Risk Management Framework
Risk Management Framework
Risk Management Framework
Christopher J. Alberts
Audrey J. Dorofee
August 2010
TECHNICAL REPORT
CMU/SEI-2010-TR-017
ESC-TR-2010-017
http://www.sei.cmu.edu
This report was prepared for the
The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of
scientific and technical information exchange.
This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a federally funded
research and development center sponsored by the U.S. Department of Defense.
NO WARRANTY
Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder.
Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use
is granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative
works.
External use. This document may be reproduced in its entirety, without modification, and freely distributed in written or
electronic form without requesting formal permission. Permission is required for any other external and/or commercial
use. Requests for permission should be directed to the Software Engineering Institute at [email protected].
This work was created in the performance of Federal Government Contract Number FA8721-05-C-0003 with Carnegie
Mellon University for the operation of the Software Engineering Institute, a federally funded research and development
center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose
the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant
to the copyright license under the clause at 252.227-7013.
For information about SEI publications, please visit the library on the SEI website (www.sei.cmu.edu/library).
Table of Contents
Acknowledgments v
Abstract vii
1 Introduction 1
3 Framework Overview 9
7 Framework Requirements 39
References/Bibliography 59
i | CMU/SEI-2010-TR-017
ii | CMU/SEI-2010-TR-017
List of Figures
iii | CMU/SEI-2010-TR-017
iv | CMU/SEI-2010-TR-017
Acknowledgments
The authors would like to thank the Army Strategic Software Improvement Program (ASSIP) for pilot-
ing a workshop that resulted in significant improvements to the framework. The authors also wish to
acknowledge the contributions of the reviewers, Carol Woody, Julie Cohen, and Tricia Oberndorf, and
the editor of this technical report, Barbara White.
v | CMU/SEI-2010-TR-017
vi | CMU/SEI-2010-TR-017
Abstract
Although most programs and organizations use risk management when developing and operating soft-
ware-reliant systems, preventable failures continue to occur at an alarming rate. In many instances, the
root causes of these preventable failures can be traced to weaknesses in the risk management practices
employed by those programs and organizations. To help improve existing risk management practices,
Carnegie Mellon University Software Engineering Institute (SEI) researchers undertook a project to
define what constitutes best practice for risk management. The SEI has conducted research and devel-
opment in the area of risk management since the early 1990s. Past SEI research has applied risk man-
agement methods, tools, and techniques across the life cycle (including acquisition, development, and
operations) and has examined various types of risk, including software development risk, system acqui-
sition risk, operational risk, mission risk, and information security risk, among others.
In this technical report, SEI researchers have codified this experience and expertise by specifying (1) a
Risk Management Framework that documents accepted best practice for risk management and (2) an
approach for evaluating a program’s or organization’s risk management practice in relation to the
framework.
vii | CMU/SEI-2010-TR-017
viii | CMU/SEI-2010-TR-017
1 Introduction
Occurrence of Although most programs and organizations use risk management when
Preventable Failures developing and operating software-reliant systems, preventable failures
continue to occur at an alarming rate. Several reasons contribute to the oc-
currence of these failures, including
SEI Background in Since the early 1990s, the SEI has conducted research and development in
Risk Management the area of risk management and has applied risk management methods,
tools, and techniques across the life cycle (including acquisition, develop-
ment, and operations). In addition, past SEI research examined various
types of risk, including software development risk [Dorofee 1996, Williams
1999, Alberts 2009], system acquisition risk [Gallagher 1999], operational
risk [Gallagher 2005], mission risk [Alberts 2009] and information securi-
ty risk [Alberts 2002], among others. In this technical report, SEI research-
ers have codified this experience in the form of a Risk Management
Framework.
Carnegie Mellon is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.
1 | CMU/SEI-2010-TR-017
Risk Management The Risk Management Framework specifies accepted best practice for the
Framework discipline of risk management. The framework is implementation indepen-
dent—it defines key risk management activities, but does not specify how
to perform those activities. In particular, the framework helps provide a
The Risk Management Framework can be applied in all phases of the sys-
tem development life cycle (e.g., acquisition, development, operations). In
addition, the framework can be used to guide the management of many
different types of risk (e.g., acquisition program risk, software development
risk, operational risk, information security risk).
Purpose of this The purpose of this technical report is to present the Risk Management
Document Framework, which defines the core set of activities and outputs required to
manage risk effectively. However, this document does not provide step-by-
step procedures for conducting the risk management activities. Other SEI
documents and courses provide specific methods, tools, and techniques for
managing different types of risk.
Intended Audience The primary audience for this technical report is people who are responsi-
ble for assessing and managing risk in development and operational set-
tings. People who are interested in the following topics might also find this
document useful:
2 | CMU/SEI-2010-TR-017
Structure of This This technical report is divided into the following parts:
Document
Section 1: Introduction—provides a brief overview of the motivation
for developing the Risk Management Framework and defines the au-
dience for this document
Section 2: Risk Management Concepts—presents background infor-
mation about risk management
Section 3: Framework Overview—describes how the Risk Manage-
ment Framework is structured
Section 4: Prepare for Risk Management (Phase 1)—presents activi-
ties that are required to prepare for risk management
Section 5: Perform Risk Management Activities (Phase 2)—
describes activities that are required to manage risk effectively
Section 6: Sustain and Improve Risk Management (Phase 3)—
presents activities that are required to sustain and improve a risk man-
agement practice over time
Section 7: Framework Requirements—defines the criteria that are
used to establish conformance with the Risk Management Framework
Appendix: Evaluating a Risk Management Practice—presents a set
of worksheets that can be used to evaluate a program’s or organization’s
risk management practice and establish consistency with the Risk Man-
agement Framework
3 | CMU/SEI-2010-TR-017
4 | CMU/SEI-2010-TR-017
2 Risk Management Concepts
Multiple Contexts of The term risk is used universally, but different audiences often attach dif-
Risk Management ferent meanings to it [Kloman 1990]. In fact, the details about risk and how
it supports decision making depend upon the context in which it is applied
[Charette 1990]. For example, safety professionals view risk management
in terms of reducing the number of accidents and injuries. A hospital ad-
ministrator views risk as part of the organization’s quality assurance pro-
gram, while the insurance industry relies on risk management techniques
when setting insurance rates. Each industry thus uses a definition that is
uniquely tailored to its context. No universally accepted definition of risk
exists.
Three Conditions Whereas specific definitions of risk might vary, a few characteristics are
of Risk common to all definitions. For risk to exist in any circumstance, the follow-
ing three conditions must be satisfied [Charette 1990]:
Basic Definition of These three characteristics can be used to forge a very basic definition of
Risk the word risk. Most definitions focus on the first two conditions—loss and
uncertainty—because they are the two measurable aspects of risk. Thus, the
essence of risk, no matter what the domain, can be succinctly captured by
the following definition: Risk is the possibility of suffering loss [Dorofee
1996].
1
Some researchers separate the concepts of certainty (the absence of doubt), risk (where the probabilities of alternative
outcomes are known), and uncertainty (where the probabilities of possible outcomes are unknown). However, because
uncertainty is a fundamental attribute of risk, we do not differentiate between decision making under risk and decision
making under uncertainty in this technical report.
