Risk Mitigation Concepts
Before you start creating a risk mitigation plan, you need to identify and assess risk mitigation strategies. Senior management may ask the process owners to analyze and assess the potential risks to answer questions such as:
- When and under what circumstances should we take action?
- When should we implement these controls to mitigate risk and protect our organization?
The following risk mitigation chart addresses these questions. Appropriate points for the implementation of control actions are indicated wherever a decision point results in a YES. Position the mouse pointer over the output to know the final decision. Click the Next button to read more about risk mitigation concepts.
An organization has to invest its resources in mitigating each risk. Therefore, to optimize risk mitigation, the two other factors that the organization needs to consider are the cost and impact of the risk. The cost, impact, and acceptable level of a risk will determine the controls required.
The following cost-benefit analysis chart details a few such circumstances. Appropriate points for implementation of controls are indicated in green. Points where controls are not required are shown in red. Points where an alternate control can be used are indicated in yellow.
Click the ACTIVITY button to attempt a scenario-based exercise on risk mitigation.
Input
Output
Find and evaluate the value of controls to mitigate risk
Is the system vulnerable to risk?
Is risk mitigation cost less than the impact of risk?
Find mitigation strategy
No risk
Risk accepted
Risk unaccepted
Next
Back
Cost-Benefit Analysis Chart
Cost of Implementation
Cost-effective
High
Very high
High
Impact on the Organization
Huge profits
Huge profits
Moderate profits
Moderate profits
Acceptable Level of Organizational Risk
Sufficient risk reduction
Insufficient risk reduction
Cost control more than risk reduction
Risk reduction more than needed
Controls (Included/Excluded)
Included
Alternative controls sought
Excluded
Less expensive controls sought
Risk mitigation strategies are not required if no risk exists.
Risk mitigation strategies are not implemented when you accept a risk.
Risk mitigation strategies are implemented when you don’t accept a risk.
Planning Risk Mitigation
A risk mitigation plan communicates how specific risks are being identified and how they will be addressed. It gives management a clear understanding of what actions are being taken to minimize project risks. In most cases, an organization aims to address the biggest risks and strives for sufficient risk mitigation at the lowest cost, with minimal impact on other mission capabilities.
Position the mouse pointer over the following risk mitigation steps in control implementation. Next, click the ACTIVITY button to attempt a process exercise.
Risk assessment
report
NIST SP 800-53
Prioritize actions
Evaluate recommended control options
Conduct a cost-benefit analysis
Select controls
Assign responsibilities
Develop a safeguard implementation plan
Implement selected controls
Actions ranking from high to low
List of possible controls
Cost-benefit analysis
Selected controls
List of responsible persons
Safeguard implementation plan
Residual risks
Prioritize actions
On the basis of the risk levels presented in the risk assessment report, implementation actions are prioritized. In allocating resources, top priority should be given to risk items with unacceptably high risk rankings.
Evaluate recommended control options
In this step, the feasibility, such as compatibility, user acceptance, and effectiveness, such as degree of protection and level of risk mitigation, of the recommended control options are analyzed. The objective is to select the most appropriate control option for minimizing risk.
Conduct a cost-benefit analysis
To aid management in decision making and to identify cost-effective controls, a cost-benefit analysis is conducted.
Select controls
On the basis of the results of the cost-benefit analysis, management determines the most cost-effective controls for reducing risk. Controls are selected from the National Institute of Standards and Technology (NIST) SP 800-53, which covers extensive documentation on controls.
Assign responsibilities
Appropriate people—in-house personnel or external contracting staff—who have the appropriate expertise and skill sets to implement the selected controls are identified, and responsibility is assigned to them.
Develop a safeguard implementation plan
This plan must contain the following information:
- Risks and associated risk levels
- Prioritized actions
- Recommended controls
- Selected planned controls
- Responsible people
- Start date
- Target completion date
- Maintenance requirements
Implement selected controls
Depending on the situation, the implemented controls may lower the risk level but not eliminate the risk.
Key Roles Involved in Risk Mitigation
Frequently, the cost of implementing a control is more tangible than the cost of not implementing it. As a result, senior management plays a critical role in decisions concerning the implementation of control measures to protect the organizational mission. Read the given scenario to learn how senior managers and functional managers help in risk mitigation.

