Risk management is the systematic process of identifying, assessing, and responding to risks that could affect an organisation's objectives. For the CISSP, risk management is not just a Domain 1 topic — it is the lens through which all security decisions should be made. The exam rewards candidates who think like a risk manager: always asking what could go wrong, how likely it is, what the impact would be, and what the most cost-effective response is.

This article covers the core risk management concepts tested in CISSP Domain 1: the risk formula, response options, qualitative vs quantitative analysis, insurance as a risk tool, continuous monitoring, and risk maturity models.

The CISSP Risk Formula

The foundational risk formula used throughout the CISSP is:

Risk = Threat × Vulnerability × Impact

A threat is anything that could cause harm — a malicious actor, a natural disaster, a hardware failure, or human error. A vulnerability is a weakness that a threat could exploit. Impact is the consequence if the threat successfully exploits the vulnerability.

Risk exists at the intersection of all three. If there is no viable threat, risk is low even with known vulnerabilities. If there is no vulnerability, a threat cannot cause harm. If the impact is negligible, even a high-probability threat may be acceptable.

This formula matters because it guides where to invest security resources. You cannot control threats (attackers will always exist), but you can reduce vulnerabilities through hardening and patching, and you can reduce impact through encryption, backups, and response planning.

The exam uses this framework to test prioritisation. If an organisation has limited budget, should they address a high-threat, low-vulnerability system or a low-threat, high-vulnerability system? The answer depends on the full risk calculation — including the impact if the vulnerability is exploited.

Risk Response Options: Accept, Avoid, Transfer, Mitigate

Once a risk has been identified and assessed, the organisation must decide how to respond. The CISSP recognises four primary response options.