5 | CMU/SEI-2010-TR-017
Components of Risk As illustrated in Figure 1, a risk can be thought of as a cause-and-effect
pair, where the threat is the cause and the resulting consequence is the ef-
fect. In this context, a threat is defined as a circumstance with the potential
to produce loss, while a consequence is defined as the loss that will occur
when a threat is realized [Alberts 2009].
Cause Effect
Threat Consequence
Probability Impact
Risk Measures Three measures are associated with a risk: (1) probability, (2) impact, and
(3) risk exposure. The relationships between probability and impact and the
components of risk are shown in Figure 1. In this context, probability is
defined as a measure of the likelihood that a threat will occur, while impact
is defined as a measure of the loss that will occur if the threat is realized.
Risk exposure provides a measure of the magnitude of a risk based on cur-
rent values of probability and impact.
Risk Management Risk management is a systematic approach for minimizing exposure to po-
tential losses. It provides a disciplined environment for
6 | CMU/SEI-2010-TR-017
Risk Management Figure 2 illustrates the three core risk management activities:
Activities
assess risk—transform the concerns people have into distinct, tangible
risks that are explicitly documented and analyzed
plan for risk mitigation—determine an approach for addressing or mi-
tigating each risk; produce a plan for implementing the approach2
mitigate risk—deal with each risk by implementing its defined mitiga-
tion plan and tracking the plan to completion
These three activities form the foundation of the Risk Management Frame-
work.
Assess
Mi
tig
n
Pla
a te
2
No universal definition for the term mitigation exits. In fact, various risk management standards and guidelines use this
term quite differently. In this report, we define mitigation broadly as any action taken to address a risk.
7 | CMU/SEI-2010-TR-017
Issue/Problem One of the fundamental conditions of risk is uncertainty regarding its oc-
currence. A risk, by definition, might or might not occur. In contrast, an
issue3 (also referred to as a problem in many contexts) is a loss or adverse
consequence that has occurred or is certain to occur. With an issue, no un-
certainty exists—the loss or adverse consequence has taken place or is cer-
tain to take place.4 Issues can also lead to (or contribute to) other risks by
Opportunity Risk is focused on the potential for loss; it does not address the potential for
gain. The concept of opportunity is used to address the potential for gain.
An opportunity is the likelihood of realizing a gain from an allocation or
reallocation of resources. Opportunity defines a set of circumstances that
provides the potential for a desired gain and requires an investment or ac-
tion to realize that gain (i.e., to take advantage of the opportunity). Pursuit
of an opportunity can produce new risks or issues, and it can also change
existing risks or issues.
Focus of the Risk The Risk Management Framework (hereafter also referred to as “the
Management framework”) defines activities that are required to manage risk effectively.
Framework Activities for managing issues and opportunities are not explicitly specified
in the Risk Management Framework. While risk management can be inte-
grated with issue and opportunity management [Alberts 2009], the details
for achieving an integrated approach for managing risks, issues, and oppor-
tunities is beyond the scope of this report.
3
People do not always find it easy to distinguish between an issue and the future risk posed by that issue (if left uncor-
rected). This confusion can result in issues being documented in a risk database and being treated like risks (and vice
versa). Management must take great care to ensure that their approaches for managing issues and risks are integrated
appropriately and understood by both management and staff.
4
Many of the same tools and techniques can be applied to both issue and risk management.
8 | CMU/SEI-2010-TR-017
3 Framework Overview
Introduction This section presents an overview of the Risk Management Framework. Figure
3 shows the three phases of the framework. The main goal of the framework is
to specify the core sequence of activities that must be executed when perform-
ing risk management (Phase 2). However, because risk management must be
conducted within a broader context or environment, the framework also speci-
fies activities to prepare for risk management (Phase 1) as well as to sustain
and improve the risk management practice over time (Phase 3).
Risk Management Phase 1 (“Prepare for Risk Management”) is used to get ready for the other two
Framework: Three phases. Phase 1 activities should be complete before activities in the other
Phases phases are executed. Phase 2 (“Perform Risk Management Activities”) defines
a set of activities for managing risk. Phase 2 activities are continually per-
formed to ensure that the overall risk to key objectives is effectively managed
over time. The activities of Phase 3 (“Sustain and Improve Risk Management”)
are normally performed on a periodic basis to ensure that the risk management
practice remains effective over time. Phase 3 activities are used to identify im-
provements to a risk management practice. While Phase 1 is generally com-
pleted prior to beginning the other two, Phases 2 and 3 are typically executed
concurrently.
9 | CMU/SEI-2010-TR-017
Specifying The following common elements are used to specify each phase of the
Framework Phases framework:
Specifying Phase 2 Phase 2 is described in more detail than the other phases because it speci-
Activities fies the distinct sequence of activities that uniquely defines a risk manage-
ment practice. Phase 2 of the framework comprises the following three ac-
tivities:
The following common elements are used to specify each Phase 2 activity:
10 | CMU/SEI-2010-TR-017
Dataflow Diagrams Dataflow diagrams are used to document phases and activities in the Risk
Management Framework. Figure 4 shows the structures of the dataflow
diagrams for a phase and an activity.
Constraints
Notice that the dataflow structure for a Phase 2 activity does not include
constraints and resources. (Refer to Figure 4.) Phase 2 constraints and re-
sources influence all activities that are performed during that phase. For
simplicity, Phase 2 constraints and resources are documented in the Phase 2
diagram only; they are not replicated in each activity diagram for Phase 2.
11 | CMU/SEI-2010-TR-017
Dataflow Identifiers Each input, output, constraint, and resource included in a dataflow is
represented by an identifier, which includes a prefix and a number. The
prefix is based on the type of data and the number represents a specific data
element of that type. For example:
C is a constraint.
R is a resource.
C is a constraint.
C is a constraint.
R is a resource.
12 | CMU/SEI-2010-TR-017
Specifying One of the objectives of the framework is to provide a basis for evaluating
Framework and improving risk management practice for a program or organization.
Requirements Requirements have been specified for each output in the framework. These
requirements provide the basis for evaluating a risk management practice.
Requirements are presented for the following phases and activities:
Framework The basic structure of the Risk Management Framework is defined as:
Specification:
Structure Phase 1: Prepare for Risk Management
Phase 2: Perform Risk Management Activities
— Activity 2.1: Assess Risk
— Activity 2.2: Plan for Risk Mitigation
— Activity 2.3: Mitigate Risk
Phase 3: Sustain and Improve Risk Management
Framework Requirements
This structure forms the basis for the remainder of this report.
13 | CMU/SEI-2010-TR-017
14 | CMU/SEI-2010-TR-017
4 Prepare for Risk Management (Phase 1)
Description In this phase, preparation activities for risk management are performed.
Dataflow The following dataflow describes the inputs and outputs of this phase.
Constraint
C1 Risk Management Constraints
Outputs
PO1 Stakeholder Sponsorship
Input Phase 1 PO2 Risk Management Plan
PI1 Stakeholder Requirements Prepare for risk PO3 Risk Sources
management PO4 Risk Management Criteria
PO5 Tailored Methods and Tools
PO6 Trained Personnel
Resources
R1 Policies, Standards, Laws, and Regulations
R2 Standard Risk Management Practice
R3 Experienced Personnel
Input Description
PI1 Stakeholder The needs of the key stakeholders regarding risk management
Requirements
15 | CMU/SEI-2010-TR-017
Constraint The following is the constraint for this phase.
