SecuritySecurity+CISSP

Risk Management Framework Explained for Security+ and CISSP

Security spending without a framework is guesswork. Risk management gives organizations a structured way to decide what to protect, how much to spend protecting it, and what to do when protection fails. The core idea is simple: you cannot eliminate all risk, so you identify what you have, assess what could go wrong, and make deliberate choices about how to respond. Security+ tests risk terminology precisely, and CISSP tests the frameworks and calculations in depth. Understanding the vocabulary and the logic behind risk responses is the foundation for nearly every governance and compliance question on both exams.

7 min
3 sections · 6 exam key points
5 practice questions

Risk terminology and calculations

Risk is the probability that a threat will exploit a vulnerability and cause harm to an asset. Asset value, threat likelihood, and vulnerability severity all feed into risk. You cannot have risk without all three: a threat with no vulnerable target is not a risk, and a vulnerability with no threat is not a risk.

Quantitative risk analysis assigns dollar values to everything. Asset Value (AV) is what the asset is worth. Exposure Factor (EF) is the percentage of asset value lost if the threat occurs. Single Loss Expectancy (SLE) equals AV times EF. Annual Rate of Occurrence (ARO) is how many times per year the threat is expected to occur. Annual Loss Expectancy (ALE) equals SLE times ARO. ALE is what you compare against the cost of a control: if the control costs more than the ALE reduction it provides, it may not be worth implementing.

Qualitative risk analysis skips the dollar values and uses subjective scales like high, medium, and low, or numerical rankings. It is faster and does not require precise data, which is often unavailable. Most real-world risk programs blend both approaches.

Risk response strategies

After assessing a risk, you choose how to respond. There are four options. Risk avoidance means stopping the activity that creates the risk entirely. A company that stops accepting credit card payments avoids the risk of card data breach, but also loses revenue. Avoidance is appropriate when the risk outweighs the benefit of the activity.

Risk mitigation reduces the likelihood or impact of the risk through controls. Installing a firewall mitigates the risk of unauthorized network access. Mitigation does not eliminate risk, it reduces it to an acceptable level. Risk transference shifts the financial impact of the risk to a third party, typically through insurance or a contract. The underlying risk still exists, but your organization bears less of the financial consequence if it materializes.

Risk acceptance acknowledges the risk and decides to live with it. This is appropriate when mitigation costs more than the risk itself, or when the risk is genuinely low. Acceptance is a deliberate decision, not ignoring the risk. It should be documented and revisited periodically.

How to choose the correct answer

Risk calculations: SLE = AV x EF. ALE = SLE x ARO. If a risk costs $50,000 per occurrence (SLE), happens twice a year (ARO = 2), ALE = $100,000. A control that costs $30,000 and reduces ALE to $20,000 saves $50,000 annually and is worth implementing.

Risk response matching: stop the risky activity = avoidance. Implement a control = mitigation. Buy insurance = transference. Document and accept = acceptance.

Residual risk: the risk that remains after controls are applied. No control eliminates all risk. Total risk without any controls is inherent risk.

Control types: preventive (stops the threat), detective (identifies the threat), corrective (recovers from the threat). A single control can serve multiple types simultaneously.

Risk response strategies

StrategyWhat you doWhen to use it
AvoidanceStop the activity that creates the riskRisk outweighs the business benefit
MitigationImplement controls to reduce likelihood or impactControls cost less than the expected loss
TransferenceInsurance or contract shifts financial impactRisk is too large to absorb alone
AcceptanceDocument the risk, take no actionControl costs exceed the risk value

Key exam facts — Security+ / CISSP

  • SLE = Asset Value x Exposure Factor. ALE = SLE x Annual Rate of Occurrence.
  • Compare control cost against ALE reduction to decide whether the control is worth implementing.
  • Risk avoidance: stop the activity. Mitigation: add controls. Transference: insurance. Acceptance: documented decision.
  • Residual risk: what remains after controls. Inherent risk: what exists with no controls.
  • Qualitative: high/medium/low scales. Quantitative: dollar values, formulas.
  • Risk = threat + vulnerability + asset. Remove any one and there is no risk.

Common exam traps

Risk acceptance means ignoring the risk.

Risk acceptance is a documented, deliberate management decision. It acknowledges the risk, evaluates the cost of mitigation versus the expected loss, and consciously decides that acceptance is the appropriate response. Undocumented ignored risks are not accepted risks.

A higher ALE always means a control should be implemented.

A control is worth implementing when its cost is less than the ALE reduction it provides. A $1,000,000 ALE with a $2,000,000 control is still not worth implementing on a pure cost basis, though regulatory requirements or strategic considerations may override the calculation.

Transferring risk eliminates the risk.

Transference shifts the financial impact to a third party, but the underlying risk, the threat, the vulnerability, and the probability of occurrence all remain unchanged. Insurance does not prevent the incident from happening.

Practice questions — Risk Management

These questions are representative of what you will see on Security+, CISSP exams. The correct answer and explanation are shown immediately below each question.

