Risk Assessment Methodology

Last updated May 30, 2025

ZanReal Labs ("ZanReal Labs", "we", "us", or "our") implements a comprehensive risk assessment methodology to systematically identify, analyze, and evaluate information security risks. This methodology forms the foundation of our Information Security Management System (ISMS) and ensures consistent, repeatable risk assessment processes across all business operations.

Purpose and Scope

This methodology applies to:

  • All information assets owned, operated, or managed by ZanReal Labs
  • All business processes and supporting technology systems
  • All physical and virtual environments
  • All third-party services and supplier relationships
  • All employees, contractors, and authorized users

Risk Assessment Framework

Risk Assessment Principles

Our risk assessment approach is based on the following principles:

  • Asset-Based Analysis: Risks are assessed based on potential impact to information assets
  • Threat-Centric Approach: Current and emerging threats are systematically evaluated
  • Vulnerability-Focused: Known vulnerabilities are identified and assessed for exploitability
  • Business Impact Alignment: Risk evaluation considers business impact and operational consequences
  • Quantitative and Qualitative Analysis: Both methodologies are used as appropriate
  • Continuous Assessment: Risk assessment is an ongoing process with regular updates

Risk Components

Each risk assessment evaluates three core components:

Assets

  • Information Assets: Data, databases, documentation, intellectual property
  • Technology Assets: Hardware, software, systems, networks, cloud services
  • Physical Assets: Facilities, equipment, mobile devices
  • Human Assets: Personnel knowledge, skills, reputation
  • Intangible Assets: Brand reputation, customer trust, business relationships

Threats

  • Malicious Threats: Cybercriminals, hackers, malicious insiders, nation-state actors
  • Accidental Threats: Human error, system failures, misconfigurations
  • Natural Threats: Natural disasters, environmental factors, power outages
  • Technical Threats: Hardware failures, software bugs, network outages
  • Supplier Threats: Third-party service disruptions, vendor security incidents

Vulnerabilities

  • Technical Vulnerabilities: Software flaws, misconfigurations, weak encryption
  • Physical Vulnerabilities: Inadequate physical security, environmental risks
  • Procedural Vulnerabilities: Inadequate processes, missing controls, poor documentation
  • Human Vulnerabilities: Lack of awareness, inadequate training, social engineering susceptibility
  • Organizational Vulnerabilities: Insufficient governance, resource constraints, cultural issues

Risk Assessment Process

Phase 1: Asset Identification and Valuation

Asset Discovery

  • Conduct comprehensive asset inventory using automated discovery tools
  • Interview business process owners and system administrators
  • Review network diagrams, system documentation, and architectural designs
  • Identify cloud services, SaaS applications, and third-party dependencies

Asset Classification

Assets are classified using the following criteria:

Confidentiality Requirements:

  • Public (C0): No confidentiality requirements
  • Internal (C1): Limited internal distribution
  • Confidential (C2): Restricted access required
  • Highly Confidential (C3): Strict access controls mandatory

Integrity Requirements:

  • Basic (I1): Minor impact if corrupted
  • Important (I2): Moderate impact if corrupted
  • Critical (I3): Severe impact if corrupted

Availability Requirements:

  • Standard (A1): Standard business hours availability
  • High (A2): Extended hours with minimal downtime
  • Critical (A3): 24/7 availability required

Asset Valuation

Each asset is assigned a business value based on:

  • Replacement Cost: Cost to replace or recreate the asset
  • Business Criticality: Impact on business operations if unavailable
  • Regulatory Requirements: Compliance obligations and potential penalties
  • Revenue Impact: Direct or indirect revenue implications
  • Reputation Impact: Potential damage to organizational reputation

Asset Value Scale:

  • Low (1-2): Minimal business impact, easily replaceable
  • Medium (3-4): Moderate business impact, some difficulty replacing
  • High (5-6): Significant business impact, difficult to replace
  • Critical (7-8): Severe business impact, extremely difficult to replace
  • Vital (9-10): Business-critical, irreplaceable or catastrophic impact

