How it Works

This article explains how Sprinto enables organisations to register, assess, treat, and monitor risks to meet security compliance requirements.

Step 1: Register Risks

You can add risks in Sprinto using any of the following methods:

  • Sprinto Risk Library: Choose from a curated list of industry-standard risks.

  • Manual Registration: Define custom risks tailored to your organisation.

  • Bulk Upload: Use the CSV upload option to import multiple risks at once.

Each risk includes detailed metadata such as risk category, owner, source, CIA classification, and scoring parameters.

⚠️ Risks added through bulk upload or manual entry must undergo scoring to become complete.

Step 2: Score Risks

For each registered risk, enter the following parameters:

  • Likelihood: Probability of occurrence before mitigation.

  • Impact: Severity if the risk occurs.

  • Residual Likelihood & Impact: Values after mitigation.

Sprinto calculates both inherent risk and residual risk scores based on these parameters. The risk remains in Incomplete status until this step is completed.

Step 3: Map Controls

Controls are mitigation measures mapped to each risk. You can:

  • Manually select controls relevant to your risk.

  • Use Sprinto AI to get smart control suggestions.

Controls are mapped to compliance frameworks like SOC 2, ISO 27001, or GDPR.

💡 You can review each control’s applicability and associated framework before mapping.

Step 4: Define Treatment Plan

Each risk requires a treatment approach:

  • Accept: Acknowledge the risk and accept its residual score.

  • Transfer: Shift risk responsibility (e.g. outsourcing, insurance).

  • Further Mitigate: Plan additional actions to lower the residual score.

  • Avoid: Eliminate the risk by discontinuing related activities.

Sprinto lets you assign a treatment reason and add optional notes.

Step 5: Create Treatment Tasks

For risks that require action, you can create Risk Treatment Tasks:

  • Assign tasks to Security Hub admins.

  • Set due dates and descriptions.

  • Attach evidence or add notes.

Once a task is marked complete, its status updates to Passing.

Step 6: Perform Risk Assessment

Risk assessments must be conducted periodically (at least once a year). You can:

  • Assess in-app using the risk register.

  • Upload assessment reports from external systems.

During the assessment:

  • Review each risk’s parameters.

  • Register new risks if needed.

  • Update control mappings and treatment plans.

Step 7: Review by Senior Management

Once the risk assessment is completed, senior management must review it:

  • Access the pending review card under Security Hub > Review.

  • Review all risks and assessment details.

  • Acknowledge the assessment to complete the process.

This sets the risk assessment system check to Passing.

Last updated