Table of Contents
1 Purpose & Scope
This document defines FindTheBreach's formal risk assessment methodology for identifying, evaluating, prioritizing, and treating information security risks. The methodology is aligned with SOC 2 CC3 (Risk Assessment), ISO 27001 clause 6.1.2 (Information Security Risk Assessment), NIST Cybersecurity Framework ID.RA (Risk Assessment), and CIS Control 3 (Data Protection).
Scope. This methodology applies to:
- All information assets, systems, and services operated by FindTheBreach
- All personnel responsible for risk identification, assessment, and remediation
- All third-party integrations, vendor relationships, and supply chain dependencies
- All computing environments including production, staging, development, and disaster recovery
- Customer-facing scanning infrastructure and data processing pipelines
This methodology provides a consistent, repeatable, and auditable framework for making risk-based decisions that protect FindTheBreach's operations and customer data.
2 Risk Identification Process
Risks are identified through multiple complementary sources to ensure comprehensive coverage across technical, operational, and organizational domains.
Identification Sources:
- Automated Scanning — 40+ integrated security tools continuously identify vulnerabilities across infrastructure, applications, and configurations
- EASM Monitoring — External Attack Surface Management continuously discovers and monitors internet-facing assets for exposure and misconfiguration
- Threat Intelligence Feeds — Curated threat intelligence provides context on emerging threats, active exploits, and threat actor campaigns
- Manual Penetration Testing — Scheduled and ad-hoc penetration tests identify risks that automated tooling may miss
- Vendor Risk Assessments — Third-party and supply chain risk evaluations identify risks introduced through external dependencies
- Change Management Review — All significant changes to systems, configurations, and processes are evaluated for risk impact prior to implementation
- Incident Post-Mortems — Lessons learned from security incidents and near-misses are fed back into the risk identification process
- Employee Reports — All personnel are encouraged to report potential risks, suspicious activity, and security concerns through established channels
Identified risks are documented with sufficient detail to enable consistent scoring and are assigned to a risk owner for further evaluation.
3 Risk Scoring Criteria
Risks are scored using a 5×5 matrix that evaluates Likelihood (probability of occurrence) against Impact (severity of consequence). The Risk Score is calculated as:
Likelihood Scale:
- 1 — Rare: Unlikely to occur; no historical precedent
- 2 — Unlikely: Could occur but not expected; limited precedent
- 3 — Possible: May occur at some point; some precedent exists
- 4 — Likely: Expected to occur in most circumstances
- 5 — Almost Certain: Expected to occur imminently or is already occurring
Impact Scale:
- 1 — Negligible: Minimal effect on operations; no data exposure
- 2 — Minor: Limited disruption; minor data or financial impact
- 3 — Moderate: Noticeable operational impact; potential regulatory concern
- 4 — Major: Significant disruption; data breach or major financial loss
- 5 — Critical: Catastrophic impact; business continuity threat; large-scale data breach
Risk Matrix:
| 1 — Negligible | 2 — Minor | 3 — Moderate | 4 — Major | 5 — Critical | |
|---|---|---|---|---|---|
| 5 — Almost Certain | 5 | 10 | 15 | 20 | 25 |
| 4 — Likely | 4 | 8 | 12 | 16 | 20 |
| 3 — Possible | 3 | 6 | 9 | 12 | 15 |
| 2 — Unlikely | 2 | 4 | 6 | 8 | 10 |
| 1 — Rare | 1 | 2 | 3 | 4 | 5 |
Rows = Likelihood | Columns = Impact | Cell values = Risk Score
4 Risk Classification
Based on the calculated risk score, each risk is classified into one of four levels with corresponding response timelines:
Score 20–25 — Immediate action required within 24 hours
Mandatory executive escalation. Incident response may be triggered. Customer notification assessed.
Score 12–19 — Action required within 7 days
Escalation to risk owner within 24 hours. Remediation plan documented and tracked.
Score 6–11 — Action required within 30 days
Risk owner develops treatment plan. Progress reviewed in next quarterly cycle.
