What this checklist covers
This is a cybersecurity risk assessment checklist — a sequenced set of action items that walks
an assessment team from scope definition through post-assessment follow-through. Whether
you're running the assessment internally, managing an external assessor, or preparing for your first
security risk assessment as a growth-stage company, the checklist ensures nothing material gets skipped.
The checklist is structured in four phases: pre-assessment preparation, assessment execution,
deliverables verification, and post-assessment follow-through. Each phase builds on the previous
one — skip the pre-assessment scoping and the execution phase produces findings without business
context; skip the deliverables check and you get a report without a treatment plan; skip
post-assessment and the risk register gathers dust until the next audit cycle.
For the full methodology behind each phase — frameworks compared, qualitative vs quantitative
approaches, common mistakes, and cost benchmarks — see the
Security Risk Assessment: Complete Guide. This
page is the operational companion: the checklist you print, assign, and track.
If you're looking for how this fits into broader governance,
risk, and compliance (GRC) operations, the risk assessment checklist is the execution layer
beneath your cybersecurity governance framework.
Pre-assessment checklist
The pre-assessment phase defines what you're assessing, who's involved, what framework you'll use,
and what resources are available. Rushing past this phase is the most common reason assessments
produce technically accurate findings with no business context — making them impossible to
prioritize. Every item here should be completed before scanning a single system.
Scope definition
Define assessment boundaries: which business units, systems, data types, and third-party relationships are in scope
Document what is explicitly out of scope and the rationale for each exclusion
Identify regulatory drivers that mandate specific scope elements (HIPAA, PCI-DSS, SOX, GLBA, GDPR, state privacy laws)
Confirm whether cloud environments (AWS, Azure, GCP) are in scope — including IaaS, PaaS, and SaaS layers
Determine whether third-party / supply-chain risk is in scope or deferred to a separate assessment
Document the triggering event: annual cadence, regulatory requirement, pre-acquisition, post-incident, or environment change
Stakeholder identification
Identify the executive sponsor (typically CISO, CTO, or CEO at smaller companies) who owns the assessment outcome — companies without a full-time CISO often engage a
fractional CISO to lead the assessment
Map business owners for each critical system — the people who know the business value, not just the technical configuration
Schedule structured interviews with asset owners (15 minutes per system: what data, what happens if down 24 hours, worst-case exfiltration scenario)
Identify the risk owner for each scope area — the person accountable for treatment decisions, not just the person who runs the scan
Confirm board or audit committee reporting requirements and the format they expect
Asset inventory preparation
Compile or verify the existing asset inventory (servers, endpoints, cloud accounts, SaaS applications, network infrastructure)
Identify where regulated data lives: PII, PHI, payment card data, intellectual property, customer credentials
Map data flows between systems — especially flows that cross trust boundaries (internal-to-cloud, vendor-to-production, dev-to-prod)
Tag each asset with its business criticality classification (use a 3-tier minimum: critical, important, standard)
Document which business processes depend on which systems — a compromised HR system and a compromised payment system have different business impacts
If no asset inventory exists, flag this as the first deliverable of the assessment itself
Framework selection and timeline
Select the primary assessment framework: NIST SP 800-30, ISO 27005, CIS RAM, or OCTAVE (see
framework comparison)
Establish the assessment timeline: 4–6 weeks for focused scope, 8–12 weeks for comprehensive enterprise assessment
Allocate internal resources: security team hours, business-owner interview time, IT support for scanning access
If using an external assessor, confirm their methodology, deliverables, and timeline in writing before engagement starts
Set the risk appetite threshold that will determine which risks require treatment vs acceptance
Assessment execution checklist
The execution phase follows the six-step process documented in the
complete guide. Each step below includes
the specific action items that constitute thorough execution. The sequence matters — each step
depends on the output of the previous one.
Asset identification and classification
Complete the asset inventory for all in-scope systems, including shadow IT discovered during the process
Classify each asset by data sensitivity (public, internal, confidential, restricted)
Assign a dollar value or value range to each critical asset — based on revenue impact, regulatory liability, and replacement cost
Verify asset ownership: every asset has a named business owner, not just a technical administrator
Document interconnections and dependencies between assets (if System A goes down, what else breaks?)
