Skip to main content

Risk Management Domain

The Risk Management domain represents the structured approach to identifying, assessing, mitigating, monitoring, and responding to risks across the organization. It provides a comprehensive framework for modeling risk profiles, assessment methodologies, control mechanisms, and response strategies.

Schema Version: 2.2
Schema Location: /schemas/risk-management.schema.json
Specification: JSON Schema Draft-07

Overview

What is the Risk Management Domain?

The Risk Management domain captures the uncertainty dimensions that affect organizational activities, enabling risk-centric analysis that drives strategic planning, operational resilience, and compliance management. The domain covers:

  • Risk Profiles — Comprehensive views of specific risks
  • Risk Assessments — Structured evaluation methodologies
  • Risk Controls — Mechanisms to modify risk
  • Risk Responses — Approaches to addressing risks
  • Risk Monitoring — Ongoing observation and evaluation

This domain extends the Orthogramic Metamodel by providing deeper insights into risk factors, control effectiveness, and mitigation approaches.

Model Risk Management (MRM) Sub-domain

The Risk domain includes a Model Risk Management (MRM) sub-domain providing structured coverage of risks associated with model use in decision-making and regulatory reporting. MRM introduces elements for:

  • Model governance and validation
  • Performance monitoring and drift detection
  • Regulatory framework mapping (SR 11-7, Basel, IFRS 9, CCAR)

Purpose and Value

The Risk Management domain enables architects and planners to:

  • Identify and categorize risks — Systematically capture risks impacting objectives
  • Assess and prioritize — Evaluate risks based on likelihood and impact
  • Implement controls — Develop appropriate mitigation strategies
  • Monitor effectiveness — Track risk indicators and control performance
  • Support decisions — Enable data-driven risk acceptance or reduction
  • Drive resilience — Improve visibility into risk interdependencies
For Data Engineers

The Risk Management domain maps directly to data quality and governance:

  • Risk Profile → Data quality risk /Security risk
  • Risk Assessment → Data quality assessment
  • Risk Control → Data quality rule /Validation check
  • Risk Response → Remediation workflow
  • Key Risk Indicator → Data quality metric /Alert threshold

Core Components

The Risk Management domain uses a comprehensive risk lifecycle:

  1. Risk Identification: Discovery and categorization
  2. Risk Assessment: Analysis of probability and impact
  3. Risk Response: Mitigation strategies and controls
  4. Risk Monitoring: Ongoing tracking and reporting

Domain Attributes

Risk Profile Attributes

AttributeTypeDescriptionRequired
riskIDStringUnique identifier for the risk
titleStringName or title of the risk
descriptionStringDetailed explanation of the risk
riskCategoryEnumClassification of risk type
orgUnitTitleStringOrganization unit responsible
orgUnitRolesArray[String]Roles managing this risk
riskSourceEnumOrigin of the risk
riskOwnerStringIndividual responsible
riskProbabilityObjectLikelihood of occurrence
riskImpactObjectPotential effect if realized
riskSeverityObjectCombined probability and impact
riskToleranceObjectAcceptable level of this risk
riskStatusEnumCurrent status in lifecycle
mitigationStrategyObjectApproach to risk reduction
residualRiskObjectRisk remaining after controls
controlEffectivenessObjectEffectiveness of current controls
reviewFrequencyEnumHow often risk is reassessed
regulatoryImplicationsArray[Object]Compliance aspects
strategicImplicationsObjectImpact on strategic objectives
emergingFactorsArray[Object]Developing influences
relatedRisksArray[Object]Relationships to other risks
keyRiskIndicatorsArray[Object]Metrics for monitoring

Enumeration Values

Risk Category (riskCategory)

ValueDescriptionExample
StrategicStrategic direction risksMarket shifts, competition
OperationalDay-to-day operations risksProcess failures, capacity
FinancialFinancial performance risksLiquidity, credit, market
ComplianceRegulatory compliance risksViolations, penalties
TechnologyTechnology-related risksCyber, system failures
ReputationalBrand and reputation risksPublic trust, media
LegalLegal and contractual risksLitigation, contracts
PeopleHuman capital risksTalent, safety, culture
EnvironmentalEnvironmental risksClimate, sustainability
ModelModel-related risksML/AI model failures

Risk Source (riskSource)

ValueDescriptionExample
ExternalOutside organizationMarket conditions
InternalWithin organizationProcess gaps
Third-PartyVendors and partnersSupplier failures
RegulatoryRegulatory changesNew requirements
TechnologyTechnology changesDisruption

