Media content
Key Benefits
Risk Assessment Methodology
Configuration of threats with probability and scenarios (manual, daily, M times in N days/years). Financial, operational, and reputational impact levels with country-specific translations. Risk level calculation using a formula that considers asset criticality.
Vulnerabilities & Response Measures
Registry of vulnerabilities linked to asset types; asset-to-vulnerability mapping. Response measures: type, status, responsible person, deadline, residual risk, effectiveness, cost, priority, monitoring frequency, and next review date.
Reports & Scheduled Distributions
Generate risk reports in various formats; report profiles for quick generation. Scheduled reports with recurring execution and email delivery; execution history with attachments.
Export, Import & AI
Export risk calculations, response measures, and vulnerabilities to Excel/CSV. Import vulnerabilities from CSV. Guides with translations; optional AI-powered threat analysis, vulnerability generation, and remediation measure suggestions.
Features & Capabilities
Configuration & Directories
- Risk assessment configuration and guide with country-specific translations
- Threats: name, description, risks, probability, and impact with translations
- Financial, operational, and reputational impact levels with criteria and translations
- Risk and residual risk levels with translations
- Response measure types and statuses, effectiveness, priority, monitoring frequency
Threats & Probability
- Threat registry with code, description, and risk description
- Probability: manual entry or scenario-based (daily, M times in N days/years)
- Impact: single value or combination of financial, operational, reputational impact
- Automatic recalculation of probability and impact when scenario or levels change
- Country-specific threat translations; optional AI-powered translation
Vulnerabilities
- Vulnerability registry linked to information asset types
- Threats associated with each vulnerability
- Remediation controls (link to another vulnerability)
- Country-specific vulnerability translations; CSV/Excel import and export
- Optional AI-powered generation of vulnerabilities and remediation measures
Asset-Based Risk Assessment
- Link vulnerabilities to information assets with status (Yes/No)
- Risk level calculation: probability × impact × asset criticality
- Manual risk level assignment (override)
- Risk assessment dashboard with filters and detailed view
- Export risk calculations and assets to Excel
Risk Response Measures
- Measures for asset–vulnerability pairs: type, description, responsible person, deadline, status
- Residual risk level and justification
- Measure effectiveness, metrics, and evaluation date
- Implementation and annual maintenance costs, resources, ROI estimate
- Priority, monitoring frequency, next review date; measure attachments
Reports & Scheduled Reports
- Generate risk reports based on selected parameters and format
- Report profiles: saved settings for quick generation and link sharing
- Scheduled reports: schedule, format, recipients; automatic execution and email delivery
- Execution history of scheduled reports and download of generated files
- Report guide with country-specific translations
Acceptable Risk & Access Control
- Define acceptable risk level; record deletion
- Group and company-based access: configuration, risk assessment, reports
- Permissions: view, edit, add, and delete reports
Use Cases
Risk Assessment by Assets and Vulnerabilities
Configure threats with probability and impact, maintain a vulnerability registry by asset type. Link vulnerabilities to information assets; the system calculates the risk level considering asset criticality. View results on the risk assessment dashboard, filter by company, and export to Excel.
Planning and Monitoring Response Measures
For each asset–vulnerability pair, create response measures: type, responsible person, deadline, status. Evaluate residual risk, effectiveness, cost, and priority; set monitoring frequency and next review date. Add attachments and track change history.
Reports for Management and Audit
Generate risk reports in the required format for selected companies and parameters. Save report profiles for reuse or link sharing. Schedule reports for email delivery; download archives from execution history.
Acceptable Risk and Manual Override
Define the organization's acceptable risk level. If needed, manually override the risk level for specific threat–asset pairs. The system considers overrides in calculations and reports.
Vulnerabilities: Import, Export, and AI
Import vulnerabilities from CSV using a template; export the registry to CSV or Excel. Use guides with country-specific translations. Optionally, leverage AI for threat analysis, generating vulnerability descriptions, and suggesting remediation measures.
Technical Details
Architecture
Risk assessment module: configuration (threats, impact and risk levels), vulnerabilities linked to asset types, asset-to-vulnerability mapping, risk level calculation using a formula that considers criticality. Response measures with types, statuses, residual risk, effectiveness, cost, and monitoring. Reports, report profiles, and scheduled reports with recurring execution and email delivery. Data is stored in the project database; emails are sent via the mail configuration.
Security
Access to configuration, risk assessment, and reports is managed by user groups and company lists. Permissions are checked for adding, editing, and deleting reports and profiles. CSRF protection; input validation. Audit log of actions related to risk assessment.
Scalability
Threat, vulnerability, asset, and measure data is stored in the database; lists use pagination. Optimized queries for risk calculation and report generation. Scheduled reports are executed on a schedule (using project queues/scheduler). Suitable for typical deployments.
Customization
Financial, operational, and reputational impact levels with criteria and examples; risk and residual risk levels; measure types, statuses, effectiveness, priority, monitoring frequency — all with country-specific translations. Guides with translations; optional AI-powered translation and text generation.
Frequently Asked Questions
The risk level is calculated based on the probability of threat occurrence, the impact value (or a combination of financial, operational, and reputational impact), and the criticality of the information asset. The formula considers the vulnerability-to-asset linkage and its status (presence/absence of the vulnerability). The result is displayed as a risk level from the directory.
Response measures are planned actions for an asset–vulnerability pair: measure type, description, responsible person, deadline, status. Additionally, you can specify the residual risk level after implementation, effectiveness, cost, priority, monitoring frequency, and next review date. Attachments can be added to the measure.
Yes. The module includes scheduled reports: you choose a schedule, report format, and recipients (via email). The system generates the report on schedule and sends it to the specified addresses. Execution history is preserved; you can download the generated file.
Vulnerabilities can be imported from a CSV file using a template. Download the template, fill in your data, and upload the file. Exporting vulnerabilities to CSV and Excel is also available for backup or external processing.
The acceptable risk level is a threshold that the organization considers tolerable. It can be set in the module. If needed, a manual override can be applied to specific calculations, which is used instead of the automatically calculated level.
Yes, optional features include: threat analysis, generation of vulnerability descriptions and remediation measures, and translation of threat and vulnerability texts using AI. Guides support AI-powered translation. The availability of these features depends on the AI provider configuration in the project.
Access to risk assessment configuration, asset-based risk evaluation, and reports is configured via user groups. Each group can be assigned a list of companies: users only see assets and data related to those companies. Separate permissions for adding, editing, and deleting reports can be set.
Related Modules
Ready to Get Started?
Explore this module and enhance your organization's security posture