Constraint Description
C1 Risk Management Any circumstances, including logistics, standards, laws, regulations, personnel,
Constraints schedule, and cost issues that could affect risk management activities
Resource Description
R1 Policies, Standards, Any informative policies, standards, laws, and regulations that guide the
Laws, and Regulations implementation of the risk management practice
R2 Standard Risk The accepted practice for implementing risk management, including methods, tools,
Management Practice procedures, criteria, worksheets, automated support tools, and databases. The
standard risk management practice must be tailored for each specific application of
risk management (e.g., program, organization, technology).
R3 Experienced Personnel5 A core group of people who are collectively experienced in all phases of risk
management. Risk management roles and responsibilities for these people are
defined, and they have received training that is appropriate for their roles and
responsibilities.
5
This core group of experienced personnel is responsible for setting up and sustaining an effective risk management
practice. Other personnel who will also be performing risk management activities will be trained as needed.
16 | CMU/SEI-2010-TR-017
Outputs The following are the outputs of this phase.
Output Description
PO1 Stakeholder Active and visible support of risk management by key stakeholders and decision
Sponsorship makers
PO2 Risk Management Plan The activities a program intends to perform when conducting risk management.
Examples of items commonly found in a risk management plan include
the objectives of the risk management effort
the scope of the risk management effort (e.g., actively participating groups and
teams, support groups, interfaces)
resources (e.g., personnel, funding, technology, facilities, and equipment)
needed to conduct risk management
roles and responsibilities for conducting risk management
description of the risk management method being employed
relationships and dependencies with other management practices (e.g., project,
problem/issue, or opportunity management)
pointers to the procedures, artifacts, and tools used in each risk management
activity
the sources of risk being assessed
all relevant criteria for conducting risk management activities, including the
criteria for probability, impact, and risk exposure
a communication framework that describes formal paths for sharing risk
information among key stakeholders
time intervals and other triggers for establishing risk baselines
effectiveness measures used to evaluate the risk management practice
PO3 Risk Sources The causes of risk that will be assessed (this should be kept current)
PO4 Risk Management The parameters used when managing risks, including
Criteria probability, impact, and risk exposure criteria
decision-making criteria (e.g., for prioritizing risks during mitigation or deciding
when to escalate risks within a program or organization)
criteria that establish risk tolerance
criteria for communicating with collaborators and partners as well as with senior
management
PO5 Tailored Methods and The methods and tools that will be used when conducting risk management,
Tools including procedures, criteria, worksheets, automated support tools, and databases.
Methods and tools are usually tailored from a standard set for a specific application
of risk management (e.g., program, organization, technology).
PO6 Trained Personnel6 The people who are tasked with performing risk management activities and are
prepared to conduct them
6
The majority of personnel in a program typically receive awareness training to enable them to effectively identify risks
or bring them to the attention of those responsible for risk management activities. Other people can receive more spe-
cialized training based on their roles in the risk management process.
17 | CMU/SEI-2010-TR-017
Activities The following activities are performed in this phase.
Activity Description
1.1 Develop stakeholder Meet with key stakeholders and decision makers to foster their active, visible, and
sponsorship continuous support of risk management and gather their requirements.
1.2 Develop risk Create the plan for conducting risk management based on requirements and
management plan constraints (e.g., schedule, funding, logistics, and contractual restrictions).
Note: The risk management plan needs to be consistent with applicable policies,
standards, laws, and regulations.
1.3 Tailor methods and tools Adapt the risk management methods and tools (e.g., procedures, criteria,
worksheets, automated support tools, databases) for the specific application of risk
management (e.g., program, organization, technology).
1.4 Train personnel Ensure that all of the people who will participate in risk management are able to
effectively perform their assigned roles and responsibilities.
18 | CMU/SEI-2010-TR-017
5 Perform Risk Management Activities (Phase 2)
Dataflow The following dataflow describes the inputs and outputs of this phase.
Constraints
C1 Risk Management Constraints
PO1 Stakeholder Sponsorship
PO2 Risk Management Plan
Outputs
O1 Risk Statement
O2 Context
Phase 2 O3 Probability
Input Perform risk O4 Impact
I1 Concerns management O5 Risk Exposure
activities O6 Risk Profile
O7 Mitigation Approach
O8 Mitigation Plan
O9 Executed Mitigation Plan
Resources O10 Tracking Data
PO3 Risk Sources O11 Tracking Decision
PO4 Risk Management Criteria
PO5 Tailored Methods and Tools
PO6 Trained Personnel
19 | CMU/SEI-2010-TR-017
Input The following is the input to this phase.
Input Description
I1 Concerns Doubts, worries, and unease about how current conditions and potential events
might adversely affect the ability to achieve key objectives
Constraint Description
C1 Risk Management Any circumstances, including logistics, standards, laws, regulations, personnel,
Constraints schedule, and cost issues that could affect risk management activities
PO1 Stakeholder Active and visible support of risk management by key stakeholders and decision
Sponsorship makers.
PO2 Risk Management Plan The activities a program intends to perform when conducting risk management.
Examples of items commonly found in a risk management plan include
the objectives of the risk management effort
the scope of the risk management effort (e.g., actively participating groups and
teams, support groups, interfaces)
resources (e.g., personnel, funding, technology, facilities, and equipment)
needed to conduct risk management
roles and responsibilities for conducting risk management
description of the risk management method being employed
relationships and dependencies with other management practices (e.g., project,
problem/issue, or opportunity management)
pointers to the procedures, artifacts, and tools used in each risk management
activity
the sources of risk being assessed
all relevant criteria for conducting risk management activities, including the
criteria for probability, impact, and risk exposure
a communication framework that describes formal paths for sharing risk
information among key stakeholders
time intervals and other triggers for establishing risk baselines
effectiveness measures used to evaluate the risk management practice
7
Constraints affect all activities performed during Phase 2. Similarly, resources are used to aid the completion of all
activities performed during Phase 2. The definitions for all Phase 2 constraints and resources are provided in this sec-
tion only. They are not replicated in the sections for individual Phase 2 activities.
20 | CMU/SEI-2010-TR-017
Resources The following are the resources required by this phase.
Resource Description
PO3 Risk Sources The causes of risk that will be assessed (this should be kept current)
PO4 Risk Management The parameters used when managing risks, including
Criteria probability, impact, and risk exposure criteria
decision-making criteria (e.g., for prioritizing risks during mitigation or deciding
when to escalate risks within a program or organization)
criteria that establish risk tolerance
criteria for communicating with collaborators and partners as well as with senior
management
PO5 Tailored Methods and The methods and tools that will be used when conducting risk management,
Tools including procedures, criteria, worksheets, automated support tools, and databases.
Methods and tools are usually tailored from a standard set for a specific application
of risk management (e.g., program, organization, technology).
PO6 Trained Personnel The people who are tasked with performing risk management activities and are
prepared to conduct them
Output Description
O1 Risk Statement A succinct and unique description of a risk. Risk statements typically describe (1) a
circumstance with the potential to produce loss (i.e., threat) and (2) the loss that will
occur if that circumstance is realized (i.e., consequence).
Note: A risk statement does not have to be documented using text. For example, a
graphical expression or model can also be used to provide a succinct and unique
description of a risk.
