Agency|Insights
Trust BuildingCompliance Operations

SOC 2 Risk Assessment Process: Step-by-Step Playbook

At Agency, we facilitate risk assessments for dozens of clients each year — and it is one of the most commonly missed SOC 2 requirements we encounter with first-time organizations.

Agency Team
Agency Team
·13 min read
Playbook card for SOC 2 Risk Assessment Process: Step-by-Step Playbook

At Agency, we facilitate risk assessments for dozens of clients each year — and it is one of the most commonly missed SOC 2 requirements we encounter with first-time organizations. SOC 2 Common Criteria CC3 requires organizations to identify, evaluate, and manage risks that could affect the achievement of the Trust Service Criteria objectives. In practice, this means conducting a formal, documented risk assessment at least annually that identifies threats and vulnerabilities, evaluates likelihood and impact, documents risk treatment decisions, and maintains a risk register. What we always tell clients is that auditors do not expect a perfect risk-free environment — they expect evidence that the organization has a structured process for identifying risks, evaluating their significance, and making intentional decisions about how to address them.

This playbook walks compliance teams through the complete SOC 2 risk assessment process, from initial threat identification through risk register maintenance. It covers risk identification methodologies, likelihood and impact scoring frameworks, risk appetite definition, treatment option selection, risk register construction, and how to integrate risk assessment outputs with your GRC platform and control framework.

What Auditors Expect from Your Risk Assessment

CC3 Requirements

| Requirement | What the Auditor Checks | |-------------|------------------------|
| CC3.1 — Risk identification | Documented process for identifying risks; evidence that risks have been identified across the control environment | | CC3.2 — Risk evaluation | Methodology for assessing risk likelihood and impact; consistent application of evaluation criteria | | CC3.3 — Change-driven risk | Evidence that significant changes (new services, infrastructure changes, organizational changes) trigger risk reassessment | | CC3.4 — Fraud risk | Consideration of potential fraud risks and preventive controls |

What a Passing Risk Assessment Looks Like

ElementAuditor Expectation
Documented methodologyWritten approach describing how risks are identified and evaluated
Risk registerMaintained list of identified risks with owners, ratings, and treatment decisions
Annual completionRisk assessment completed within the last twelve months
Management involvementEvidence that leadership participates in or reviews the risk assessment
Risk-control linkageRisks connected to the controls that mitigate them
Treatment decisionsEach risk has a documented treatment decision (mitigate, accept, transfer, avoid)

Common Risk Assessment Findings

FindingHow to Avoid
No formal risk assessment existsComplete this playbook; document the assessment in your GRC platform
Risk assessment completed but no risk register maintainedBuild and maintain the risk register as described in Step 5
No methodology documentedDocument your scoring methodology before conducting the assessment
Risk assessment is over twelve months oldSchedule annual reviews; set calendar reminders or GRC platform alerts
No fraud risk considerationInclude fraud risk as a category in your threat identification
No change-triggered reassessmentDocument the process for reassessing risk when significant changes occur

Step 1: Define Your Risk Assessment Methodology

Choose a Scoring Framework

Before identifying risks, define how you will evaluate them. We recommend a qualitative likelihood-impact matrix as the most practical approach for SOC 2:

Likelihood Scale

| Rating | Score | Definition | |--------|-------|-----------|
| Rare | 1 | Unlikely to occur within three years; no history of occurrence | | Unlikely | 2 | May occur once within three years; limited history | | Possible | 3 | May occur once per year; some history or industry precedent | | Likely | 4 | Expected to occur multiple times per year; regular occurrence in the industry | | Almost Certain | 5 | Expected to occur frequently; active threat or known vulnerability |

Impact Scale

| Rating | Score | Definition | |--------|-------|-----------|
| Negligible | 1 | Minimal business impact; no data exposure; no customer notification required | | Minor | 2 | Limited business impact; minor data exposure; single customer affected | | Moderate | 3 | Significant business impact; moderate data exposure; multiple customers affected | | Major | 4 | Severe business impact; significant data exposure; regulatory notification required | | Critical | 5 | Existential business impact; widespread data breach; regulatory enforcement; loss of major customers |