Risk Status (riskStatus)

ValueDescription
IdentifiedRisk identified, not assessed
AssessedAssessment completed
MitigatedControls in place
AcceptedRisk accepted as-is
TransferredRisk transferred (insurance)
AvoidedActivity discontinued
MonitoringUnder ongoing monitoring
ClosedRisk no longer applicable

Risk Response Type (mitigationApproachType)

ValueDescriptionExample
AvoidDiscontinue risk-creating activityExit market
ReduceImplement controls to reduceProcess improvements
TransferShift risk to third partyInsurance, outsourcing
AcceptAccept risk within toleranceMinor operational risks
ShareShare risk with partnersJoint ventures

Control Type (controlType)

ValueDescriptionExample
PreventivePrevent risk occurrenceAccess controls
DetectiveDetect risk occurrenceMonitoring, alerts
CorrectiveCorrect after occurrenceIncident response
CompensatingAlternative controlManual review

Control Category (controlCategory)

ValueDescriptionExample
TechnicalTechnology-basedEncryption, firewalls
AdministrativePolicy-basedProcedures, training
PhysicalPhysical securityLocks, badges
OperationalProcess-basedSegregation of duties

Risk Assessment Elements

AttributeTypeDescription
assessmentIDStringUnique identifier
assessmentTitleStringName of assessment
descriptionStringAssessment description
assessmentMethodEnumMethodology: Qualitative, Quantitative, Hybrid
assessmentScopeObjectBoundaries of assessment
assessmentContextStringBusiness context
assessmentDateObjectWhen conducted
assessmentParticipantsArray[Object]People involved
riskCriteriaObjectEvaluation criteria
identifiedRisksArray[Object]Risks discovered
riskRankingsArray[Object]Prioritization
assessmentFindingsArray[Object]Key outcomes
assessmentRecommendationsArray[Object]Suggested actions
assessmentOwnerStringResponsible party
nextAssessmentObjectFollow-up timing

Risk Control Elements

AttributeTypeDescription
controlIDStringUnique identifier
controlTitleStringName of control
descriptionStringControl description
controlTypeEnumType of control
controlCategoryEnumFunctional category
controlMethodEnumOperation: Manual, Automated, Hybrid
controlObjectiveStringWhat control achieves
implementationStatusEnumImplementation state
controlEffectivenessObjectHow well it works
controlOwnerStringResponsible party
controlCostObjectImplementation and maintenance cost
linkedRisksArray[Object]Risks addressed
testingScheduleObjectTesting frequency
lastTestDateDateLast test performed
testResultsArray[Object]Test outcomes

Key Risk Indicator Elements

AttributeTypeDescription
indicatorNameStringName of KRI
descriptionStringIndicator description
currentValueNumberCurrent measurement
thresholdNumberAlert threshold
trendEnumDirection: Increasing, Decreasing, Stable
monitoringFrequencyEnumMeasurement frequency
dataSourceStringSource of data
ownerStringResponsible party

Domain Relationships

The Risk Management domain integrates with other metamodel domains:

Target DomainRelationship TypeDescription
StrategyAlignmentRisks aligned to strategic objectives
CapabilitiesExposureCapabilities expose to risks
PolicyGovernancePolicies govern risk management
PerformanceMeasurementRisk KPIs tracked
FinanceImpactFinancial impact of risks
TechnologyExposureTechnology risks identified
InformationProtectionInformation security risks
InitiativesResponseInitiatives address risks
OrganizationOwnershipOrg units own risks
ComplianceRequirementsCompliance risks managed