O2 Context Additional information essential for characterizing a risk, including any relevant
background information about the risk, elaborations about the threat and
consequence, any aggravating or mitigating conditions, and relationships and
dependencies with other risks
O4 Impact A measure of the severity of a risk’s consequence if the risk were to occur
O5 Risk Exposure A measure of the magnitude of a risk based on current values of probability and
impact
8
Outputs O1 through O5 will exist for each risk that is identified. Output O6 provides a snapshot of all risks that are
identified. Output O7 will exist for each risk that is identified. Finally, outputs O8 through O11 will exit for each risk that
is being actively mitigated.
21 | CMU/SEI-2010-TR-017
Output Description
06 Risk Profile A snapshot or summary of all risks relevant to the specific application of risk
management (e.g., program, organization, technology)
O7 Mitigation Approach A strategy for addressing a risk. Examples of common mitigation approaches include
accept—If a risk occurs, its consequences will be tolerated; no proactive action
to address the risk will be taken. When a risk is accepted, the rationale for
doing so is documented.
transfer—A risk is shifted to another party (e.g., through insurance or
outsourcing).
avoid—Activities are restructured to eliminate the possibility of a risk occurring.
control—Actions are implemented in an attempt to reduce or contain a risk.
O8 Mitigation Plan A set of actions for implementing the selected mitigation approach. Examples of
items commonly found in a mitigation plan include
objectives of the plan
resources allocated to the plan
responsibility for completing each action in the plan
a schedule for completing all actions in the plan
the funding allocated to performing the plan’s actions
measures for tracking the execution of the plan (in relation to the schedule and
cost) and the effectiveness of the plan
a contingency plan and triggers when appropriate
Note: Changes in probability, impact, and risk exposure (i.e., residual risk) are often
used to track a plan’s effectiveness.
O9 Executed Mitigation Plan A set of completed actions (as outlined in a mitigation plan)
O10 Tracking Data Specific data that are gathered when monitoring the progress of a mitigation plan
O11 Tracking Decision Reaching a conclusion or determination about what action(s) to take related to a
mitigation plan. Examples of common tracking decisions include
continue implementing the mitigation plan as intended
modify the mitigation approach and develop a new plan as appropriate
modify the mitigation plan
implement the contingency plan (if one exists)
close the risk
22 | CMU/SEI-2010-TR-017
Importance of Open Effective communication among all stakeholders ensures that information,
Communication plans, actions, concerns, and progress are known. Risk communication is
not a separate activity; it is embedded in all other risk management activi-
ties. The importance of communication is highlighted by its emphasis in the
risk management plan, where a communication framework for sharing risk
information among key stakeholders is documented.
Activity Description
2.1 Assess risk Transform concerns into distinct, tangible risks that are explicitly documented and
measured
2.2 Plan for risk mitigation Determine an approach for addressing or mitigating each risk, and produce a plan
for implementing the approach
2.3 Mitigate risk Deal with each risk by implementing its defined mitigation plan and tracking it to
completion
23 | CMU/SEI-2010-TR-017
5.1 Assess Risk (Activity 2.1)
Description This activity transforms concerns into distinct, tangible risks that are expli-
citly documented and measured. Assessing risk is an activity that is per-
formed continually.
Dataflow The following dataflow describes the inputs and outputs of this activity.
Outputs
O1 Risk Statement
Input O2 Context
Activity 2.1 O3 Probability
I1 Concerns Assess risk O4 Impact
O5 Risk Exposure
O6 Risk Profile
24 | CMU/SEI-2010-TR-017
Input The following is the input to this activity.
Input Description
I1 Concerns Doubts, worries, and unease about how current conditions and potential events
might adversely affect the ability to achieve key objectives
Output Description
O1 Risk Statement A succinct and unique description of a risk. Risk statements typically describe (1) a
circumstance with the potential to produce loss (i.e., threat) and (2) the loss that will
occur if that circumstance is realized (i.e., consequence).
Note: A risk statement does not have to be documented using text. For example, a
graphical expression or model can also be used to provide a succinct and unique
description of a risk.
O2 Context Additional information essential for characterizing a risk, including any relevant
background information about the risk, elaborations about the threat and
consequence, any aggravating or mitigating conditions, and relationships and
dependencies with other risks
O4 Impact A measure of the severity of a risk’s consequence if the risk were to occur
O5 Risk Exposure A measure of the magnitude of a risk based on current values of probability and
impact
06 Risk Profile A snapshot or summary of all risks relevant to the specific application of risk
management (e.g., program, organization, technology)
25 | CMU/SEI-2010-TR-017
Sub-Activities The following table describes the sub-activities performed when conduct-
ing this activity.
2.1.1 Identify risk A concern is transformed into a distinct, tangible risk that O1 Risk Statement
can be described and measured.
O2 Context
Note: Risks that are related can be grouped to provide an
aggregate view of risk to objectives. A risk statement for
the group is documented, and the statement for the group
is carried forward in the rest of the risk management
activities.9 Aggregating risks in this manner helps keep the
total number of risks to a manageable level without losing
the broader view.
2.1.2 Analyze risk The risk is evaluated in relation to predefined criteria to O3 Probability
determine its probability, impact, and risk exposure. O4 Impact
Note: Measures for existing risks must be re-evaluated on
O5 Risk Exposure
a periodic basis.
Note: Some risk management methods include timeframe
as a risk measure. Timeframe is the period when action is
required in order to mitigate a risk. However, timeframe is
not a standard risk measure; many methods do not use it.
For this reason, it is not included as a standard output in
the framework.
2.1.3 Develop risk profile A snapshot or summary of all risks relevant to the specific O6 Risk Profile
application of risk management (e.g., program,
organization, or technology) is developed and
documented. The risk profile should be shared with all
relevant stakeholders as appropriate.
9
When multiple risks are grouped into an aggregate risk, a new risk statement is documented for the aggregate risk.
The aggregate risk is handled the same as other risks from this point forward in the process.
26 | CMU/SEI-2010-TR-017
5.2 Plan for Risk Mitigation (Activity 2.2)
Key Questions This activity answers the following questions for each risk:
Dataflow The following dataflow describes the inputs and outputs of this activity.
Inputs
O1 Risk Statement
O2 Context Activity 2.2 Outputs
O3 Probability Plan for risk O7 Mitigation Approach
O4 Impact mitigation O8 Mitigation Plan
O5 Risk Exposure
O6 Risk Profile
27 | CMU/SEI-2010-TR-017
Inputs The following are the inputs to this activity.
Input Description
O1 Risk Statement A succinct and unique description of a risk. Risk statements typically describe (1) a
circumstance with the potential to produce loss (i.e., threat) and (2) the loss that will
occur if that circumstance is realized (i.e., consequence).
Note: A risk statement does not have to be documented using text. For example, a
graphical expression or model can also be used to provide a succinct and unique
description of a risk.
O2 Context Additional information essential for characterizing a risk, including any relevant
background information about the risk, elaborations about the threat and
consequence, any aggravating or mitigating conditions, and relationships and
dependencies with other risks
O4 Impact A measure of the severity of a risk’s consequence if the risk were to occur
O5 Risk Exposure A measure of the magnitude of a risk based on current values of probability and
impact
06 Risk Profile A snapshot or summary of all risks relevant to the specific application of risk
management (e.g., program, organization, technology)
Output Description
O7 Mitigation Approach A strategy for addressing a risk. Examples of common mitigation approaches include
accept—If a risk occurs, its consequences will be tolerated; no proactive action
to address the risk will be taken. When a risk is accepted, the rationale for
doing so is documented.
transfer—A risk is shifted to another party (e.g., through insurance or
outsourcing).
avoid—Activities are restructured to eliminate the possibility of a risk occurring.
control—Actions are implemented in an attempt to reduce or contain a risk.
