Skip to content

Risk Management in Cybersecurity — Frameworks, Assessment, and Business Context

What Is Cybersecurity Risk Management and Why Does It Matter?

Section titled “What Is Cybersecurity Risk Management and Why Does It Matter?”

According to NIST SP 800-30 Rev. 1, risk management is the “process of identifying, estimating, and prioritising information security risks”, making it the foundational discipline that connects technical security controls to business decision-making.

Risk management in cybersecurity is the structured process of identifying, assessing, and treating risks to an organisation’s information assets. It is the foundation that connects technical security work to business decision-making — the reason security teams get budgets, the framework behind every control implementation, and the language that security professionals use to communicate with executives and boards.

Understanding risk management is essential for every cybersecurity role:

  • SOC analysts triage alerts based on risk severity. A critical alert on a high-value asset demands immediate response; the same alert on a test server might wait until morning.
  • Security engineers justify control implementations through risk reduction. “We need a WAF” is a weak argument; “This WAF reduces the likelihood of SQL injection against our payment system from likely to unlikely, reducing a $2M risk to $200K” gets funded.
  • GRC (Governance, Risk, Compliance) analysts spend their entire careers in risk management — maintaining risk registers, facilitating assessments, and reporting to leadership.
  • Certification exams including CompTIA Security+ SY0-701, CISSP, and CISM dedicate significant portions to risk management concepts, frameworks, and terminology.

This page covers the risk equation, assessment methodologies, major frameworks (NIST RMF, ISO 27005, FAIR), treatment strategies, and how risk management operates in real organisations.

Risk management was the topic that finally helped me understand why cybersecurity exists as a business function. Before studying it, I thought security was purely technical — firewalls, encryption, vulnerability scanning. But when I learned that every security decision is ultimately a risk decision, and that risk is measured in business impact, not technical severity, the whole field made more sense. A vulnerability is not important because it scores 9.8 on CVSS — it is important because exploiting it could cost the organisation $5 million in downtime, regulatory fines, and reputation damage. That shift from “how bad is this technically?” to “what does this mean for the business?” is the difference between a technician and a security professional.

What Do Real-World Risk Management Scenarios Look Like?

Section titled “What Do Real-World Risk Management Scenarios Look Like?”

According to the Verizon 2024 Data Breach Investigations Report (DBIR), the median cost of a ransomware incident has risen to approximately $46,000, with high-end breaches costing organisations millions — underscoring why structured risk assessment is essential for prioritising security investments.

Risk management is not an abstract exercise — it drives real decisions in every organisation.

ScenarioRisk management activityBusiness outcome
Annual risk assessmentIdentify threats, assess vulnerabilities, calculate risk to critical assetsPrioritised list of risks that guides the security budget for the year
New system deploymentAssess risks before the system goes live; identify required controlsSystem launches with appropriate security controls, not bolted on after an incident
Ransomware threatAssess likelihood based on threat intelligence, calculate potential impact of downtime and data lossJustified investment in backup infrastructure, endpoint detection, and incident response planning
Cloud migrationCompare risks of on-premises vs cloud, assess shared responsibility modelInformed decision with clear understanding of which risks transfer and which remain
Regulatory complianceMap compliance requirements to risk treatment decisionsDemonstrable due diligence that satisfies regulators and auditors
Vendor selectionAssess third-party risk before granting access to systems or dataVendor with appropriate security controls selected; high-risk vendors rejected or given restricted access

What Are the Key Concepts Behind Cybersecurity Risk Management?

Section titled “What Are the Key Concepts Behind Cybersecurity Risk Management?”

Risk is defined by NIST SP 800-30 Rev. 1 as “a measure of the extent to which an entity is threatened by a potential circumstance or event”, typically expressed as a function of the adverse impact and the likelihood of occurrence.

The fundamental concept in risk management is deceptively simple:

Risk = Threat x Vulnerability x Impact

  • Threat — anything that could cause harm. Threat actors (hackers, insiders, nation-states), natural disasters, equipment failures, human error.
  • Vulnerability — a weakness that a threat could exploit. Unpatched software, weak passwords, lack of encryption, untrained staff.
  • Impact — the business consequence if the threat successfully exploits the vulnerability. Financial loss, operational downtime, reputation damage, regulatory fines, legal liability.

If any one of these is zero, the risk is zero. A vulnerability with no threat targeting it has zero risk. A threat with no vulnerability to exploit has zero risk. This is why risk management is about understanding all three factors, not just finding vulnerabilities.

