Framework
13 min readFebruary 28, 2026

Risk Assessment Frameworks: Types, Steps & Best Practices

A comprehensive guide to risk assessment frameworks — what they are, which ones are most widely used, and how to conduct a risk assessment that actually drives decisions.

Risk Assessment Frameworks: Types, Steps & Best Practices

What is a risk assessment framework?

A risk assessment framework is a structured methodology for identifying, analyzing, and evaluating risks. It defines the process, terminology, scoring scales, and outputs that ensure risk assessments are consistent, repeatable, and comparable across an organization over time.

Without a framework, different teams assess the same type of risk differently — making it impossible to aggregate results, set meaningful risk appetite statements, or produce credible reports for leadership.

Why frameworks matter

Consistency is the core value proposition of a risk assessment framework. When risk A is scored "High" in Q1 and "Medium" in Q3, you need to know whether the risk genuinely changed or whether different people applied different definitions. A well-designed framework eliminates this ambiguity.

Frameworks also support communication. A common vocabulary for risk — "inherent risk", "residual risk", "control effectiveness", "risk appetite" — lets risk managers, business owners, and board members speak the same language.

The major risk assessment frameworks

ISO 31000:2018

The international standard for risk management provides principles and guidelines applicable to any organization, regardless of size, sector, or country. ISO 31000 is not a certification standard — you can't be "ISO 31000 certified" — but it provides a rigorous foundation for building your risk management approach. It emphasizes risk management as a dynamic, iterative process integrated into organizational governance.

COSO ERM Framework (2017)

Developed by the Committee of Sponsoring Organizations of the Treadway Commission, COSO ERM is the most widely referenced framework in corporate governance and internal controls. The 2017 update explicitly connects risk management to strategy and performance — not just compliance. It organizes ERM around five components: Governance & Culture, Strategy & Objective-Setting, Performance, Review & Revision, and Information/Communication/Reporting.

NIST Risk Management Framework (RMF)

Originally designed for US federal information systems, NIST RMF has become the de facto standard for IT and cybersecurity risk management globally. It follows six steps: Categorize, Select, Implement, Assess, Authorize, Monitor. The NIST Cybersecurity Framework (CSF), a related publication, is used by thousands of private-sector organizations for managing cyber risk.

FAIR (Factor Analysis of Information Risk)

FAIR is a quantitative risk analysis framework that translates risk into financial terms. Rather than a 1–5 likelihood/impact matrix, FAIR produces a range of probable loss in monetary units. It is particularly valuable for communicating cyber risk to boards and CFOs who want to understand risk in dollar terms, not color codes.

Basel III Operational Risk Framework

For banks and financial institutions, Basel III prescribes specific methodologies for measuring and capitalizing operational risk. The Standardized Approach and the Advanced Measurement Approach (now replaced by the Standardized Measurement Approach in Basel IV) define how operational risk exposures translate into capital requirements.

How to conduct a risk assessment: step by step

Step 1: Define scope and context

Before assessing anything, define what you are assessing. Is this an organization-wide ERM assessment? A project-level risk assessment? A departmental risk review? The scope determines who participates, what risk categories are relevant, and how the results will be used.

Also establish the context: your organization's strategic objectives, external environment (market, regulatory, geopolitical), and internal environment (culture, structure, resources). Risk doesn't exist in a vacuum.

Step 2: Establish risk criteria

Define your scoring scales before you score a single risk. Agree on:

  • The likelihood scale and what each score means (e.g. "Likely = will probably occur within the next 12 months")
  • The impact scale and what each score means across multiple dimensions (financial, operational, regulatory, reputational)
  • The risk appetite — what score threshold separates acceptable from unacceptable risk
  • Risk tolerance — the range of acceptable variation around the appetite

Step 3: Identify risks

Use multiple identification methods in parallel:

  • Structured workshops with business leaders
  • Process analysis — mapping key processes and identifying failure points
  • Incident analysis — what has gone wrong historically?
  • External horizon scanning — what risks are peers and regulators highlighting?
  • AI-assisted analysis — modern tools can suggest risks based on your industry and context

Write each risk as a risk statement: "There is a risk that [event] occurs due to [cause], resulting in [consequence]." This format forces clarity about what is actually being assessed.

Step 4: Analyze risks

For each identified risk, score:

  • Inherent likelihood and inherent impact — before any controls. This represents the "raw" risk exposure.
  • Then identify existing controls (preventive and detective) that are currently operating to mitigate the risk.
  • Score control effectiveness — are the controls well-designed and operating consistently?
  • Derive residual likelihood and residual impact — after controls.

Step 5: Evaluate risks against appetite

Compare each residual risk score to your risk appetite. Risks that fall above the appetite threshold require a response. Risks within appetite are accepted — but still monitored.

Produce a risk heat map — a visual matrix plotting residual risks by likelihood and impact. This is the standard output for presenting risk assessment results to leadership.

Step 6: Prioritize and plan responses

Not all risks above appetite are equally urgent. Prioritize based on:

  • Severity of the residual risk score
  • Velocity — how quickly could the risk materialize?
  • Manageability — how much can controls actually reduce this risk?
  • Strategic importance — does this risk threaten a core business objective?

For each high-priority risk, define a specific response plan with named actions, owners, and deadlines.

Step 7: Monitor and review

A risk assessment is not a point-in-time event. Risks change as the business and environment change. Build a monitoring cadence:

  • Automated alerts when key risk indicators cross thresholds
  • Periodic re-scoring (at minimum annually; quarterly for top risks)
  • Triggered reassessment after incidents, major decisions, or external shocks

Qualitative vs quantitative assessment

Most organizations use a qualitative approach — a matrix with descriptive likelihood and impact scales. It is fast, accessible, and sufficient for most risk management purposes.

Quantitative assessment (like FAIR) produces probability distributions and financial loss estimates. It is more credible for high-stakes decisions and board-level communication but requires more data, expertise, and time.

A pragmatic approach: use qualitative scoring for the full risk inventory, and apply quantitative analysis to the top 5–10 risks where the investment in rigor is justified by the stakes.

Best practices

  • Define your scoring criteria in writing and make them available to all risk owners
  • Calibrate scores across teams — run a workshop where different teams score the same hypothetical risk and discuss the results
  • Document the rationale for scores, not just the scores themselves
  • Track changes over time — a risk that was "High" six months ago and is now "Medium" should have a documented explanation
  • Use technology to enforce consistency — a good risk platform prevents different users from applying different scales

Ready to put this into practice?

Reesk gives you the tools to manage risks, controls and compliance — all in one platform. Start free.

Get started free — no credit card required