Risk Register and Risk Treatment

Key Takeaways

  • A risk register tracks identified risks, owners, likelihood, impact, treatment decisions, status, and residual risk.
  • Risk treatment options include mitigate, transfer, avoid, and accept.
  • Risk ownership should be assigned to an accountable business or system owner, not left with a generic team.
  • Residual risk is the remaining risk after controls or treatments are applied.
  • Risk decisions should include evidence, review dates, and escalation when they exceed risk appetite.
Last updated: April 2026

Risk Register and Risk Treatment

A risk register is a structured record of risks the organization has identified and is tracking. It helps leaders see which risks exist, who owns them, how severe they are, what treatment was chosen, and whether the remaining risk is acceptable.

Risk Register Fields

FieldPurpose
Risk IDUnique tracking reference
Risk statementClear description of threat, vulnerability, asset, and impact
OwnerAccountable person or role
LikelihoodEstimated chance of occurrence
ImpactEstimated business harm
Inherent riskRisk before treatment
TreatmentMitigate, transfer, avoid, or accept
Control planActions that reduce likelihood or impact
Residual riskRisk remaining after treatment
Review dateWhen the decision must be revisited
StatusOpen, in progress, accepted, closed, or overdue

Risk Treatment Options

TreatmentMeaningExample
MitigateReduce likelihood or impact with controlsAdd MFA and conditional access to reduce account takeover risk
TransferShift some financial or operational impactBuy cyber insurance or outsource a managed service with contract terms
AvoidStop the activity that creates the riskCancel use of an unsupported internet-facing application
AcceptFormally acknowledge risk without further treatment for nowBusiness owner accepts low residual risk until system retirement

Risk transfer does not eliminate responsibility. Insurance or outsourcing may reduce financial exposure, but the organization still needs governance, due diligence, and oversight.

Worked Risk Register Example

FieldEntry
Risk IDR-2026-041
Risk statementCustomer portal uses an unsupported library that could allow unauthorized access to confidential profile data
OwnerDirector of Digital Services
LikelihoodHigh
ImpactHigh
Inherent riskCritical
TreatmentMitigate
PlanUpgrade library, add WAF rule during change window, increase monitoring
Residual riskMedium until upgrade is complete, low after verification
Review date2026-05-15
StatusIn progress

The register creates accountability. It is clear who owns the risk, why it matters, what treatment was selected, and when the decision will be reviewed.

Decision Rules

SituationLikely treatment
Vulnerable public system can be patchedMitigate
Commodity service has strong vendor controls and contract protectionsTransfer part of the risk
Legacy application creates high risk and no business valueAvoid by retiring it
Low risk remains after controls and is within risk appetiteAccept with owner approval
Risk exceeds risk appetiteEscalate instead of accepting locally

Common Traps

  • Recording risks without named owners.
  • Confusing risk acceptance with doing nothing informally.
  • Treating risk transfer as a way to remove all accountability.
  • Leaving accepted risks without expiration or review dates.
  • Tracking vulnerabilities as isolated tickets without connecting major items to the risk register.

Exam Focus

For SY0-701, know the four treatment choices: mitigate, transfer, avoid, accept. In scenarios, choose the treatment that matches the action. Patching and adding controls are mitigation. Insurance and contractual shifting are transfer. Stopping the risky activity is avoidance. Formal approval to live with residual risk is acceptance.

Test Your Knowledge

A company retires an unsupported public web application because it no longer has business value and cannot be secured. Which risk treatment is this?

A
B
C
D
Test Your Knowledge

What does residual risk mean?

A
B
C
D
Test Your KnowledgeMulti-Select

Which fields belong in a useful risk register? Select three.

Select all that apply

Risk owner
Treatment decision
Review date
Administrator password
Unrelated office seating preference