TermDefinitionExample
Risk appetiteThe total amount of risk an organisation is willing to accept to achieve its objectives”We accept up to $500K in annual cyber risk exposure”
Risk toleranceThe acceptable variation from the risk appetite for a specific risk”We tolerate up to $100K risk per individual system”
Risk registerA documented list of identified risks with their assessment scores, owners, and treatment plansSpreadsheet or GRC tool tracking all identified risks
Risk ownerThe person accountable for managing a specific riskThe CISO owns the overall cyber risk; individual risk owners manage specific entries
Residual riskThe risk that remains after controls are appliedAfter patching and WAF deployment, remaining SQL injection risk is low
Inherent riskThe risk level before any controls are appliedSQL injection risk against an unpatched, unprotected web application is critical
ControlA measure that reduces likelihood or impact of a riskFirewalls, encryption, training, policies, insurance

Qualitative vs Quantitative Risk Assessment

Section titled “Qualitative vs Quantitative Risk Assessment”

Organisations use two fundamentally different approaches to measuring risk, and most use a combination of both.

Qualitative assessment uses categories and descriptive scales — High/Medium/Low or a 1-5 likelihood-impact matrix. It is faster, requires less data, and is easier for non-technical stakeholders to understand.

Quantitative assessment uses numbers and financial values — calculating the Single Loss Expectancy (SLE), Annualised Rate of Occurrence (ARO), and Annualised Loss Expectancy (ALE). It is more precise but requires historical data and statistical analysis.

Quantitative formulaMeaning
Asset Value (AV)The monetary value of the asset
Exposure Factor (EF)Percentage of asset value lost in a single incident (0-100%)
SLE = AV x EFSingle Loss Expectancy — cost of one incident
AROAnnualised Rate of Occurrence — how often the incident is expected per year
ALE = SLE x AROAnnualised Loss Expectancy — expected yearly cost of the risk

Example: A database server (AV = $500,000) with an exposure factor of 40% for a ransomware event gives an SLE of $200,000. If ransomware events occur 0.5 times per year (once every two years), the ALE is $100,000. Any control that costs less than $100,000/year and prevents this risk is financially justified.

A structured risk assessment follows a repeatable methodology. Whether you use NIST, ISO, or a custom framework, the core steps are consistent.

  1. Identify assets. What are you protecting? Servers, databases, applications, intellectual property, customer data, employee records. Assign a value (monetary or criticality rating) to each asset.

  2. Identify threats. What could cause harm? External attackers, insider threats, natural disasters, system failures, human error. Use threat intelligence and historical data to build a realistic threat list.

  3. Identify vulnerabilities. What weaknesses exist? Unpatched systems, misconfigurations, weak authentication, lack of encryption, untrained staff. Vulnerability scans, penetration tests, and configuration audits provide this data.

  4. Determine likelihood. How probable is it that each threat will exploit each vulnerability? Use historical data, threat intelligence, and expert judgement. Rate on a scale (e.g. 1-5 or Rare/Unlikely/Possible/Likely/Almost Certain).

  5. Determine impact. What is the business consequence if the risk materialises? Consider financial loss, operational disruption, regulatory penalties, reputation damage, and legal liability. Rate on a matching scale.

  6. Calculate and prioritise risk. Combine likelihood and impact to produce a risk score. Plot risks on a risk matrix. Prioritise treatment for the highest-rated risks first.

  7. Select treatment. For each risk above the organisation’s risk appetite, choose a treatment strategy: mitigate, transfer, avoid, or accept.

  8. Document in the risk register. Record each risk, its assessment, the chosen treatment, the responsible owner, and the target date for treatment implementation.

Risk Assessment Process

A structured approach to identifying, analysing, and treating cybersecurity risks

Identify Assets
What to protect
Data classification
System inventory
Business criticality
Identify Threats
What could harm
Threat actors
Natural disasters
Human error
Assess Risk
Likelihood x Impact
Vulnerability analysis
Likelihood rating
Impact rating
Treat Risk
Choose strategy
Mitigate
Transfer
Accept or avoid
Monitor
Ongoing review
Risk register updates
Control effectiveness
Threat landscape changes
Idle

How Does Risk Management Fit Into a Security Architecture?

Section titled “How Does Risk Management Fit Into a Security Architecture?”

The industry standard for cybersecurity risk management is the NIST Risk Management Framework (SP 800-37 Rev. 2), a six-step lifecycle — Categorise, Select, Implement, Assess, Authorise, and Monitor — defined by the National Institute of Standards and Technology.

