This page defines the risk method used by the ISMS. Keep it short enough to use in practice and precise enough to justify decisions.

Risk identification

Identify risk from:

  • architecture and infrastructure changes
  • incidents, near misses, and repeated operational failures
  • supplier dependencies
  • vulnerability findings, audit observations, and customer requirements
  • strategic or organisational changes that alter exposure

Risk assessment

Define a simple scoring model that fits Helixiora. For example:

  • score likelihood on a low, medium, high scale
  • score impact on confidentiality, integrity, availability, and contractual exposure
  • combine those factors into a treatment priority

Document the chosen scoring model and keep it stable unless there is a deliberate decision to change it.

Risk treatment

Each material risk should have one clear treatment path:

  • mitigate through new or improved controls
  • transfer through contractual or insurance arrangements where appropriate
  • avoid by changing the activity or architecture
  • accept with explicit approval and review conditions

Maintain a risk register that records owner, status, due date, residual risk, and approval where acceptance is used.

Review cadence

Reassess risk when:

  • a significant system or supplier changes
  • an incident shows the current assessment is no longer accurate
  • a scheduled periodic review is due

Link the register location and review frequency here once Helixiora chooses the operating rhythm.