Risk Management

Spot risks early. Act faster. Sleep better.

Map assets, threats, and vulnerabilities, score risk with a transparent model, assign treatments, and track residual risk with live dashboards and audit-ready logs.

Create a risk Explore features
Live heatmapauto-refresh by events
Residual ↓track post-treatment
MTTRmonitor time to close
Coveragerisks ↔ controls map
Risk heatmap / dashboard placeholder

Operational risk management — built for real-time GRC

From discovery to treatment to evidence, everything stays linked and auditable.

Identify

Asset–Threat–Vulnerability map

Link assets to relevant threats and vulnerabilities, with deduping and criticality inherited from asset CIA scoring.

Assess

Transparent scoring model

Combine Asset Value (CIA), CVSS/Vuln severity, Threat Impact, Likelihood, and Control Effectiveness to compute inherent and residual risk.

Treat

Treatment plans

Accept, Avoid, Transfer, or Mitigate with controls, owners, due dates, SLAs, and escalation paths.

Track

Risk register

Custom fields, status transitions, evidence attachments, and immutable activity logs.

Visualise

Heatmaps & dashboards

Portfolio heatmaps, trend lines, overdue treatments, and top risks by asset, owner, or control gap.

Automate

Rules & alerts

Auto-recalculate on changes, notify owners, and push tasks to tickets or chat when thresholds are breached.

Tip: Map risks to policies and controls so audits show control coverage and treatment effectiveness instantly.

Key features

Everything you need to run a living risk program.

Vulnerability intake

Import CSV/JSON or use the API. Auto-map CVSS, dedupe findings, and link to affected assets.

Threat library

Maintain a reusable threat catalogue per sector, with default impacts/likelihood presets you can tune.

Scoring model controls

Adjust weightings for CIA, CVSS, Likelihood, and Control Effectiveness. Toggle uncertainty buffers and caps.

Controls mapping

Link primary and secondary controls, effectiveness levels, and test results to compute residual risk.

Dependencies

Cascade risk via asset relationships (e.g., shared services) to avoid blind spots and concentration risk.

Evidence & audit trail

Time-stamped actions, e-sign approvals, and exportable registers for boards, customers, and regulators.

Workflow: from discovery to residual risk

Opinionated defaults; fully configurable for your risk methodology.

1

Discover assets

Sync or import assets with owners and CIA. Classify and tag for reporting and access control.

2

Ingest vulns & threats

Pull in findings and attach relevant threats. Auto-suggest linkages based on asset type and tags.

3

Score inherent risk

Compute using CIA + CVSS + Likelihood + Impact with tunable weights and ranges.

4

Plan treatment

Choose Accept/Avoid/Transfer/Mitigate; assign controls, owners, due dates, and success criteria.

5

Track residual risk

Recalculate automatically as controls land. Monitor deltas and escalate on missed SLAs.

Heatmap / workflow diagram placeholder
Risk appetite gates: set thresholds; auto-open tickets and notify owners when items breach tolerance.

Integrations

Meet teams where they work; keep evidence centralized.

  CSV / Spreadsheet Import
  REST API & Webhooks
  Ticketing (Jira/Service Desk)
  Chat (Slack/Teams)
  Vuln Scanners
  SSO / SCIM
Push tasks to tickets/chat; pull findings via API; keep the register as the source of truth.

Security & compliance

Same hardened, multi-tenant foundation as the rest of PurpleWASP.

Data isolation

Per-org databases with least-privilege DB users and strict query boundaries.

RBAC & SSO

Fine-grained permissions, SSO/SAML/SCIM, optional MFA, and session hardening.

Encryption

TLS in transit; at-rest encryption; optional field-level encryption for sensitive fields.

Immutable logs

Every change is attributed and time-stamped. Exportable for audits and customers.

Standards

Aligned to ISO 27001 controls and common frameworks; easy evidence capture.

Retention & legal hold

Configurable retention, undelete windows, and legal hold for investigations.

Why PurpleWASP vs. spreadsheets & email

Faster cycles, consistent scoring, and provable outcomes.

Capability Manual / Ad-hoc PurpleWASP Risk Management
Data freshness Static sheets; stale quickly Auto-recalc on changes; live heatmaps
Scoring consistency Subjective; variable formulas Governed model with tunable weights and audit trail
Accountability Unclear owners & SLAs Named owners, due dates, escalations, immutable logs
Reporting Manual collation Dashboards, exports, board-ready summaries
Controls linkage Decoupled from risk items Primary/secondary controls with effectiveness → residual risk

FAQs

Answers for risk owners and auditors.

Can we change the scoring formula?
Yes. Adjust weights, ranges, and transformations (e.g., caps). Changes are versioned and logged.
Do you calculate inherent and residual risk?
Yes. Inherent before controls; residual after applying control effectiveness. Both appear in heatmaps.
Can we integrate with ticketing tools?
Yes. Create and sync treatment tasks to your ticketing system and chat for faster closure.
How do you handle evidence?
Attach files/links, capture approvals, and export a complete activity log per risk for audits.

Create your first risk

Select an asset, link a threat & vulnerability, and publish the treatment plan with a due date.

New Risk Import Findings

Configure your model

Tune weightings, scales, and thresholds. Define risk appetite and escalation rules.

Scoring Settings Heatmap

All actions are logged with timestamps and actors for full traceability.