Phase 2: Threat Identification and Analysis

Threat Source Identification

  • External Threats: Cybercriminals, hacktivists, nation-state actors, competitors
  • Internal Threats: Malicious insiders, negligent employees, contractors
  • Environmental Threats: Natural disasters, infrastructure failures, pandemics
  • Technical Threats: System failures, software bugs, network outages

Threat Intelligence Integration

  • Leverage threat intelligence feeds from multiple sources
  • Monitor security advisories and vulnerability databases
  • Analyze industry-specific threat reports and indicators
  • Participate in threat intelligence sharing communities

Threat Likelihood Assessment

Threats are evaluated using the following likelihood scale:

  • Very Low (1): Highly unlikely to occur (0-5% annually)
  • Low (2): Unlikely to occur (6-25% annually)
  • Medium (3): Possible to occur (26-50% annually)
  • High (4): Likely to occur (51-75% annually)
  • Very High (5): Almost certain to occur (76-100% annually)

Phase 3: Vulnerability Assessment

Vulnerability Identification Methods

  • Automated Scanning: Use Nessus Professional and other vulnerability scanners
  • Manual Testing: Penetration testing and security assessments
  • Code Review: Static and dynamic application security testing
  • Configuration Review: Security configuration assessments
  • Process Review: Procedural and administrative control assessments

Vulnerability Rating

Vulnerabilities are rated using the Common Vulnerability Scoring System (CVSS) v3.1:

  • Critical (9.0-10.0): Immediate attention required
  • High (7.0-8.9): High priority remediation
  • Medium (4.0-6.9): Medium priority remediation
  • Low (0.1-3.9): Low priority remediation
  • Informational (0.0): No immediate security impact

Exploitability Assessment

For each vulnerability, we assess:

  • Attack Vector: Network, adjacent network, local, physical
  • Attack Complexity: Low or high complexity required
  • Privileges Required: None, low, or high privilege level needed
  • User Interaction: None or required user interaction
  • Scope: Unchanged or changed from vulnerable component

Phase 4: Risk Calculation and Evaluation

Risk Formula

Risk = Asset Value × Threat Likelihood × Vulnerability Rating

Risk Matrix

Risks are categorized using a 5×5 risk matrix:

Impact/LikelihoodVery Low (1)Low (2)Medium (3)High (4)Very High (5)
Critical (5)MediumHighHighCriticalCritical
High (4)LowMediumHighHighCritical
Medium (3)LowLowMediumHighHigh
Low (2)Very LowLowLowMediumHigh
Very Low (1)Very LowVery LowLowLowMedium

Risk Scoring Scale

  • Critical (20-25): Immediate action required, senior management escalation
  • High (15-19): Urgent attention required, treatment plan within 30 days
  • Medium (10-14): Treatment plan required within 90 days
  • Low (5-9): Treatment plan required within 180 days
  • Very Low (1-4): Monitor and review annually

Phase 5: Risk Treatment Options

Risk Treatment Strategies

For each identified risk, one of the following strategies must be selected:

Risk Avoidance:

  • Eliminate the risk by discontinuing the risky activity
  • Change business processes to avoid risk exposure
  • Select alternative technologies or approaches

Risk Mitigation:

  • Implement security controls to reduce likelihood or impact
  • Apply defense-in-depth strategies
  • Enhance monitoring and detection capabilities

Risk Transfer:

  • Purchase cyber insurance coverage
  • Outsource risky activities to qualified third parties
  • Implement contractual risk transfer mechanisms

Risk Acceptance:

  • Formally accept residual risk after treatment
  • Document business justification for acceptance
  • Establish monitoring and review procedures

Risk Assessment Frequency

Regular Assessments

  • Annual Comprehensive Assessment: Complete organizational risk assessment
  • Quarterly Updates: Review of critical and high risks
  • Monthly Monitoring: Ongoing threat and vulnerability monitoring
  • Ad-hoc Assessments: Triggered by significant changes or incidents

Assessment Triggers

Risk assessments must be conducted when:

  • New systems or services are implemented
  • Significant changes to existing systems occur
  • New threats or vulnerabilities are identified
  • Security incidents occur
  • Regulatory requirements change
  • Business processes are modified
  • Third-party relationships are established or changed

Risk Assessment Documentation

Risk Register

All identified risks must be documented in the organizational risk register including:

  • Risk ID: Unique risk identifier
  • Risk Description: Clear description of the risk scenario
  • Asset: Affected information asset(s)
  • Threat: Applicable threat source(s)
  • Vulnerability: Exploitable vulnerability(ies)
  • Likelihood: Probability of risk occurrence
  • Impact: Potential business impact
  • Risk Score: Calculated risk rating
  • Treatment Strategy: Selected risk treatment approach
  • Controls: Implemented or planned security controls
  • Residual Risk: Risk level after treatment
  • Owner: Risk owner responsible for management
  • Review Date: Next scheduled risk review

Risk Assessment Reports

Each risk assessment produces:

  • Executive Summary: High-level findings and recommendations
  • Risk Landscape: Overview of organizational risk profile
  • Critical Risks: Detailed analysis of critical and high risks
  • Treatment Recommendations: Prioritized risk treatment plan
  • Resource Requirements: Estimated resources for risk treatment
  • Timeline: Implementation schedule for risk treatments

Roles and Responsibilities

Risk Assessment Team

  • Risk Manager: Overall responsibility for risk assessment process
  • Information Security Team: Technical risk analysis and assessment
  • Business Process Owners: Asset identification and business impact assessment
  • IT Operations: Technical vulnerability identification and assessment
  • Legal and Compliance: Regulatory and legal risk assessment

Risk Governance

  • Executive Leadership: Risk appetite and tolerance decisions
  • Risk Committee: Risk assessment oversight and approval
  • Business Unit Managers: Risk treatment implementation and monitoring
  • Internal Audit: Independent risk assessment validation

Quality Assurance

Assessment Validation

  • Peer Review: All risk assessments undergo peer review
  • Independent Validation: Annual independent risk assessment review
  • Accuracy Verification: Regular validation of risk data and calculations
  • Consistency Checks: Ensure consistent application of methodology

Continuous Improvement

  • Methodology Updates: Annual review and update of methodology
  • Lessons Learned: Incorporate feedback from risk incidents
  • Industry Benchmarking: Compare with industry best practices
  • Tool Enhancement: Evaluate and improve risk assessment tools

Training and Competence

Risk Assessment Training

All risk assessment team members must complete:

  • Initial risk assessment methodology training
  • Annual refresher training and updates
  • Specialized training for specific assessment tools
  • Industry threat intelligence briefings

Competence Requirements

Risk assessors must demonstrate:

  • Understanding of business operations and technology
  • Knowledge of information security principles and practices
  • Familiarity with threat landscape and attack vectors
  • Analytical and problem-solving skills
  • Communication and documentation abilities

Integration with ISMS

ISMS Alignment

Risk assessment results inform:

  • Security Control Selection: Based on identified risks and requirements
  • Treatment Planning: Prioritized implementation of security measures
  • Resource Allocation: Budget and staffing decisions for security programs
  • Performance Monitoring: KPIs and metrics for risk management effectiveness
  • Management Review: Regular reporting to senior management

Continuous Monitoring

Risk assessment supports:

  • Threat Detection: Enhanced monitoring based on identified risks
  • Incident Response: Risk-informed incident prioritization and response
  • Change Management: Risk assessment for all significant changes
  • Compliance Management: Risk-based compliance monitoring and reporting

Contact Information

For questions about risk assessment methodology:

Risk Management Team: risk@zanreal.com

Information Security Team: security@zanreal.com

Legal Team: legal@zanreal.com

Any concerns and/or complaints arising under or related to this Risk Assessment Methodology should be reported to legal@zanreal.com.

Previous Versions

The previous versions of our Policies and other documents can be seen at GitHub