Threat identification
Build a threat catalog specific to your industry, size, and profile — not a generic list of "nation-state actors"
Map threats to
MITRE ATT&CK techniques for structured analysis
Review industry-specific threat intelligence reports for the last 12 months
Analyze your own incident history and near-misses from the last 24 months
Include insider threat scenarios — privileged employees, contractors with system access, departing staff
Vulnerability analysis
Run automated vulnerability scans across all in-scope systems (Nessus, Qualys, Rapid7, or OpenVAS)
Perform configuration review against CIS Benchmarks or cloud-provider security best practices
Review cloud IAM posture: over-permissive roles, public storage buckets, exposed service accounts
Check process and control gaps: missing MFA, no off-boarding process, unencrypted backups, no IR plan
Review application-layer vulnerabilities if custom applications are in scope (OWASP Top 10, secure SDLC gaps)
Assess third-party and supply-chain vulnerabilities for critical vendors
Map each vulnerability to the assets from the asset identification phase
Control evaluation
Document existing security controls for each risk area (preventive, detective, corrective)
Evaluate control effectiveness — does the control actually reduce the risk it's supposed to, or is it checkbox compliance?
Identify control gaps: areas where no control exists for a documented threat/vulnerability pair
Review security tooling coverage: EDR, SIEM, identity provider, vulnerability management, email security, DLP
Verify that controls are operating as designed (test, don't assume — review logs, run tabletop scenarios)
Assess security awareness program effectiveness: phishing simulation results, training completion rates
Risk analysis
Combine threat and vulnerability data against asset context to produce a risk estimate for each finding
Apply qualitative ratings (likelihood x impact on a consistent scale) across all findings for initial triage
Document the assumptions behind each risk rating — these will be challenged during review and must be defensible
Factor in existing controls when estimating residual risk — a vulnerability behind strong compensating controls is different from an uncontrolled one
Risk evaluation and prioritization
Rank all risks by combined risk score (qualitative) or annual loss expectancy (quantitative)
Plot high-level risks on a likelihood-vs-impact matrix for executive communication
Assign a risk owner to each finding — not the person who discovered it, the person accountable for the treatment decision
Select treatment strategy for each risk: mitigate, transfer, accept, or avoid
For accepted risks, document the acceptance rationale and get sign-off at the appropriate authority level
Sequence treatment priorities: which risks must be addressed first based on exposure, regulatory deadlines, or business impact?
Deliverables checklist
A completed security risk assessment produces five deliverables. If any are missing, the assessment
is incomplete — you have findings without a pathway to action. Use this section to verify completeness
whether you're running the assessment internally or evaluating an external assessor's output.
Risk register
Every identified risk has a finding description written in business terms, not just technical jargon
Each finding includes affected assets and systems mapped from the asset inventory
Likelihood rating (qualitative) or loss-event frequency estimate (quantitative) is documented for each risk
Impact rating (qualitative) or loss magnitude in dollars (quantitative) is documented for each risk
A named risk owner is assigned to every finding
Recommended treatment (mitigate, transfer, accept, avoid) is specified for each risk
Existing controls that partially address the risk are documented
Executive summary
Summary is 2–4 pages maximum — concise enough for board members and C-suite who won't read the full register
Overall risk posture is stated clearly (not buried in qualifications)
Top 5 risks are highlighted with business-language descriptions
Investment required to address top risks is quantified with dollar ranges
Comparison to previous assessment is included if one exists (trending better, worse, or flat)
Treatment plan
Each treatment includes specific remediation actions — concrete steps, not "improve security posture"
Timeline and milestones are set for every treatment
Resource requirements are documented: headcount, budget, tools needed
A responsible owner is assigned to each action item (not just the risk owner — the person doing the work)
Expected risk reduction is estimated for each treatment (what does the residual risk look like after completion?)
Dependencies between treatments are identified (some treatments require other treatments first)
Residual risk statement
Residual risk after all planned treatments is documented explicitly
Each accepted risk has documented rationale for acceptance
Residual risk statement is reviewed and signed off by leadership (CISO, risk committee, or board)
Residual risk is expressed in terms the board can act on — ideally dollars, not just ordinal ratings
Trend comparison
New risks that emerged since the last assessment are identified
Previously identified risks that were successfully treated are documented
Risks that worsened since the last assessment are flagged with explanation
Overall posture trend direction is stated: improving, stable, or degrading
If this is the first assessment, note that trend comparison begins with the next cycle
Post-assessment checklist
The assessment itself is a point-in-time snapshot. Without post-assessment follow-through, the
risk register becomes another compliance artifact that gathers dust until the next audit cycle.
This phase turns findings into operational change.
Treatment tracking
Import every treatment into the organization's project management system — each treatment becomes a ticket with an owner, deadline, and status
Establish a treatment-completion reporting cadence (monthly for active treatments, quarterly for the full register)
Define escalation criteria: what happens when a treatment misses its deadline or the risk owner changes?
