bugzero background
Residual Risk: Seeing The Forest Through The Trees

Residual Risk: Seeing The Forest Through The Trees

Eric DeGrass

Eric DeGrass

Founder

Executive Summary: Residual Risk for Operations 

This article explores residual risk within the broader landscape of operational risk and the dangers of developing tunnel vision that can result in catastrophic outcomes. Specifically, residual risk management requires a balanced view of both security and non-security threats. By regularly evaluating and documenting residual risk, organizations can maintain resilience and uphold regulatory compliance, adapting to an evolving risk environment. 

The post includes two downloadable sample files to document non-security risks and specific regulatory examples that reenforce this approach. 

Key Points: 

  • Beyond Cybersecurity: Operational risk is not limited to cybersecurity threats but includes non-security issues like software bugs and system misconfigurations. Focusing solely on cyber threats creates an incomplete view of residual risk, which can lead to poor risk management, flawed investment strategies, and compromised resilience. 

  • Regulatory Perspective: Regulators recognize the importance of both security and non-security risks. Regulatory frameworks commonly require organizations to evaluate inherent and residual risks comprehensively to meet compliance standards. 

  • Documentation and Accountability: Effective residual risk management requires robust documentation. Standard practices involve maintaining a risk register to log all identified risks, including their controls and residual levels, and conducting risk assessments that distinguish between inherent and residual risk to track changes over time. 


Residual risk is the risk we ultimately live with. It’s the risk that’s left after risk-reduction controls (whatever they may be) have been applied with any new risks that those controls may bring themselves.  

A model of acceptable residual risk (often termed “appetite for risk”) drives investments in risk reduction (to operate within that model), guides business decision making (bets worth taking), and informs regulatory guidelines (to ensure broad stability and serve public interests).  

A shared view of residual risk serves as the common ground for the interplay between organizational ambitions, calculated risk taking, and regulatory compliance.  

Organizations cannot afford to get this wrong. 

Operational Outages and Disruptions: Avoid the tunnel vision trap 

The threats posed by cyber-attacks are indisputable and material, but they are not the only operational threats we face. The root causes behind operational outages or disruptions include both cybersecurity exploits and non-security incidents such as software bugs and system misconfigurations.  

Many organizations—and even some regulators—have shown a tendency to underplay the inherent risks stemming from non-security issues.  Perhaps it’s the adversarial, sensational, and even personal nature of cyber-attacks that’s behind this mindset. Regardless, ignoring non-security operational risks can – and has proven to be – catastrophic.  

Let’s frame this in the context of residual risk

Inherent risk is the risk we’d face before we proactively act to influence that risk. An incomplete view of inherent risk can be catastrophic as it inevitably leads to a proportionally inaccurate model of residual risk – which, in turn, will upend risk management investment strategies, business decision making, and compliance programs.  

Non-security risk factors are not adversarial and, as such, call for a different kind of vigilance, emphasizing quality, reliability, and communication. Said another way, even the very best cybersecurity controls cannot effectively reduce the operational risks stemming from non-security bugs and misconfigurations.  

Getting Residual Risk Right 

Regulators’ role in all of this is to set minimum standards to protect public interests and maintain broader stability – to ensure that organizations do not unduly disregard public risk factors.  

While regulators are not immune to “tunnel vision trap,” it is worth noting that they have consistently framed their motivations and requirements in terms of inherent and residual risk and reenforced the relevance of both security and non-security operational risk factors. See the table below for a partial list of examples. 

If it’s not documented, it doesn’t exist 

Additionally, risk management frameworks and regulations collectively offer consistent guidance that managing residual risk alone is not sufficient. The risk management processes themselves must be documented to demonstrate adherence to the underlying principles and a common understanding of acceptable residual risk. A typical documentation approach includes maintaining:  

  • A risk register, which records all identified risks, their levels, and the controls applied (if any), and 

  • Risk assessments that evaluate each risk’s likelihood and potential impact, distinguishing between inherent risk (before controls) and residual risk (after controls).  

NOTE: You can download these informational samples of a risk register and a risk assessment specifically designed for non-security (operational) bug risks. Download them here:  

The Risk Register spreadsheet records individual risks associated with non-security vendor defects, detailing the controls applied, the assessed residual risk level, and review dates to ensure ongoing monitoring. 

The Risk Assessment Document offers context and deeper analysis, guiding users through each risk’s description, inherent risk level, and specific controls for non-security-related vendor bugs.

Residual risk is not a destination, it’s a journey 

Defining acceptable levels of risk and ensuring that current residual risks fall within these limits is not a one-time task; it’s a process that must be baked into operations. As business environments, threats, and operational contexts evolve, so too must an organization’s understanding of what constitutes acceptable risk. The frequency of review and updates vary, but the principle remains the same: risk assessments and definitions are living documents.  

 The Law of the Land(s): Effective, complete, and regular updates  

The following is an incomplete list of representative regulations, their residual risk terminology, and the expected risk assessment update frequency for each. 

Regulation / Framework

Residual Risk Terminology

Includes Non-Security/Non-Cyber Risks

Calls for Documentation of Acceptable Risk Levels

Residual Risk Reevaluation Frequency

Basel III and Basel IV 

Residual Risk, Risk Appetite

Yes

Yes

Annually, with periodic stress tests

BCBS 239 (Risk Data Aggregation and Reporting) 

Residual Risk, Risk Tolerance

Yes

Yes

Quarterly or as per board's discretion

BIS Guidance on Operational Resilience

Residual Risk, Acceptable Risk 

Yes

Yes

Periodically (recommended annually)

COBIT

Residual Risk, Risk Acceptance

Yes

Yes

Regularly (left to organization’s policy)

DORA (Digital Operational Resilience Act)

Residual Risk, Acceptable Risk 

Yes

Yes

Annually, or after significant events

EU Medical Device Regulation (MDR) & IVDR

Residual Risk, Risk Acceptance

Yes

Yes

Annually, or per regulatory updates

FFIEC IT Examination Handbook

Residual Risk, Retained Risk 

Yes

Yes

NA (left to institution’s discretion)

ISO 22301 (Business Continuity Management)

Residual Risk, Post-Control Risk

Yes

Yes

Annually, or per significant change

ISO 31000 (Risk Management)

Residual Risk, Remaining Risk

Yes

Yes

Periodically, based on risk tolerance

ISO/TS 22367

Residual Risk, Risk Appetite

Yes

Yes

Annually, with continuous monitoring

NIST SP 800-53 & SP 800-37

Residual Risk, Managed Risk

Yes

Yes

Continuously (or per organizational policy)

Operational Resilience Policy (UK PRA)

Remaining Risk, Acceptable Risk 

Yes

Yes

Annually, or when risk environment changes

Share:

Do you know how much operational outages are costing you?

Understand the cost to your business and how BugZero can help you reduce those costs.

Sign up for our monthly Zero Defect Digest