Risk Rating Calculation

Risk Rating = Likelihood × Impact

Risk ScoreRisk LevelResponse Priority
1-4LowMonitor; accept or mitigate per risk appetite
5-9MediumMitigate within ninety days; assign control owner
10-15HighMitigate within thirty days; escalate to management
16-25CriticalMitigate immediately; executive attention required

Document the Methodology

We advise creating a one-to-two-page methodology document that includes:

  • The scoring scales (likelihood and impact definitions)
  • The risk rating calculation method
  • Risk level definitions and response priorities
  • Review cadence (annual at minimum; change-triggered reassessment process)
  • Roles and responsibilities (who conducts the assessment, who reviews, who approves)

This methodology document serves as auditor evidence and ensures consistency across annual assessments.

Step 2: Identify Threats and Vulnerabilities

Threat Categories for SOC 2

We recommend organizing risk identification across these categories to ensure comprehensive coverage:

CategoryExample Threats
External cyber threatsPhishing attacks, ransomware, DDoS, API exploitation, supply chain attacks, credential stuffing
Internal threatsUnauthorized access by employees, accidental data exposure, insider theft, privilege misuse
Access managementUnauthorized access due to deprovisioning failures, excessive permissions, MFA bypass, shared credentials
Change managementUnauthorized code changes, deployment failures, configuration drift, untested changes in production
Data protectionUnencrypted data exposure, data leakage through logging, improper data disposal, backup data exposure
AvailabilityInfrastructure failure, cloud provider outage, capacity exhaustion, single points of failure, DDoS
Vendor / third-partyVendor data breach, vendor service disruption, supply chain compromise, API dependency failure
Regulatory / complianceNon-compliance with contractual obligations, regulatory enforcement, audit failure, privacy violations
PhysicalData center failure, natural disaster affecting infrastructure, unauthorized physical access
Human errorMisconfiguration, accidental data deletion, incorrect deployment, operational mistakes
FraudFinancial fraud, data manipulation, unauthorized transactions, social engineering

Risk Identification Methods

MethodHow to Apply
Brainstorming workshopGather compliance, engineering, and operations leads for a structured risk identification session (two to three hours)
Prior incident reviewReview past security incidents, near-misses, and audit findings for recurring risk themes
Industry threat intelligenceReview industry reports (OWASP, SANS, ENISA, Verizon DBIR) for common threats in your sector
Control gap analysisReview SOC 2 gap assessment findings — each gap represents an unmitigated risk
Customer security questionnaire reviewReview security questionnaire questions from customers for risk areas they care about
GRC platform risk moduleUse your platform's built-in risk identification framework as a starting checklist

Step 3: Evaluate Each Risk

Apply the Scoring Framework

For each identified risk, assess likelihood and impact using your defined scales:

| Risk | Likelihood | Impact | Risk Score | Risk Level | |------|-----------|--------|-----------|-----------|
| Phishing attack compromises employee credentials | 4 (Likely) | 3 (Moderate) | 12 | High | | Cloud provider experiences extended outage | 2 (Unlikely) | 4 (Major) | 8 | Medium | | Employee access not deprovisioned after termination | 3 (Possible) | 3 (Moderate) | 9 | Medium | | Ransomware encrypts production data | 2 (Unlikely) | 5 (Critical) | 10 | High | | Code deployed without review introduces vulnerability | 3 (Possible) | 3 (Moderate) | 9 | Medium | | Unauthorized data access by internal employee | 2 (Unlikely) | 4 (Major) | 8 | Medium | | Vendor data breach exposes customer data | 2 (Unlikely) | 4 (Major) | 8 | Medium | | Backup restoration fails during disaster | 2 (Unlikely) | 5 (Critical) | 10 | High | | Customer data exposed through logging | 3 (Possible) | 3 (Moderate) | 9 | Medium | | Fraudulent modification of financial data | 1 (Rare) | 4 (Major) | 4 | Low |

