NIST 800-53 REV 5 • RISK ASSESSMENT

RA-3Risk Assessment

Conduct a risk assessment, including: Identifying threats to and vulnerabilities in the system; Determining the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system, the information it processes, stores, or transmits, and any related information; and Determining the likelihood and impact of adverse effects on individuals arising from the processing of personally identifiable information; Integrate risk assessment results and risk management decisions from the organization and mission or business process perspectives with system-level risk assessments; Document risk assessment results in {{ insert: param, ra-03_odp.01 }}; Review risk assessment results {{ insert: param, ra-03_odp.03 }}; Disseminate risk assessment results to {{ insert: param, ra-03_odp.04 }} ; and Update the risk assessment {{ insert: param, ra-03_odp.05 }} or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.

CMMC Practice Mapping

NIST 800-171 Mapping

Supplemental Guidance

Risk assessments consider threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation. Risk assessments also consider risk from external parties, including contractors who operate systems on behalf of the organization, individuals who access organizational systems, service providers, and outsourcing entities. Organizations can conduct risk assessments at all three levels in the risk management hierarchy (i.e., organization level, mission/business process level, or information system level) and at any stage in the system development life cycle. Risk assessments can also be conducted at various steps in the Risk Management Framework, including preparation, categorization, control selection, control implementation, control assessment, authorization, and control monitoring. Risk assessment is an ongoing activity carried out throughout the system development life cycle. Risk assessments can also address information related to the system, including system design, the intended use of the system, testing results, and supply chain-related information or artifacts. Risk assessments can play an important role in control selection processes, particularly during the application of tailoring guidance and in the earliest phases of capability determination.

Practitioner Notes

A risk assessment systematically identifies threats and vulnerabilities to your systems, evaluates the likelihood and impact of exploitation, and determines the level of risk. This is the core analytical activity of risk management.

Example 1: Conduct an annual risk assessment for each system using a structured methodology: identify threats (malware, phishing, insider threat, natural disaster), identify vulnerabilities (unpatched systems, weak passwords), estimate likelihood and impact, and calculate a risk score. Document everything in a risk assessment report.

Example 2: Use a GRC tool or even a well-structured spreadsheet to maintain your risk register. For each risk, record the threat source, vulnerability, existing controls, residual risk level, and planned mitigations. Review the register with leadership quarterly and update it when vulnerability scans or threat intelligence reveal new risks.