Q1.A server worth $500,000 has an exposure factor of 40% from a flood risk. The flood occurs once every 5 years. What is the Annual Loss Expectancy (ALE)?

A.$200,000
B.$40,000
C.$100,000
D.$500,000

Explanation: SLE = AV × EF = $500,000 × 0.40 = $200,000. ARO = 1/5 = 0.2 per year. ALE = SLE × ARO = $200,000 × 0.2 = $40,000. The ALE is the expected annual cost of this risk, which is used to evaluate whether a control costing less than $40,000 per year is worth implementing.

Q2.A company decides to stop accepting cryptocurrency payments because the fraud rate makes the revenue not worth the risk. Which risk response strategy is this?

A.Risk mitigation
B.Risk transference
C.Risk acceptance
D.Risk avoidance

Explanation: Risk avoidance means eliminating the risk by stopping the activity that creates it. By stopping cryptocurrency payments entirely, the company eliminates the fraud risk associated with that payment method. Mitigation would mean keeping the payments but adding controls. Transference would mean insuring against fraud losses. Acceptance would mean continuing and absorbing the losses.

Q3.An organization purchases cyber liability insurance to cover financial losses from data breaches. Which risk response strategy does this represent?

A.Risk avoidance
B.Risk mitigation
C.Risk transference
D.Risk acceptance

Explanation: Purchasing insurance is the classic example of risk transference — the financial impact of a risk is shifted to a third party (the insurer) in exchange for premium payments. The underlying risk (data breach) still exists; the organization still needs to prevent breaches. Only the financial consequence is transferred.

Q4.After implementing a new firewall, an organization's security team determines the residual risk is within acceptable limits. What is residual risk?

A.The risk that existed before any controls were applied
B.The risk that remains after controls have been implemented
C.The maximum possible risk from a single threat
D.The risk that has been transferred to a third party

Explanation: Residual risk is what remains after controls are in place. No control eliminates risk entirely. The firewall reduces the inherent risk, but residual risk remains (the firewall can be bypassed, misconfigured, etc.). Inherent risk is risk without any controls. Risk management decisions (accept, mitigate further, transfer) apply to residual risk.

Q5.A risk manager chooses not to implement a $50,000 control for a risk with an ALE of $10,000. What risk response is this, and is it appropriate?

A.Risk transference; inappropriate because it costs too much
B.Risk acceptance; appropriate because the control cost exceeds the expected annual loss
C.Risk avoidance; appropriate only if the business can stop the activity
D.Risk mitigation; inappropriate because the ALE is too low

Explanation: Documenting a risk and deciding not to act on it — because the cost of the control exceeds the expected loss — is risk acceptance. It is an appropriate and legitimate response when properly documented. Spending $50,000 per year to prevent a $10,000 annual loss is not economically rational on a pure cost basis, unless regulatory requirements mandate the control.

Frequently asked questions — Risk Management

What is the formula for ALE and how do I use it?

ALE (Annual Loss Expectancy) = SLE × ARO. SLE (Single Loss Expectancy) = Asset Value × Exposure Factor. ARO (Annual Rate of Occurrence) is how many times per year the threat is expected to materialize. ALE represents the expected annual cost of a risk. Compare the ALE reduction a control provides against the control's annual cost: if the control saves more than it costs, it may be worth implementing.

What is the difference between inherent risk and residual risk?

Inherent risk is the level of risk that exists before any controls are applied — the raw exposure to a threat exploiting a vulnerability. Residual risk is what remains after controls are in place. Security controls reduce inherent risk to a residual level. Risk management decisions (accept, transfer, mitigate further) are made based on residual risk, not inherent risk.

What are the four risk response strategies?

Risk Avoidance: eliminate the risk by stopping the activity that creates it. Risk Mitigation: reduce the risk through controls (firewalls, training, patching). Risk Transference: shift the financial impact to a third party (insurance, contracts). Risk Acceptance: acknowledge the risk and decide to live with it — appropriate when control costs exceed the expected loss. All four are valid responses depending on the context.

What is the difference between qualitative and quantitative risk analysis?

Quantitative risk analysis assigns numerical dollar values to assets, threats, and vulnerabilities using formulas like ALE. It requires good data and produces defensible ROI calculations for security spending. Qualitative risk analysis uses subjective scales (high/medium/low, 1-5 ratings) and is faster when precise data isn't available. Most real-world risk programs blend both — qualitative for prioritization, quantitative for major investment decisions.

How is risk management tested on Security+ and CISSP?

Security+ tests risk terminology (AV, EF, SLE, ARO, ALE), risk response strategy identification from scenarios, control type classification (preventive/detective/corrective), and the distinction between inherent and residual risk. CISSP goes deeper on risk frameworks (NIST RMF, ISO 27005), risk treatment plans, risk appetite vs risk tolerance, and how risk management integrates with business continuity and governance.

Practice this topic

Test yourself on Risk Management

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics