Risk assessments are a core part of an effective information security program. They help organizations understand where they are exposed, what could realistically go wrong, and how those risks should be addressed. Without them, security efforts tend to become inconsistent from the actual business.
From a compliance perspective, risk assessments are also a requirement. Under SOC 2, organizations are expected to identify and evaluate risks that could impact the achievement of the Trust Services Criteria. Similar expectations exist under HIPAA and NIST frameworks. Risk assessments are not just a best practice. They are a foundational element of a welldesigned control environment.
Why Risk Assessments Are So Important
A risk assessment does more than produce a list of issues. It helps management:
When done well, risk assessments ensure that security controls are implemented for a reason, rather than respond to the latest incident.
Risk Assessments and SOC 2 Expectations
In a SOC 2 examination, auditors are not just looking for evidence that a risk assessment exists. They are looking for evidence that it is actively being used. Identified risks should tie back to the controls an organization has in place, and the treatment of those risks should make sense given their severity and potential impact.
This is where we often see challenges, not in identifying risks, but in deciding how to respond to them.
Risk Treatment Options
Once a risk has been identified, organizations generally choose one or more of the following approaches:
Each of these treatments can be appropriate in the right circumstances.
Why Risk Acceptance is not Enough
Risk acceptance is frequently misunderstood. Accepting a risk does not reduce the chance of it occurring, it means management is choosing to live with the exposure.
In recent client risk assessments that we have reviewed, we have recommended that our client’s revisit situations where risks are accepted without additional mitigating or compensating controls. This can suggest that risks are being acknowledged but not actively managed in a way that aligns with security objectives and control expectations.
In many cases, organizations already have controls in place that are designed to reduce the likelihood or impact of a risk. When those controls exist and are operating effectively, the appropriate treatment is typically risk mitigation, not acceptance. Simply accepting a risk without considering the effect of existing controls can overlook the fact that the organization has already taken steps to manage that exposure. Often, risks are marked as “accepted” because stakeholders haven’t been adequately educated on the treatment options, or how to align treatment decisions with existing controls and the organization’s risk tolerance. From a broader risk management standpoint, documenting how controls mitigate risk helps demonstrate that risks are being actively addressed rather than passively acknowledged.
Final Thoughts
Risk assessments are a foundational part of an organization’s information security program and a key requirement under SOC 2. While risk acceptance has a role, it should rarely be the only response to significant risks. Organizations that use risk assessments to drive thoughtful, balanced treatment decisions are better positioned to manage risk effectively, meet compliance expectations, and support longterm business objectives.
For questions regarding risk assessments or information security frameworks such as SOC 2, HIPAA, or NIST, please contact Leo Abramson, CISA, Senior Associate, at labramson@peasebell.com.
Pease Bell is the brand name under which Pease Bell CPAs, LLC and Pease Bell Advisory, LLC and its respective subsidiary entities provide professional services. Pease Bell CPAs, LLC and Pease Bell Advisory, LLC (and its respective subsidiary entities) practice in an alternative practice structure in accordance with the AICPA Code of Professional Conduct and applicable law, regulations, and professional standards. Pease Bell CPAs, LLC is a licensed independent CPA firm that provides attest services to its clients, and Pease Bell Advisory, LLC (and its respective subsidiary entities) provide tax and business consulting services to their clients. Pease Bell Advisory, LLC and its subsidiary entities are not licensed CPA firms.