Track treatment effectiveness — after implementation, verify that the control actually reduced the risk as expected
Quarterly review cadence
Schedule quarterly risk register reviews — even between full annual assessments
Review treatment completion status and update risk scores based on completed mitigations
Assess whether new threats, incidents, or environment changes warrant risk-score adjustments
Update the executive summary with current posture for board or audit committee reporting
Report treatment metrics to leadership: percentage completed on time, percentage overdue, new risks added
Re-assessment triggers
Document the triggers that require a targeted re-assessment before the next annual cycle
Acquisition or merger (target or acquirer) — new systems, data, and regulatory obligations enter scope
Major cloud migration or infrastructure change — the asset inventory and control landscape shifts
Significant security incident — the threat model and control effectiveness assumptions may be invalidated
New regulatory requirement — HIPAA, PCI-DSS, state privacy law, or industry-specific mandate entering scope
Major application launch or product change — new attack surface and data flows
Stakeholder communication
Deliver the executive summary to the board or audit committee within 30 days of assessment completion
Brief business owners on findings relevant to their systems and the treatment plan
Communicate accepted risks to leadership with explicit sign-off documentation
Share relevant findings with the cyber insurance broker for policy review and renewal preparation
Continuous monitoring setup
Set up cloud security posture monitoring (
CSPM) for configuration drift detection
Establish alerting thresholds that trigger re-assessment of specific risk register items
Integrate continuous monitoring output into the quarterly review process
Customizing the checklist by industry
The checklist above is framework-agnostic and applies to any organization running a security risk
assessment. But regulatory requirements, data types, and threat profiles differ by industry — and
the checklist should reflect those differences. Below are the industry-specific additions that
supplement the universal checklist.
Healthcare (HIPAA)
Conduct a HIPAA Security Risk Analysis as a documented component of the assessment (45 CFR 164.308(a)(1))
Map all electronic protected health information (ePHI) flows — including to business associates, cloud services, and analytics platforms
Verify Business Associate Agreements (BAAs) are current for every vendor that touches ePHI
Assess breach notification readiness: can you notify HHS and affected individuals within the 60-day HIPAA window?
Review physical safeguards for systems that store or process ePHI (workstation use, facility access controls)
Document the previous HIPAA risk analysis and confirm findings were addressed — auditors check this
Financial services (SOX, PCI-DSS, GLBA)
Scope SOX IT General Controls (ITGCs) for systems that support financial reporting
If payment card data is processed, verify PCI-DSS scope and include cardholder data environment (CDE) in the assessment
Assess GLBA Safeguards Rule compliance: risk assessment is an explicit requirement under the rule
Review NYDFS Part 500 cybersecurity requirements if operating in New York (penetration testing, CISO appointment, incident notification)
Include FFIEC Cybersecurity Assessment Tool alignment if subject to federal banking examination
Document segregation of duties controls for financial systems and privileged access management
SaaS and technology (SOC 2)
Map risk assessment findings to SOC 2 Trust Services Criteria (CC3 — Risk Assessment) for audit readiness
Include multi-tenant isolation as a specific risk category — verify that tenant data cannot cross boundaries
Assess secure SDLC practices: code review, dependency scanning, secrets management, CI/CD pipeline security
Review API security posture: authentication, rate limiting, input validation, logging
Evaluate customer-facing security features: SSO support, audit logging, data export/deletion capabilities
If pursuing SOC 2 Type II, confirm that the risk assessment documentation meets the assessor's evidence requirements
Government and defense (FedRAMP, CMMC)
Align the assessment with NIST SP 800-53 controls at the appropriate impact level (Low, Moderate, High)
If pursuing FedRAMP authorization, document the assessment as part of the System Security Plan (SSP)
For CMMC compliance, verify that the assessment covers all practices at the target maturity level
Include Controlled Unclassified Information (CUI) handling as a specific scope element if applicable
Assess supply-chain risk in accordance with NIST SP 800-161 (supply chain risk management)
Verify that the assessment meets the continuous monitoring requirements of the applicable authorization framework
Want expert-led assessment instead of DIY?
vCSO.ai conducts risk assessments grounded in FAIR methodology —
from scope definition through quantified risk register and board-ready executive summary.
Nick Shevelyov, former 15-year Chief Security Officer at Silicon
Valley Bank, leads every engagement with the same assessment methodology used to protect the
bank of the innovation economy.
Request a consultation to scope
your assessment, or explore Theodolite —
vCSO.ai's unified security platform where risk assessment findings feed the same
FAIR-based dollar-risk
model that drives vulnerability management,
CSPM, and cyber risk quantification.
Nick's book on cybersecurity strategy,
Cyber War...and Peace, covers risk assessment methodology,
board-level cyber governance, and building security programs that survive the transition from startup
to enterprise.