Examples

Example 1: Cybersecurity Risk Profile

{
"riskID": "RISK-CYBER-001",
"title": "Critical Data Breach Risk",
"description": "The risk of unauthorized access to or exfiltration of sensitive customer and financial data through external cyberattack or internal compromise, resulting in regulatory sanctions, financial loss, and reputational damage.",
"riskCategory": "Technology",
"orgUnitTitle": "Information Security Department",
"orgUnitRoles": ["Chief Information Security Officer", "Security Operations Manager", "Data Protection Officer"],
"riskSource": "External",
"riskOwner": "Chief Information Security Officer",
"riskProbability": {
"level": "moderate",
"numericValue": 0.35,
"rationale": "Based on threat intelligence showing increased targeting of our industry, balanced against our enhanced security controls",
"timeHorizon": "12 months"
},
"riskImpact": {
"level": "severe",
"financialImpact": "$5-15 million",
"nonFinancialImpacts": [
{
"impactType": "reputational",
"description": "Severe damage to brand trust and customer confidence",
"severity": "high"
},
{
"impactType": "regulatory",
"description": "Substantial fines under data protection regulations",
"severity": "high"
},
{
"impactType": "operational",
"description": "Service disruption during incident response",
"severity": "medium"
}
],
"rationale": "Based on analysis of recent industry breaches and our specific data exposure"
},
"riskSeverity": {
"level": "high",
"score": 16,
"calculationMethod": "5x5 risk matrix combining probability and impact values"
},
"riskTolerance": {
"toleranceLevel": "low",
"thresholds": [
{
"metricName": "Security incidents involving PII",
"thresholdValue": "0",
"responseRequired": "Immediate executive notification and investigation"
},
{
"metricName": "Failed security tests",
"thresholdValue": ">5%",
"responseRequired": "Security remediation within 48 hours"
}
]
},
"riskStatus": "Mitigated",
"mitigationStrategy": {
"approachType": "Reduce",
"description": "Comprehensive cybersecurity program including advanced threat protection, security monitoring, encryption, access controls, and security awareness training",
"expectedOutcome": "Reduce likelihood of successful breach while maintaining detection capabilities",
"implementationStatus": "Implemented"
},
"residualRisk": {
"level": "moderate",
"acceptableLevel": true,
"description": "Remaining risk primarily related to zero-day vulnerabilities and sophisticated threat actors",
"additionalControls": [
"Investigating additional advanced endpoint protection",
"Enhancing threat hunting capabilities"
]
},
"controlEffectiveness": {
"level": "effective",
"lastAssessment": "2025-03-15",
"improvementNeeds": [
"Strengthen third-party security assessment process",
"Enhance cloud security monitoring"
]
},
"reviewFrequency": "Quarterly",
"regulatoryImplications": [
{
"regulationType": "Data Protection",
"regulationName": "GDPR",
"implications": "Breach notification requirements and potential fines up to 4% of global revenue",
"complianceStatus": "Compliant"
},
{
"regulationType": "Financial",
"regulationName": "PCI-DSS",
"implications": "Requirements for securing payment card data",
"complianceStatus": "Compliant"
}
],
"strategicImplications": {
"overallImpact": "mixed",
"affectedObjectives": [
{
"objectiveID": "STRAT-DIGITAL-003",
"impactDescription": "Risk considerations require adjustment to cloud migration timeline",
"impactSeverity": "moderate"
}
]
},
"emergingFactors": [
{
"factorName": "AI-Enhanced Cyber Threats",
"description": "Increasing sophistication of attacks using AI to evade detection",
"potentialImpact": "Could increase probability of successful breach",
"timeHorizon": "medium-term",
"monitoringApproach": "Threat intelligence subscription and quarterly assessment"
},
{
"factorName": "Extended Supply Chain Exposure",
"description": "Increasing integration with third-party systems expanding attack surface",
"potentialImpact": "New vectors for data compromise",
"timeHorizon": "immediate",
"monitoringApproach": "Third-party security assessment program"
}
],
"relatedRisks": [
{
"riskID": "RISK-TECH-005",
"relationshipType": "contributor",
"relationshipStrength": 4,
"description": "Legacy System Maintenance Risk contributes to cybersecurity vulnerabilities"
},
{
"riskID": "RISK-COMP-002",
"relationshipType": "consequence",
"relationshipStrength": 5,
"description": "Data breach would trigger Regulatory Compliance Risk"
}
],
"keyRiskIndicators": [
{
"indicatorName": "Security Incidents",
"description": "Number of security incidents detected per month",
"currentValue": 12,
"threshold": 25,
"trend": "Stable",
"monitoringFrequency": "Daily"
},
{
"indicatorName": "Vulnerability Remediation Time",
"description": "Average days to remediate critical vulnerabilities",
"currentValue": 4.5,
"threshold": 7,
"trend": "Decreasing",
"monitoringFrequency": "Weekly"
},
{
"indicatorName": "Phishing Test Failure Rate",
"description": "Percentage of employees clicking on simulated phishing",
"currentValue": 8,
"threshold": 15,
"trend": "Decreasing",
"monitoringFrequency": "Monthly"
}
]
}