Score 1–5 — Accept or monitor
Document acceptance rationale. Review during quarterly assessment cycle.
5 Risk Treatment Options
For each identified and scored risk, one of the following treatment strategies must be selected and documented by the risk owner:
Accept
- Document rationale for acceptance
- Obtain sign-off from risk owner
- Review quarterly to confirm acceptance remains valid
Mitigate
- Implement compensating controls
- Track remediation to completion
- Re-score risk after mitigation is applied
Transfer
- Transfer via cyber insurance coverage
- Delegate to qualified third-party provider
- Ensure contractual risk allocation is documented
Avoid
- Eliminate the activity or system creating the risk
- Document business impact of avoidance
- Obtain approval from Risk Committee
6 Risk Register Management
All identified risks are maintained in the in-platform Risk Register, providing a centralized, auditable record of risk posture. Each entry contains the following fields:
| Field | Description |
|---|---|
| Risk ID | Unique identifier (e.g., RISK-2026-001) |
| Title | Concise description of the risk |
| Category | Technical, operational, compliance, third-party, etc. |
| Likelihood | Score 1–5 per likelihood scale |
| Impact | Score 1–5 per impact scale |
| Risk Score | Likelihood × Impact (1–25) |
| Owner | Individual accountable for treatment |
| Treatment | Accept, Mitigate, Transfer, or Avoid |
| Status | Open, In Progress, Mitigated, Accepted, Closed |
| Review Date | Next scheduled review date |
All entries are reviewed on a quarterly basis at minimum. Changes to risk scores, treatment plans, or ownership are logged with timestamps and attribution for audit purposes.
7 Review Cadence
The risk assessment program follows a structured review cadence to ensure risks remain current and treatment plans are effective:
- Quarterly Full Review — Complete review of all entries in the Risk Register. Likelihood and impact scores are re-evaluated based on current threat landscape and control effectiveness.
- Ad-Hoc Review — Triggered after significant incidents, major system changes, new threat intelligence, or material changes to the business environment.
- Annual Methodology Review — The risk assessment methodology itself is reviewed and updated to reflect evolving standards, regulatory requirements, and lessons learned.
Risk Committee. Reviews are conducted by the Risk Committee, which includes:
- Chief Information Security Officer (CISO) — Chair
- Chief Technology Officer (CTO)
- Compliance Lead
Minutes of each Risk Committee meeting are documented and retained for a minimum of three years.
8 Escalation Thresholds
Escalation ensures that risks above defined thresholds receive timely attention from appropriate decision-makers:
Immediate escalation to executive team
CISO notifies CEO/CTO immediately. Incident response procedures may be activated. Customer notification is assessed for any risk that could affect data confidentiality or service availability.
Escalation within 24 hours to risk owner
Risk owner develops and documents a remediation plan. Customer notification is evaluated if applicable to service-level commitments.
All escalation actions and decisions are logged in the Risk Register with timestamps and responsible parties for audit trail purposes.
9 Continuous Monitoring Integration
FindTheBreach's risk assessment is not a point-in-time exercise. The following automated systems feed directly into the risk management lifecycle:
- Automated Vulnerability Scanning — Continuous scanning results are correlated with the Risk Register. New critical and high vulnerabilities automatically generate risk entries for triage.
- EASM Change Detection — Changes to external attack surface (new subdomains, exposed services, certificate expirations) trigger automated risk reassessment workflows.
- Anomaly Detection — The platform's anomaly detection engine (
app/anomaly_detector.py) monitors for behavioral anomalies and triggers real-time risk alerts when deviations exceed configured thresholds.
These integrations ensure that the Risk Register reflects current conditions and that emerging threats are identified and assessed without manual intervention.
10 Document Control
| Version | 1.0 |
| Effective Date | February 2026 |
| Next Review Date | May 2026 |
| Approved By | Chief Information Security Officer (CISO) |
| Owner | Find The Breach LLC |
| Classification | Internal — Trust Center Publication |
Policy Contact
Chief Information Security Officer (CISO), Find The Breach LLC
Email: security@findthebreach.com