Consider an e-commerce site. A critical risk for such an organization is the uptime of the site. Suppose the Web server fails and cannot process sales. The sales lost during the time the server is being repaired are direct costs. Indirect costs include the loss of customer goodwill and the cost to restore the goodwill. As these losses are a high-level risk, senior management will need to recommend an appropriate control for risk mitigation. The functional manager will identify the maximum acceptable outage (MAO).
The senior and functional managers need to address the following key questions:
- How does this service affect the organization's profitability?
- How does this service affect the organization's survivability?
- How does this service affect the organization's image?
- How will an outage affect employees and customers?
- When does this service need to be available?
- What is the MAO of the service?
Senior management, in this case, recommends that functional managers use the least-cost approach and implement the most appropriate controls to decrease the mission risk to an acceptable level, with a minimal adverse impact.
Risk Mitigation Best Practices
When creating any risk management plan, it is essential that the following seven best practices be considered and that checks be in place to ensure that risk mitigation costs do not outweigh risk-materializing costs. Click each keyword to read more about the best practices.
Next, click the ACTIVITY button to attempt an exercise based on the best practices followed by Ken, a network administrator.
- Stay within the scope.
- Redo the cost-benefit analysis.
- Prioritize countermeasures.
- Include current countermeasures in the analysis.
- Control costs.
- Control the schedule.
- Follow up.
Ensure the scope of the mitigation plan does not go beyond the scope of the risk assessment.
Redo the cost-benefit analysis if new costs are identified. You commonly complete a cost-benefit analysis for a countermeasure as part of the risk assessment.
Ensure the countermeasures must be prioritized, depending on their importance.
When scoring countermeasures, ensure that current countermeasures are considered.
Ensure the costs stay within the allocated budget.
Ensure the schedule is not delayed; otherwise, the costs might go up.
Implement approved countermeasures and ensure that they mitigate the risk as expected.
Importance of Prioritization
Risk, threats, and vulnerabilities adversely affect the business of an organization and can be assessed as:
- Costs associated with the loss of a business component or process
- Loss of customer confidence
- Lack of compliance
- Lack of insurance to mitigate or transfer risk
Therefore, it is important to prioritize risks and implement controls to mitigate them. You can do so by using a threat/vulnerability matrix. Study the following threat likelihood impact matrix to learn how to use it to prioritize threats. Click the Next button to read more.
Attacks with the highest scores need to be dealt with first. For example, in this case, the biggest threats are the two with a score of 50. Therefore, the organization would find risk mitigation strategies for these two risks on priority.
Next
A threat/likelihood-impact matrix.
High threat likelihood 100 percent (1.0)
Medium threat likelihood 50 percent (.50)
Low threat likelihood 10 percent (.10)
LOW IMPACT (10)
10 x 1 = 10
10 x .5 = 5
10 x .1 = 1
MEDIUM IMPACT (50)
50 x 1 = 50
50 x .5 = 25
50 x .1 = 5
HIGH IMPACT (100)
100 x 1 = 100
100 x .5 = 50
100 x .1 = 10
Back
Threat scores used to prioritize threats.
THREAT
Attacks on DMZ servers
Servers in the DMZ are currently updated only once every six months.
Loss of data on key database server
Backups are currently done on the database server daily but recent restore attempts were not successful.
Loss of data due to fire
Backups are done regularly but stored in the server room.
Malware infection
Antivirus software is currently installed on all systems.
LIKELIHOOD
High Value of 100 percent
Medium Value of 50 percent
Low Value of 10 percent
Low Value of 10 percent
IMPACT
Medium Value of 50
High Value of 100
High Value of 100
Low Value of 10
SCORE
50
50
10
1
Senior management at DLIS has reviewed the risk assessment plan and given the go-ahead to create a risk mitigation plan based on inputs provided. Senior management has also approved a budget for the risk mitigation plan and is committed to supporting the project, given the plan’s importance to the organization.
You need to develop a risk mitigation plan based on the previous findings. The project is critical for the organization’s health; therefore, you need to complete it as quickly as possible. To help you complete this project on time, we have assigned Bob as the project manager. I have already explained to him the requirements. He is creating a timeline and will share it with you soon.
Contributing Factors
Click each contributing factor below to review its content and gather inputs for the risk mitigation plan. After you have gone through the contributing factors, navigate to Course of Action from the panel at the top of your screen.

Review Critical Considerations

Research the Internet
Select the icons from the top to receive additional
information related to the situation
- Analyze and evaluate the threat and vulnerability areas you identified for Health Network.
- Make a list of personnel (job roles) you should interviews to gain insight into possible new issues.
- Consider what should be the elements of this plan, which elements are essential, and which elements could be optional.
Consider what information you need to provide about the layers of security. Answers to the following questions will help you complete this assignment:
- What are the vulnerabilities for the Web server?
- What tools, applications, and best practices are available for providing the layers of security to a Linux system?
- Which tools or applications are secure and stable?
- What modifications are required in SELinux?
- What rules can be specified in TCP wrappers?
- Should a firewall be software or hardware?
- If hardware, should it be configured as a bastion host?
- If not a bastion host, what other application or process should be configured along with the firewall?
Use google.com to view sample risk mitigation plans. Read and understand the objectives and requirements of each risk mitigation plan.
Course of Action
Use the following checklist as a guide to complete this assignment. Note that the tasks that you have completed are already checked in the list.