Qualitative vs Quantitative Risk Assessment

Qualitative Assessment
  • Descriptive scalesUses categories like High/Medium/Low or 1-5 ratings for likelihood and impact
  • Faster to completeRequires expert judgement rather than extensive data collection — suitable for rapid assessment
  • Easier stakeholder communicationNon-technical executives understand 'High Risk' more intuitively than '$2.4M ALE'
  • SubjectiveDifferent assessors may rate the same risk differently — results depend on individual judgement
  • Risk matrix outputProduces a colour-coded matrix showing risks by likelihood and impact — good for prioritisation
VS
Quantitative Assessment
  • Financial valuesCalculates SLE, ARO, and ALE — expresses risk in dollar amounts that justify budgets
  • Data-intensiveRequires historical incident data, asset valuations, and statistical analysis
  • Precise ROI calculationDirectly compares control cost vs risk reduction — 'This $50K control prevents $200K in annual losses'
  • Objective and repeatableGiven the same data, different analysts should reach similar conclusions
  • FAIR frameworkFactor Analysis of Information Risk — the leading quantitative cyber risk framework
Verdict: Start with qualitative assessment for broad coverage. Use quantitative analysis for high-value decisions that require financial justification.
Use case
Entry-level analysts typically work with qualitative risk matrices. Quantitative analysis is used for executive-level risk reporting and major investment decisions.

NIST Risk Management Framework (RMF) — SP 800-37

The NIST RMF is widely adopted, especially in US government and defence-adjacent organisations. It defines six steps: Categorise (the system), Select (controls), Implement (controls), Assess (effectiveness), Authorise (the system to operate), and Monitor (ongoing). CompTIA Security+ covers NIST RMF extensively.

ISO 27005

The international standard for information security risk management. It integrates with ISO 27001 (the information security management system standard) and provides a structured methodology for risk identification, analysis, evaluation, and treatment. Widely used in Australian organisations and globally.

FAIR (Factor Analysis of Information Risk)

The leading quantitative risk analysis framework. FAIR breaks risk into measurable components — threat event frequency, vulnerability, loss magnitude — and uses Monte Carlo simulations to produce probabilistic financial loss estimates. It is increasingly adopted by organisations that need to justify security investments to boards and CFOs.

Every identified risk must be treated using one of four strategies:

StrategyWhat it meansExample
MitigateImplement controls to reduce likelihood or impactDeploy a WAF to reduce the likelihood of web application attacks
TransferShift the financial impact to a third partyPurchase cyber insurance to cover breach costs; outsource payment processing to reduce PCI scope
AvoidEliminate the risk by removing the activity or assetDiscontinue a legacy application that cannot be secured rather than accepting the risk
AcceptAcknowledge the risk and choose to live with itAccept the risk of a non-critical system being unavailable for up to 4 hours during a low-probability event

The choice of treatment depends on the risk level, the cost of controls, and the organisation’s risk appetite. A risk that exceeds risk appetite must be mitigated, transferred, or avoided — acceptance is only appropriate for risks within the organisation’s tolerance.

What Does Risk Assessment Look Like in Practice?

Section titled “What Does Risk Assessment Look Like in Practice?”

According to ISO 27005:2022, a practical risk assessment must include asset identification, threat analysis, vulnerability identification, likelihood determination, impact assessment, and risk evaluation — steps that produce the risk register used to drive treatment decisions.