28 | CMU/SEI-2010-TR-017
Output Description
O8 Mitigation Plan A set of actions for implementing the selected mitigation approach. Examples of
items commonly found in a mitigation plan include
objectives of the plan
resources allocated to the plan
responsibility for completing each action in the plan
a schedule for completing all actions in the plan
the funding allocated to performing the plan’s actions
measures for tracking the execution of the plan (in relation to the schedule and
cost) and the effectiveness of the plan
a contingency plan and triggers when appropriate
Note: Changes in probability, impact, and risk exposure (i.e., residual risk) are often
used to track a plan’s effectiveness.
Sub-Activities The following table describes the sub-activities performed when conduct-
ing this activity.
2.2.1 Determine mitigation The strategy for addressing a risk is based on the current O7 Mitigation
approach measures for the risk (i.e., probability, impact, and risk Approach
exposure). Decision-making criteria (e.g., for prioritizing
risks during mitigation or deciding when to escalate risks
within a program or organization) may also be used to help
determine the appropriate strategy for addressing a risk.
Common mitigation approaches include
accept—If a risk occurs, its consequences will be
tolerated; no proactive action to address the risk will
be taken. When a risk is accepted, the rationale for
doing so is documented.
transfer—A risk is shifted to another party (e.g.,
through insurance or outsourcing).
avoid—Activities are restructured to eliminate the
possibility of a risk occurring.
control—Actions are implemented in an attempt to
reduce or contain a risk.
Mitigation approaches should be shared with all relevant
stakeholders as appropriate.
29 | CMU/SEI-2010-TR-017
Sub-Activity Description Outputs
2.2.2 Develop mitigation plan A mitigation plan is defined and documented. Mitigation O8 Mitigation Plan
plans should be shared with all relevant stakeholders as
appropriate.
Note: More than one risk might share a common root
cause. Relationships between risks (including those within
an aggregate risk or between the smaller risks in different
aggregate groups) can point to more effective mitigation
actions. Mitigation actions should maximize the return on
investment for resources.
30 | CMU/SEI-2010-TR-017
5.3 Mitigate Risk (Activity 2.3)
Description This activity deals with the risk by implementing the defined mitigation
plan and tracking it to completion.
Key Questions This activity answers the following questions for each mitigation plan:
Dataflow The following dataflow describes the inputs and outputs of this activity.
Inputs
O1 Risk Statement
O2 Context Outputs
O3 Probability O9 Executed Mitigation Plan
Activity 2.3
O4 Impact O10 Tracking Data
Mitigate risk
O5 Risk Exposure O11 Tracking Decision
O6 Risk Profile
O7 Mitigation Approach
O8 Mitigation Plan
Input Description
O1 Risk Statement A succinct and unique description of a risk. Risk statements typically describe (1) a
circumstance with the potential to produce loss (i.e., threat) and (2) the loss that will
occur if that circumstance is realized (i.e., consequence).
Note: A risk statement does not have to be documented using text. For example, a
graphical expression or model can also be used to provide a succinct and unique
description of a risk.
O2 Context Additional information essential for characterizing a risk, including any relevant
background information about the risk, elaborations about the threat and
consequence, any aggravating or mitigating conditions, and relationships and
dependencies with other risks
31 | CMU/SEI-2010-TR-017
Input Description
O4 Impact A measure of the severity of a risk’s consequence if the risk were to occur
O5 Risk Exposure A measure of the magnitude of a risk based on current values of probability and
impact
06 Risk Profile A snapshot or summary of all risks relevant to the specific application of risk
management (e.g., program, organization, technology)
O7 Mitigation Approach A strategy for addressing a risk. Examples of common mitigation approaches include
accept—If a risk occurs, its consequences will be tolerated; no proactive action
to address the risk will be taken. When a risk is accepted, the rationale for
doing so is documented.
transfer—A risk is shifted to another party (e.g., through insurance or
outsourcing).
avoid—Activities are restructured to eliminate the possibility of a risk occurring.
control—Actions are implemented in an attempt to reduce or contain a risk.
O8 Mitigation Plan A set of actions for implementing the selected mitigation approach. Examples of
items commonly found in a mitigation plan include
objectives of the plan
resources allocated to the plan
responsibility for completing each action in the plan
a schedule for completing all actions in the plan
the funding allocated to performing the plan’s actions
measures for tracking the execution of the plan (in relation to the schedule and
cost) and the effectiveness of the plan
a contingency plan and triggers when appropriate
Note: Changes in probability, impact, and risk exposure (i.e., residual risk) are often
used to track a plan’s effectiveness.
Output Description
O9 Executed Mitigation Plan A set of completed actions (as outlined in a mitigation plan)
O10 Tracking Data Specific data that are gathered when monitoring the progress of a mitigation plan
O11 Tracking Decision Reaching a conclusion or determination about what action(s) to take related to a
mitigation plan. Examples of common tracking decisions include
continue implementing the mitigation plan as intended
modify the mitigation approach and develop a new plan as appropriate
modify the mitigation plan
implement the contingency plan (if one exists)
close the risk
32 | CMU/SEI-2010-TR-017
Activity Trigger The following situation will trigger this activity: a mitigation plan has been
developed or modified.
Sub-Activities The following table describes the sub-activities performed when conduct-
ing this activity.
2.3.1 Implement mitigation The mitigation plan (or the contingency plan) is executed O9 Executed
plan as intended. Mitigation Plan
2.3.2 Track mitigation plan The measures for tracking the action plan’s execution are O10 Tracking Data
collected and analyzed as specified in the mitigation plan.
Tracking data should be shared with all relevant
stakeholders as appropriate.
2.3.3 Make tracking decision A decision about whether to take corrective action(s) O11 Tracking
related to a risk or it’s mitigation plan is made. Tracking Decisions
decisions should be shared with all relevant stakeholders
as appropriate.
33 | CMU/SEI-2010-TR-017
34 | CMU/SEI-2010-TR-017
6 Sustain and Improve Risk Management (Phase 3)
Description In this phase, activities are performed to sustain and improve risk manage-
ment effort over time.
Which risk management assets (e.g., methods, tools) and work products
(e.g., risk profile, mitigation plans) need to be under configuration con-
trol?
What lessons were learned when preparing for risk management?
What lessons were learned when conducting risk management?
How does the risk management practice (e.g., plan, methods, tools, re-
sources, training) need to be updated or improved?
Dataflow The following dataflow describes the inputs and outputs of this phase.
Constraint
C1 Risk Management Constraints
Inputs
PI1 Stakeholder Requirements Outputs
Phase 3 SO1 Controlled Risk Management Assets and Work Products
SI1 Risk Management Results Sustain and improve
SI2 Risk Management Effectiveness Data SO2 Lessons Learned
risk management SO3 Updates to Risk Management Practice
SI3 Risk Management Practice
Resources
R1 Policies, Standards, Laws, and Regulations
R2 Standard Risk Management Practice
R3 Experienced Personnel
R4 Sustainment/Improvement Procedures
R5 Sustainment/Improvement Artifacts and Tools
PO2 Risk Management Plan
35 | CMU/SEI-2010-TR-017
Inputs The following are the inputs to this phase.