Evaluation Best Practices

PracticeWhy It Matters
Involve multiple perspectivesEngineering, operations, and compliance see different risks; cross-functional input produces a more complete assessment
Score based on current controlsEvaluate likelihood with current controls in place, not in a hypothetical zero-control environment
Use consistent scoringApply the same definitions consistently across all risks — avoid inflating or deflating scores
Document scoring rationaleFor high and critical risks, document why you assigned specific likelihood and impact scores
Consider residual vs inherent riskInherent risk is risk without controls; residual risk is risk after controls. SOC 2 focuses on residual risk

Step 4: Select Risk Treatment

Treatment Options

TreatmentWhen to UseExample
MitigateImplement controls to reduce likelihood or impactEnforce MFA to reduce the likelihood of credential compromise
AcceptRisk is within risk appetite; cost of mitigation exceeds the riskAccept the risk of a cloud provider outage for non-critical services with adequate DR
TransferShift the risk to a third partyPurchase cyber insurance; use a managed security provider
AvoidEliminate the activity that creates the riskDiscontinue processing a data type that creates disproportionate risk

Treatment Decision Documentation

For each risk, we advise documenting:

| Field | Content | |-------|---------|
| Treatment decision | Mitigate, accept, transfer, or avoid | | Rationale | Why this treatment was selected | | Controls (if mitigate) | Specific controls that address this risk | | Owner | Who is responsible for implementing and maintaining the treatment | | Timeline | When the treatment will be fully implemented | | Residual risk | The risk level after treatment is applied |

Risk Acceptance Requirements

For risks that are accepted (not mitigated):

  • Document the acceptance decision with rationale
  • Obtain management approval for the acceptance (auditors verify this)
  • Set a review date to reassess whether acceptance remains appropriate
  • Record the accepted risk in the risk register with "Accepted" status

Step 5: Build and Maintain the Risk Register

Risk Register Structure

FieldDescription
Risk IDUnique identifier (e.g., RISK-001)
Risk descriptionClear description of the threat, vulnerability, and potential impact
CategoryThreat category (from Step 2)
LikelihoodScore from your likelihood scale
ImpactScore from your impact scale
Inherent risk scoreLikelihood × Impact before controls
ControlsExisting controls that mitigate this risk
Treatment decisionMitigate, accept, transfer, avoid
Residual risk scoreRisk score after controls and treatment
OwnerPerson responsible for the risk
StatusOpen, mitigated, accepted, transferred
Last reviewedDate of most recent review
Next reviewScheduled review date

Risk Register Example (Abbreviated)

IDRiskLIScoreTreatmentControlsOwnerStatus
R-001Phishing compromises credentials4312MitigateMFA, security training, email filteringSecurity LeadMitigated
R-002Access not deprovisioned339MitigateAutomated deprovisioning, access reviewsIT LeadMitigated
R-003Cloud provider extended outage248Accept + TransferMulti-region DR, cyber insuranceEngineering LeadAccepted
R-004Ransomware encrypts production2510MitigateBackup/restore, endpoint protection, network segmentationSecurity LeadMitigated
R-005Code deployed without review339MitigateBranch protection, required reviewersEngineering LeadMitigated

Risk Register Maintenance

ActivityFrequencyWho
Full risk assessment reviewAnnuallyCompliance lead + cross-functional team
Risk register updateQuarterly (review existing risks for changes)Compliance lead
New risk additionAs identified (incident-driven, change-driven)Risk owner
Change-triggered reassessmentWhen significant changes occurCompliance lead + affected teams
Management reviewAnnually (part of full assessment)Executive sponsor

Step 6: Connect Risk Assessment to Controls

Risk-Control Mapping

The risk assessment should inform your control framework. Each significant risk should be linked to one or more controls that mitigate it:

RiskMitigating ControlsSOC 2 Criteria
Unauthorized accessMFA, access reviews, deprovisioning, RBACCC6.1, CC6.2, CC6.3
Code vulnerabilitiesCode review, branch protection, SAST scanningCC8.1, CC8.2
Data breachEncryption, access controls, monitoring, incident responseCC6.1, CC6.7, CC7.2, CC7.3
Service unavailabilityRedundancy, backup, DR testing, capacity monitoringA1.1, A1.2, A1.3
Vendor compromiseVendor risk assessment, contractual requirements, monitoringCC9.2

This mapping demonstrates to the auditor that your controls are risk-informed — they exist because identified risks require mitigation, not because a checklist says they are needed.