Example 2: Data Quality Risk

{
"riskID": "RISK-DATA-001",
"title": "Data Quality Degradation Risk",
"description": "Risk of inaccurate or incomplete data affecting business decisions and regulatory reporting",
"riskCategory": "Operational",
"orgUnitTitle": "Data Governance Office",
"riskOwner": "Chief Data Officer",
"riskSource": "Internal",
"riskProbability": {
"level": "moderate",
"numericValue": 0.40
},
"riskImpact": {
"level": "high",
"financialImpact": "$2-5 million annually",
"nonFinancialImpacts": [
{
"impactType": "operational",
"description": "Poor business decisions based on flawed data",
"severity": "high"
},
{
"impactType": "regulatory",
"description": "Inaccurate regulatory reporting",
"severity": "medium"
}
]
},
"riskStatus": "Mitigated",
"mitigationStrategy": {
"approachType": "Reduce",
"description": "Data quality program with automated validation, monitoring, and remediation workflows"
},
"keyRiskIndicators": [
{
"indicatorName": "Data Quality Score",
"description": "Overall data quality across critical data elements",
"currentValue": 94.5,
"threshold": 90,
"trend": "Increasing"
},
{
"indicatorName": "Failed Data Quality Rules",
"description": "Number of data quality rule failures per day",
"currentValue": 45,
"threshold": 100,
"trend": "Stable"
}
]
}

Example 3: Model Risk (MRM)

{
"riskID": "RISK-MODEL-001",
"title": "Credit Scoring Model Risk",
"description": "Risk of model degradation or bias in credit scoring model affecting lending decisions",
"riskCategory": "Model",
"orgUnitTitle": "Model Risk Management",
"riskOwner": "Chief Risk Officer",
"riskSource": "Internal",
"riskStatus": "Monitoring",
"mitigationStrategy": {
"approachType": "Reduce",
"description": "Regular model validation, performance monitoring, and drift detection"
},
"regulatoryImplications": [
{
"regulationType": "Supervisory Guidance",
"regulationName": "SR 11-7",
"implications": "Model validation and governance requirements",
"complianceStatus": "Compliant"
}
],
"keyRiskIndicators": [
{
"indicatorName": "Model Performance (Gini)",
"description": "Gini coefficient for model discrimination",
"currentValue": 0.72,
"threshold": 0.65,
"trend": "Stable"
},
{
"indicatorName": "Population Stability Index",
"description": "PSI measuring data drift",
"currentValue": 0.08,
"threshold": 0.10,
"trend": "Increasing"
}
]
}

Implementation Guidelines

Risk Management Best Practices

  1. Establish governance — Define clear risk ownership and accountability
  2. Use consistent methodology — Apply standardized assessment approaches
  3. Prioritize effectively — Focus resources on highest-impact risks
  4. Test controls — Regularly validate control effectiveness
  5. Monitor continuously — Track KRIs and emerging risks

Risk Assessment Matrix

Control Framework

Control LayerPurposeExamples
PreventiveStop risk occurrenceAccess controls, encryption
DetectiveIdentify occurrencesMonitoring, alerts, audits
CorrectiveFix after occurrenceIncident response, recovery
CompensatingAlternative protectionManual reviews, oversight

OpenMetadata Integration

For Data Platform Teams

When integrating with OpenMetadata, map Risk entities as follows:

Orthogramic ElementOpenMetadata EntityNotes
Risk ProfileTag/ClassificationRisk tagging
Risk ControlTest DefinitionData quality tests
Key Risk IndicatorTest ResultQuality metrics
Risk AssessmentTest SuiteAssessment suites
Control EffectivenessTest StatusPass/fail tracking
# Example: Map Risk Control to OpenMetadata Test
def create_risk_control_test(control):
"""
Map Orthogramic Risk Control to OpenMetadata Test Definition
"""
return {
"name": control["controlID"].lower(),
"displayName": control["controlTitle"],
"description": control["description"],
"testDefinitionType": "dataQuality",
"testPlatforms": ["OpenMetadata"],
"parameterDefinition": [
{
"name": "threshold",
"displayName": "Threshold",
"dataType": "NUMBER",
"required": True
}
],
"owner": {"name": control.get("controlOwner", ""), "type": "user"},
"tags": [
{"tagFQN": f"ControlType.{control['controlType']}"},
{"tagFQN": f"ControlCategory.{control['controlCategory']}"}
]
}

Schema Reference

  • Repository: Orthogramic/Orthogramic_Metamodel
  • Schema Location: /schemas/risk-management.schema.json
  • Version: 2.2
  • Specification: JSON Schema Draft-07
  • License: Creative Commons Attribution-ShareAlike 4.0 (CC BY-SA 4.0)

Previous: Finance Domain | Next: Supply Chain Domain