeline: 12 months
Total Investment: $250K implementation + $30K annual
Risk Reduction: 14→5 (64% reduction)

Benefit: Phases allow immediate risk reduction while building comprehensive
solution. Insurance provides protection during transition period.

Common Treatment Mistakes

Mistake 1: Only Using One Treatment Option

Wrong Approach: "We always implement technical controls" or "We always buy insurance"

Right Approach: Evaluate all four options for each risk, select best fit

Why It Matters: Different risks require different treatments. One-size-fits-all approach leads to:

  • Over-investment in low-value controls
  • Under-investment in critical risks
  • Missed opportunities for risk avoidance or transfer
  • Poor return on security investment

Mistake 2: Treating Symptoms, Not Root Causes

Wrong Approach: Apply controls to specific risk instances without addressing underlying issues

Example:

Wrong: Implement separate controls for each unpatched system (System A, B, C, etc.)
Right: Implement automated patch management process addressing root cause

Right Approach: Identify common vulnerabilities and systemic issues, treat holistically

Mistake 3: No Cost-Benefit Analysis

Wrong Approach: Implement controls without evaluating cost vs. benefit

Right Approach: Calculate ROI for all significant investments

Example:

Wrong: Spend $500K on control for $10K risk because "security is important"
Right: Evaluate alternatives, may determine risk acceptance is better option

Mistake 4: Implementing Controls Without Effectiveness Validation

Wrong Approach: Deploy control, assume it works, never test

Right Approach: Test, validate, measure effectiveness, adjust as needed

Validation Methods:

  • Penetration testing
  • Control gap assessments
  • Configuration reviews
  • User acceptance testing
  • Incident simulations
  • KRI monitoring

Mistake 5: No Treatment Owner or Accountability

Wrong Approach: Treatment plan approved but no one responsible for execution

Right Approach: Assign treatment owner with clear responsibilities, timeline, budget

Accountability Requirements:

  • Named individual (not a team or department)
  • Defined deliverables and milestones
  • Regular progress reporting
  • Consequences for delays
  • Executive sponsorship for large projects

Mistake 6: "Set It and Forget It"

Wrong Approach: Implement control, never review or update

Right Approach: Continuous monitoring, regular reassessment, adaptation to changing threats

Ongoing Requirements:

  • Quarterly risk reviews (minimum)
  • Annual control effectiveness testing
  • Immediate reassessment after incidents
  • Monitoring threat intelligence for new risks
  • Updating controls as technology evolves

Mistake 7: Ignoring Shared Responsibility in Risk Transfer

Wrong Approach: "We outsourced to the cloud, security is their problem now"

Right Approach: Understand shared responsibility model, manage your portion

Shared Responsibility Example (Cloud Services):

Cloud Provider Responsible For:
- Physical security of data centers
- Network infrastructure
- Hypervisor and virtualization
- Storage encryption (at provider level)

Customer Responsible For:
- Data classification and handling
- Access control and authentication
- Application security
- Data encryption (application level)
- Backup and disaster recovery
- Compliance and governance
- Security monitoring and incident response

Treatment: SHARE (partial) + MODIFY (for customer responsibilities)

Treatment Plan Requirements

Every risk treatment decision (except simple acceptance of Very Low risks) should include:

Minimum Documentation

  1. Risk Identification

    • Risk ID and description
    • Current risk assessment (inherent and residual)
    • Risk owner approval
  2. Treatment Selection

    • Treatment option(s) selected (Modify/Retain/Avoid/Share)
    • Rationale and alternatives considered
    • Cost-benefit analysis (if applicable)
  3. Implementation Plan (for Modify/Share)

    • Specific actions and controls
    • Timeline and milestones
    • Resource requirements (budget, staff, technology)
    • Dependencies and prerequisites
  4. Ownership and Accountability

    • Treatment owner (responsible for execution)
    • Risk owner (accountable for outcome)
    • Stakeholders and contributors
  5. Success Criteria

    • Target residual risk level
    • Key Risk Indicators (KRIs)
    • Validation and testing approach
    • Acceptance criteria
  6. Monitoring Plan

    • Ongoing monitoring approach
    • Review frequency
    • Reporting requirements
    • Escalation triggers
  7. Approvals

    • Risk owner approval
    • Budget approval
    • Executive acceptance (if residual risk >Low)

Key Takeaways

  1. Four Treatment Options, Not One: Always evaluate Modify, Retain, Avoid, and Share for each risk

  2. Cost-Benefit Analysis is Essential: Calculate ROI to justify security investments and avoid over-spending

  3. Combine Treatment Strategies: Often the best approach uses multiple options together (defense in depth)

  4. Risk Acceptance Requires Approval: Define clear criteria and authority levels for accepting risks

  5. Treatment is Not One-Time: Continuous monitoring, testing, and reassessment are required

  6. Avoidance is Underutilized: Don't overlook the option to eliminate risky activities entirely

  7. Risk Transfer Doesn't Eliminate Responsibility: Understand shared responsibility and maintain governance

  8. Document Everything: Treatment decisions, rationale, and approvals are essential for audit and accountability


Next Lesson: In Lesson 3.8, you'll learn how to create a comprehensive Risk Treatment Plan (RTP) with executive summary, resource planning, timeline, budget, tracking dashboard, success criteria, and governance structure to systematically implement your risk treatment decisions.

Complete this lesson

Earn +50 XP and progress to the next lesson