Input Description
PI1 Stakeholder The needs of the key stakeholders regarding risk management
Requirements
SI1 Risk Management All outputs and data produced when preparing for and conducting risk management,
Results including the risk management plan, risks, mitigation plans, and risk tracking data
SI2 Risk Management Specific data that are gathered to evaluate the effectiveness of the risk management
Effectiveness Data practice
SI3 Risk Management The accepted approach for performing risk management activities, including the risk
Practice management plan, methods, tools, resources, and training
Constraint Description
C1 Risk Management Any circumstances, including logistics, standards, laws, regulations, personnel,
Constraints schedule, and cost issues that could affect risk management activities
Resource Description
R1 Policies, Standards, Any informative policies, standards, laws, and regulations that guide the
Laws, and Regulations implementation of the risk management practice
R2 Standard Risk The accepted practice for implementing risk management, including methods, tools,
Management Practice procedures, criteria, worksheets, automated support tools, and databases. The
standard risk management practice must be tailored for each specific application of
risk management (e.g., program, organization, technology).
R3 Experienced Personnel A core group of people who are collectively experienced in all phases of risk
management. Risk management roles and responsibilities for these people are
defined, and they have received training that is appropriate for their roles and
responsibilities.
R5 Sustainment/ Basic items that can be used when conducting sustainment and improvement
Improvement Artifacts and activities, including templates, worksheets, standard presentations, automated tools,
Tools and databases
36 | CMU/SEI-2010-TR-017
Resource Description
PO2 Risk Management Plan The activities a program intends to perform when conducting risk management.
Examples of items commonly found in a risk management plan include
the objectives of the risk management effort
the scope of the risk management effort (e.g., actively participating groups and
teams, support groups, interfaces)
resources (e.g., personnel, funding, technology, facilities, and equipment)
needed to conduct risk management
roles and responsibilities for conducting risk management
description of the risk management method being employed
relationships and dependencies with other management practices (e.g., project,
problem/issue, or opportunity management)
pointers to the procedures, artifacts, and tools used in each risk management
activity
the sources of risk being assessed
all relevant criteria for conducting risk management activities, including the
criteria for probability, impact, and risk exposure
a communication framework that describes formal paths for sharing risk
information among key stakeholders
time intervals and other triggers for establishing risk baselines
effectiveness measures used to evaluate the risk management practice
Output Description
SO1 Controlled Risk Selected risk management assets (e.g., methods, tools) and work products (e.g., risk
Management Assets and profile, mitigation plans) that are under configuration control
Work Products
SO2 Lessons Learned Knowledge gained by preparing for and conducting risk management activities that
can be used to modify and improve the risk management practice
SO3 Updates to Risk Any changes to the risk management practice (e.g., changes to the risk
Management Practice management plan, methods, tools, resources, training ) to improve the efficiency and
effectiveness of its application
37 | CMU/SEI-2010-TR-017
Activities The following activities are performed in this phase.
Activity Description
3.1 Manage risk Place designated assets (e.g., methods, tools) and work products (e.g., risk profile,
management assets and mitigation plans) of the risk management practice under appropriate levels of
work products control.
3.2 Evaluate effectiveness of Analyze risk management results and effectiveness measures (as specified in the
risk management practice risk management plan) to identify and document lessons learned regarding the
strengths and weaknesses of the risk management practice (e.g., risk management
plan, methods, tools, resources, training).
3.3 Implement improvements Make identified changes to the risk management practice (e.g., changes to the risk
to risk management practice management plan, methods, tools, resources, training) based on lessons learned.
38 | CMU/SEI-2010-TR-017
7 Framework Requirements
Framework Framework requirements define criteria that are used to establish confor-
Requirements mance with the Risk Management Framework. A requirement is specified
for each output in the framework. Requirements are presented for the fol-
lowing phases and activities:
Phase 1 The following are the framework requirements for Phase 1: Prepare for
Requirements Risk Management.
REQ 1 Support of risk management by key stakeholders is tangible, active, and PO1 Stakeholder
visible. Sponsorship
Examples of sponsorship
Organizational policies; memos from senior management; resources;
funding; risks discussed at management meetings
REQ 2 A risk management plan is defined, documented, and approved. PO2 Risk Management
Plan
Examples of plan content
Objectives; scope; resources; descriptions of methods and tools;
sources of risk; risk management criteria; communication framework;
schedule and triggers for conducting evaluations; effectiveness
measures
39 | CMU/SEI-2010-TR-017
Requirement Related Output
REQ 3 Risk sources are defined, documented, and kept current. PO3 Risk Sources
Examples of documents containing risk sources
Publicly available lists and taxonomies; domain-specific lists and
taxonomies; organizational lists and taxonomies
Examples of risk categories
Program management, technical, organizational, infrastructure, support
services, and product
REQ 4 Risk management criteria are defined and documented. PO4 Risk Management
Criteria
Examples of risk management criteria
Probability, impact, and risk exposure criteria; decision-making criteria
(e.g., for escalation or prioritization); criteria that establish risk tolerance;
criteria for communicating with collaborators, partners, subcontractors,
suppliers, customers, and other stakeholders
REQ 5 Methods and tools used to support risk management activities have PO5 Tailored Methods
been appropriately tailored for use. and Tools
Examples of methods and tools
Procedures for conducting risk management activities; risk
management criteria; risk sources; worksheets; automated support
tools; report generators; databases
REQ 6 People who perform risk management activities are prepared to conduct PO6 Trained Personnel
them.
Examples of people who need training
Managers, technical leads, and staff who participate in risk
management activities; risk manager; risk database administrator
Examples of types of training
Awareness training; method training; tool training
Phase 2, Activity 2.1 The following are the framework requirements for Phase 2: Perform Risk
Requirements Management Activities, Activity 2.1: Assess Risk.
REQ 7 A risk statement is documented for each risk using a standard format. O1 Risk Statement
Examples of items that influence the format and use of risk statements
Organizational guidance for communicating, documenting, and updating
risks; requirements of methods and tools; needs of decision makers,
collaborators, partners, subcontractors, suppliers, customers, and other
stakeholders
40 | CMU/SEI-2010-TR-017
Requirement Related Output
REQ 11 Risk exposure is evaluated and documented for each risk. O5 Risk Exposure
Examples of items that influence the use of risk exposure
Risk exposure criteria; organizational guidance for assessing risk
exposure; requirements of methods and tools; needs of decision
makers, collaborators, partners, subcontractors, suppliers, customers,
and other stakeholders
REQ 12 A profile of all risks is developed, documented, and kept current. O6 Risk Profile
Examples of items that influence the development of a risk profile
Organizational guidance for communicating, documenting, and updating
the risk profile; requirements of methods and tools; format of risk
statements; risk profile format; needs of decision makers, collaborators,
partners, subcontractors, suppliers, customers, and other stakeholders
41 | CMU/SEI-2010-TR-017
Phase 2, Activity 2.2 The following are the framework requirements for Phase 2: Perform Risk
Requirements Management Activities, Activity 2.2: Plan for Risk Mitigation.