Using GRC Platforms for Risk Assessment

Platform Risk Modules

GRC platforms like Vanta, Drata, Secureframe, and Sprinto include built-in risk assessment modules:

| Feature | What It Provides | |---------|-----------------|
| Risk assessment templates | Pre-built risk identification checklists aligned to SOC 2 criteria | | Scoring frameworks | Built-in likelihood and impact scales with automatic risk score calculation | | Risk register | Integrated risk register with status tracking and owner assignment | | Risk-control mapping | Connect risks to controls within the platform for automated tracking | | Review scheduling | Automated reminders for annual reviews and change-triggered reassessments | | Auditor access | Auditors can review the risk assessment and register directly in the platform |

Key Takeaways

  • A formal, documented risk assessment is required for SOC 2 (CC3) — in our experience, it is one of the most commonly missed requirements for first-time organizations
  • We recommend using a qualitative likelihood-impact matrix with five-point scales — this is the most practical approach for most organizations
  • Document your methodology before conducting the assessment — the methodology document is auditor evidence
  • We advise identifying risks across eleven categories: external cyber, internal threats, access management, change management, data protection, availability, vendor/third-party, regulatory, physical, human error, and fraud
  • Evaluate each risk using consistent scoring; document scoring rationale for high and critical risks
  • Select treatment for each risk (mitigate, accept, transfer, avoid) and document the decision with rationale
  • Build a risk register with unique IDs, scores, treatment decisions, controls, owners, and review dates
  • We always tell clients to connect risk assessment outputs to their control framework — controls should be traceable to the risks they mitigate
  • Conduct the full assessment annually; review the risk register quarterly; reassess when significant changes occur
  • Management must approve risk acceptance decisions — auditors verify this

Frequently Asked Questions

How detailed does the risk assessment need to be?

What we tell clients is: detailed enough to demonstrate a structured, repeatable process — but not so detailed that it becomes impractical to maintain. Most organizations we work with identify fifteen to thirty risks across the categories listed in this playbook. Each risk should have a clear description, consistent scoring, documented treatment, and an assigned owner. The auditor looks for evidence of a real process, not an exhaustive catalog of every conceivable risk.

Do we need to use a specific risk assessment framework?

The guidance we give is that SOC 2 does not prescribe a specific framework. The CC3 criteria require a risk assessment process but allow organizations to choose their methodology. The qualitative likelihood-impact matrix described in this playbook is the most commonly used approach across our client base. Some organizations use NIST SP 800-30, ISO 27005, or FAIR (Factor Analysis of Information Risk) for more structured methodologies. For most SOC 2 organizations, the qualitative approach is sufficient and practical.

Who should participate in the risk assessment?

Based on what we see produce the best outcomes, the risk assessment should involve cross-functional representation: compliance lead (facilitator), engineering lead (technical risk perspective), operations/IT (infrastructure and operational risks), and executive sponsor (business risk context and risk appetite). For organizations with dedicated security teams, the security lead should be a core participant. Involving multiple perspectives produces a more comprehensive risk identification and more realistic scoring.

What happens if we identify a critical risk with no mitigation?

The advice we give here is: document it transparently. Document the risk with its current score, note that no mitigation currently exists, and document a remediation plan with a timeline. The auditor may note this as a finding if the risk is within your SOC 2 scope and affects Trust Service Criteria. Critical unmitigated risks should be escalated to management with a clear remediation timeline. The goal is not to have zero risks — it is to have a documented, intentional approach to managing risks.

Agency Team

Agency Team

Agency Insights

Expert guidance on cybersecurity compliance from Agency's advisory team.

LinkedIn

Related Reading

Stay ahead of compliance

Expert insights on cybersecurity compliance delivered to your inbox.

We respect your privacy. Unsubscribe anytime.