REQ 13 A mitigation approach is established and documented for each risk. O7 Mitigation Approach
Examples of items that influence selection of a mitigation approach
Organizational guidance for communicating, documenting, and updating
a mitigation approach; requirements of methods and tools; needs of
decision makers, collaborators, partners, subcontractors, suppliers,
customers, and other stakeholders; risk tolerance; decision-making
criteria
Examples of common mitigation approaches
Accept a risk and take no action; transfer a risk to another party;
restructure activities to avoid a risk by eliminating the possibility of it
occurring; take action to reduce or contain a risk
REQ 14 A mitigation plan is defined and documented for each risk that is O8 Mitigation Plan
actively being addressed.
Examples of items that influence development of a mitigation plan
Organizational guidance for communicating, documenting, and updating
a mitigation plan; requirements of methods and tools; needs of decision
makers, collaborators, partners, subcontractors, suppliers, customers,
and other stakeholders; risk tolerance
Examples of a mitigation plan’s content
Objectives for the plan; resources responsible for completing each
action; schedule for completing all actions; funding allocated to
performing the plan’s actions; measures for tracking the execution of
the plan (in relation to the schedule and cost); measures for tracking the
effectiveness of the plan; a contingency plan and triggers when
appropriate
Phase 2, Activity 2.3 The following are the framework requirements for Phase 2: Perform Risk
Requirements Management Activities, Activity 2.3: Mitigate Risk.
REQ 15 Mitigation plans are implemented as intended (unless circumstances O9 Executed Mitigation
force a change in direction). Plan
Examples of items that influence plan execution
Resources available for plan execution; funding allocated to the plan;
responsibility for implementing the plan; authority for implementing plan;
verification of completion; visible support of management
Examples of data that can be used to evaluate plan implementation
Tracking measures for effectiveness and efficiency of mitigation plan
execution; tracking measures for verifying plan completion; triggers for
contingency or alternate plans
42 | CMU/SEI-2010-TR-017
Requirement Related Output
REQ 16 Data for tracking mitigation plans are collected, analyzed, documented, O10 Tracking Data
and reported.
Examples of items that influence collection of tracking data
Organizational guidance for selecting tracking measures; organizational
guidance for communicating, documenting, and updating tracking data;
requirements of methods and tools; needs of decision makers,
collaborators, partners, subcontractors, suppliers, customers, and other
stakeholders; approach for collecting measurement data; approach for
analyzing measurement data; frequency requirements for collecting
tracking data
Examples of types of tracking measures
Tracking measures for effectiveness and efficiency of mitigation plan
execution; tracking measures for verifying plan completion; triggers for
contingency or alternate plans
REQ 17 Tracking decisions for mitigation plans are documented appropriately. O11 Tracking Decisions
Examples of items that influence tracking decisions
Organizational guidance for communicating, documenting, and updating
tracking decisions; requirements for approving tracking decisions;
requirements of methods and tools; needs of decision makers,
collaborators, partners, subcontractors, suppliers, customers, and other
stakeholders; decision-making criteria
Examples of common tracking decisions
Modify the mitigation approach and develop a new plan; modify an
existing mitigation plan; implement a contingency plan; close a risk
Phase 3 The following are the framework requirements for Phase 3: Sustain and
Requirements Improve Risk Management.
REQ 18 Selected risk management assets and work products are under SO1 Controlled Risk
configuration control. Management Assets
Examples of assets under configuration control and Work Products
Risk management plan; methods and tools; risk sources, risk criteria
Examples of work products under configuration control
Risk profile; mitigation plans; tracking decisions; status reports
REQ 19 Lessons learned are collected and documented for the risk SO3 Lessons Learned
management practice.
Examples of items that influence lessons learned
Requirements for developing lessons learned; needs of decision
makers, collaborators, partners, subcontractors, suppliers, customers,
and other stakeholders; types of effectiveness measures collected for
the risk management practice; strengths of the risk management
practice; weaknesses of the risk management practice; changes in best
practices; new standards or changes to existing standards or
regulations; new methods and tools or changes to existing methods and
tools
43 | CMU/SEI-2010-TR-017
Requirement Related Output
REQ 20 The risk management practice is updated as appropriate based on SO3 Updates to Risk
lessons learned. Management
Examples of items that influence how lessons are incorporated Practice
Change management process; organizational guidance for managing
change; needs of decision makers, collaborators, partners,
subcontractors, suppliers, customers, and other stakeholders
Examples of items that could be updated or changed
Risk management plan; funding for risk management; methods; tools;
resources; training
44 | CMU/SEI-2010-TR-017
Appendix: Evaluating a Risk Management Practice
This appendix provides a set of worksheets that can be used to evaluate a risk management practice and
establish conformance with the Risk Management Framework. Conformance is established through sa-
tisfaction of the framework requirements. Non-conformance to any requirement generally indicates a
less effective and potentially inadequate risk management practice.
Directions:
You must complete the following two steps when evaluating each requirement.
1. Evaluate each requirement in the checklist by checking the most appropriate box. The
following table defines the range of responses for each requirement.
Response Definition
The requirement is partially met by the risk management practice. Some aspects of the
Partially Satisfied
requirement are not met satisfactorily.
2. After you evaluate each requirement, document the rationale for your response in
the space provided. Note where your response is based on objective data and where
it is based on more subjective data, such as opinions.
45 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements
Requirement Response
Stakeholder Sponsorship
1. Support of risk management by key stakeholders is tangible, Satisfied
active, and visible.
Partially Satisfied
Examples of sponsorship
Organizational policies; memos from senior management; resources; Unsatisfied
funding; risks discussed at management meetings
Don’t Know
Risk Sources
3. Risk sources are defined, documented, and kept current. Satisfied
46 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements
Rationale
Stakeholder Sponsorship
1.
Risk Sources
3.
47 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements (continued)
Requirement Response
Trained Personnel
6. People who perform risk management activities are prepared to Satisfied
conduct them.
Partially Satisfied
Examples of people who need training
Managers, technical leads, and staff who participate in risk management Unsatisfied
activities; risk manager; risk database administrator
Examples of types of training Don’t Know
Awareness training; method training; tool training
Risk Statement
7. A risk statement is documented for each risk using a standard Satisfied
format.
Unsatisfied
Examples of items that influence the format and use of risk statements
Organizational guidance for communicating, documenting, and updating Partially Satisfied
risks; requirements of methods and tools; needs of decision makers,
collaborators, partners, subcontractors, suppliers, customers, and other Don’t Know
stakeholders
Context
8. Context is documented for each risk. Satisfied
Examples of items that influence the format and use of context Unsatisfied
Organizational guidance for communicating, documenting, and updating
risks; requirements of methods and tools; needs of decision makers, Partially Satisfied
collaborators, partners, subcontractors, suppliers, customers, and other
stakeholders Don’t Know
Examples of context
Root causes; aggravating conditions; mitigating conditions; relationships
and dependencies with other risks
48 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements (continued)
Rationale
Trained Personnel
6.
Risk Statement
7.
Context
8.
49 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements (continued)
Requirement Response
Probability
9. Probability is evaluated and documented for each risk. Satisfied
Impact
10. Impact is evaluated and documented for each risk. Satisfied
Risk Exposure
11. Risk exposure is evaluated and documented for each risk. Satisfied
Risk Profile
12. A profile of all risks is developed, documented, and kept current. Satisfied
50 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements (continued)
Rationale
Probability
9.
Impact
10.
Risk Exposure
11.
Risk Profile
12.
51 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements (continued)
Requirement Response
Mitigation Approach
13. A mitigation approach is established and documented for each Satisfied
risk.
Partially Satisfied
Examples of items that influence selection of a mitigation approach
Organizational guidance for communicating, documenting, and updating Unsatisfied
a mitigation approach; requirements of methods and tools; needs of
decision makers, collaborators, partners, subcontractors, suppliers, Don’t Know
customers, and other stakeholders; risk tolerance; decision-making
criteria
Examples of common mitigation approaches
Accept a risk and take no action; transfer a risk to another party;
restructure activities to avoid a risk by eliminating the possibility of it
occurring; take action to reduce or contain a risk
Mitigation Plan
14. A mitigation plan is defined and documented for each risk that is Satisfied
actively being addressed.
Partially Satisfied
Examples of items that influence development of a mitigation plan
Organizational guidance for communicating, documenting, and updating Unsatisfied
a mitigation plan; requirements of methods and tools; needs of decision
makers, collaborators, partners, subcontractors, suppliers, customers, Don’t Know
and other stakeholders; risk tolerance
Examples of a mitigation plan’s content
Objectives for the plan; resources responsible for completing each
action; schedule for completing all actions; funding allocated to
performing the plan’s actions; measures for tracking the execution of the
plan (in relation to the schedule and cost); measures for tracking the
effectiveness of the plan; a contingency plan and triggers when
appropriate
52 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements (continued)
Rationale
Mitigation Approach
13.
Mitigation Plan
14.
53 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements (continued)
Requirement Response
Tracking Data
16. Data for tracking mitigation plans are collected, analyzed, Satisfied
documented, and reported.
Partially Satisfied
Examples of items that influence collection of tracking data
Organizational guidance for selecting tracking measures; organizational Unsatisfied
guidance for communicating, documenting, and updating tracking data;
requirements of methods and tools; needs of decision makers, Don’t Know
collaborators, partners, subcontractors, suppliers, customers, and other
stakeholders; approach for collecting measurement data; approach for
analyzing measurement data; frequency requirements for collecting
tracking data
Examples of tracking measures
Tracking measures for effectiveness and efficiency of mitigation plan
execution; tracking measures for verifying plan completion; triggers for
contingency or alternate plans
Tracking Decision
17. Tracking decisions for mitigation plans are documented Satisfied
appropriately.
Partially Satisfied
Examples of items that influence tracking decisions
Organizational guidance for communicating, documenting, and updating Unsatisfied
tracking decisions; requirements for approving tracking decisions;
requirements of methods and tools; needs of decision makers, Don’t Know
collaborators, partners, subcontractors, suppliers, customers, and other
stakeholders; decision-making criteria
Examples of common tracking decisions
Modify the mitigation approach and develop a new plan; modify an
existing mitigation plan; implement a contingency plan; close a risk
54 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements (continued)
Rationale
Tracking Data
16.
Tracking Decision
17.
55 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements (continued)
Requirement Response
Lessons Learned
19. Lessons learned are collected and documented for the risk Satisfied
management practice.
Partially Satisfied
Examples of items that influence lessons learned
Requirements for developing lessons learned; needs of decision Unsatisfied
makers, collaborators, partners, subcontractors, suppliers, customers,
and other stakeholders; types of effectiveness measures collected for Don’t Know
the risk management practice; strengths of the risk management
practice; weaknesses of the risk management practice; changes in best
practices; new standards or changes to existing standards or
regulations; new methods and tools or changes to existing methods and
tools
56 | CMU/SEI-2010-TR-017
Evaluation: Framework Requirements (continued)
Rationale
Lessons Learned
19.
57 | CMU/SEI-2010-TR-017
58 | CMU/SEI-2010-TR-017
References/Bibliography
[Alberts 2002]
Alberts, Christopher & Dorofee, Audrey. Managing Information Security Risks: The OCTAVESM Ap-
proach. Boston, MA: Addison-Wesley, 2002 (ISBN 0-321-11886-3).
www.sei.cmu.edu/library/abstracts/books/0321118863.cfm
[Alberts 2009]
Alberts, Christopher & Dorofee, Audrey. A Framework for Categorizing Key Drivers of Risk
(CMU/SEI-2009-TR-007). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University,
2009. www.sei.cmu.edu/library/abstracts/books/09tr007.cfmw
[Charette 1990]
Charette, Robert N. Application Strategies for Risk Analysis. New York, NY: McGraw-Hill Book Com-
pany, 1990.
[Dorofee 1996]
Dorofee, A.; Walker, J.; Alberts, C.; Higuera, R.; Murphy, R.; & Williams, R. Continuous Risk Man-
agement Guidebook. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1996.
www.sei.cmu.edu/library/abstracts/books/crmguidebook.cfm
[Gallagher 1999]
Gallagher, Brian. Software Acquisition Risk Management Key Process Area (KPA)—A Guidebook Ver-
sion 1.02 (CMU/SEI-99-HB-001). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon
University, 1999. www.sei.cmu.edu/library/abstracts/reports/99hb001.cfm
[Gallagher 2005]
Gallagher, B.; Case, P; Creel, R.; Kushner, S.; & Williams, R. A Taxonomy of Operational Risks
(CMU/SEI-2005-TN-036). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University,
2005. www.sei.cmu.edu/library/abstracts/reports/05tn036.cfm
[Kloman 1990]
Kloman, H. F. “Risk Management Agonists.” Risk Analysis 10, 2 (June 1990): 201-205.
[Williams 1999]
Williams, R.; Pandelios, G.; & Behrens, S. Software Risk Evaluation (SRE) Method Description (Ver-
sion 2.0) (CMU/SEI-99-TR-029). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon
University, 1999. www.sei.cmu.edu/library/abstracts/reports/99tr029.cfm
59 | CMU/SEI-2010-TR-017
60 | CMU/SEI-2010-TR-017
Form Approved
REPORT DOCUMENTATION PAGE OMB No. 0704-0188
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, search-
ing existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regard-
ing this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters
Services, Directorate for information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of
Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503.
1. AGENCY USE ONLY 2. REPORT DATE 3. REPORT TYPE AND DATES
COVERED
(Leave Blank) August 2010
Final
4. TITLE AND SUBTITLE 5. FUNDING NUMBERS
Risk Management Framework FA8721-05-C-0003
6. AUTHOR(S)
Christopher J. Alberts and Audrey J. Dorofee
7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION
REPORT NUMBER
Software Engineering Institute
Carnegie Mellon University CMU/SEI-2010-TR-017
Pittsburgh, PA 15213
9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING/MONITORING
AGENCY REPORT NUMBER
HQ ESC/XPK
5 Eglin Street ESC-TR-2010-017
Hanscom AFB, MA 01731-2116
11. SUPPLEMENTARY NOTES
In this technical report, SEI researchers have codified this experience and expertise by specifying (1) a Risk Management Framework
that documents accepted best practice for risk management and (2) an approach for evaluating a program’s or organization’s risk man-
agement practice in relation to the framework.
14. SUBJECT TERMS 15. NUMBER OF PAGES
risk, risk analysis, risk management, risk management framework 72
16. PRICE CODE
17. SECURITY CLASSIFICATION OF 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF
REPORT OF THIS PAGE OF ABSTRACT ABSTRACT
Unclassified Unclassified Unclassified UL
NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39-18
298-102