| Risk ID | Risk Description | Likelihood | Impact | Risk Score | Treatment | Owner | Status |
|---------|-------------------------------------------|------------|--------|------------|-------------|----------|------------|
| R-001 | Ransomware encrypts production database | Likely (4) | Critical (5) | 20 | Mitigate | CISO | In Progress|
| R-002 | Phishing compromises executive credentials | Likely (4) | High (4) | 16 | Mitigate | Sec Ops | In Progress|
| R-003 | Third-party vendor data breach | Possible (3)| High (4) | 12 | Transfer | GRC Lead | Complete |
| R-004 | DNS zone transfer exposes internal hosts | Unlikely (2)| Medium (3) | 6 | Mitigate | Net Eng | Complete |
| R-005 | Earthquake damages primary data centre | Rare (1) | Critical (5) | 5 | Transfer | CTO | Complete |
| R-006 | Low-severity vuln in dev environment | Possible (3)| Low (1) | 3 | Accept | Dev Lead | Accepted |
Scenario: SQL injection against customer database
Asset Value (AV): $2,000,000
(customer database replacement + regulatory fines + reputation cost)
Exposure Factor (EF): 60%
(estimated 60% of asset value lost per incident)
Single Loss Expectancy (SLE): $2,000,000 × 0.60 = $1,200,000
(cost of a single SQL injection breach)
Annualised Rate of Occurrence (ARO): 0.25
(estimated once every 4 years based on industry data)
Annualised Loss Expectancy (ALE): $1,200,000 × 0.25 = $300,000
(expected annual cost of this risk)
Proposed control: WAF + code review programme
Annual cost: $80,000
Risk reduction: 85% (ALE drops to $45,000)
Cost-benefit: $300,000 - $45,000 - $80,000 = $175,000 net annual benefit
Decision: APPROVED — control cost is justified by risk reduction
Impact → | Negligible (1) | Minor (2) | Moderate (3) | Major (4) | Critical (5) |
Likelihood ↓ | | | | | |
Almost Certain (5)| Medium (5) | High (10) | High (15) | Critical (20)| Critical (25)|
Likely (4) | Low (4) | Medium (8)| High (12) | High (16) | Critical (20) |
Possible (3) | Low (3) | Medium (6)| Medium (9) | High (12) | High (15) |
Unlikely (2) | Low (2) | Low (4) | Medium (6) | Medium (8)| High (10) |
Rare (1) | Low (1) | Low (2) | Low (3) | Low (4) | Medium (5) |
Treatment thresholds:
Critical (20-25): Immediate action required — escalate to CISO
High (10-16): Treatment plan required within 30 days
Medium (5-9): Treatment plan required within 90 days
Low (1-4): Monitor and review annually; accept if within tolerance

What Are the Limitations of Risk Management?

Section titled “What Are the Limitations of Risk Management?”

According to ISO 31000:2018, risk assessment is inherently limited by the quality of available information, the subjectivity of human judgement, and the dynamic nature of the threat environment — making ongoing review and continuous improvement essential.

FactorLimitationHow to handle it
Subjectivity in qualitative assessmentDifferent assessors rate the same risk differentlyUse calibrated scales with clear definitions and examples; involve multiple assessors
Data scarcity for quantitative assessmentMany organisations lack the historical incident data for precise calculationsStart with industry benchmarks; refine with internal data over time
Risk register stalenessRisk registers become outdated if not regularly reviewedSchedule quarterly reviews; integrate risk updates into change management
Analysis paralysisOver-analysing every risk delays decision-makingUse a tiered approach — detailed analysis for high risks, quick assessment for low risks
Optimism biasStakeholders underestimate likelihood because “it has never happened to us”Use industry data and threat intelligence to challenge assumptions
Security theatreControls implemented to check a compliance box without actually reducing riskMeasure control effectiveness through testing, not just existence

A common beginner mistake is treating risk management as a one-time project rather than an ongoing process. The threat landscape changes continuously, new vulnerabilities are discovered daily, and business priorities shift. A risk assessment from 12 months ago may not reflect current reality. Risk management must be embedded in operational processes, not treated as an annual exercise.

Career Roadmap & Study TrackerAvailable Now

Step-by-step roadmap with study tracker worksheets and certification decision framework.

Get the Guide → $27

What Interview Questions Should You Expect About Risk Management?

Section titled “What Interview Questions Should You Expect About Risk Management?”

The CompTIA Security+ SY0-701 exam objectives dedicate significant coverage to risk management under Domain 5.2 (Risk Management Processes and Concepts), making it one of the most heavily tested topics on the certification exam and in entry-level interviews.

Risk management questions are among the most common in cybersecurity interviews because they test business understanding, not just technical knowledge.

Q1: What is the difference between a threat, a vulnerability, and a risk?

Strong answer: “A threat is something that could cause harm — a ransomware group, a natural disaster, or a disgruntled insider. A vulnerability is a weakness that a threat could exploit — an unpatched server, a weak password, or a misconfigured firewall. Risk is the combination of a threat exploiting a vulnerability and the resulting business impact. Risk only exists when all three elements — threat, vulnerability, and impact — are present.”

Q2: Explain the four risk treatment strategies.

Strong answer: “Mitigate means reducing the risk by implementing controls — deploying a firewall, patching systems, or training users. Transfer means shifting the financial impact to a third party — buying cyber insurance or outsourcing processing to a PCI-compliant provider. Avoid means eliminating the risk entirely — decommissioning a system that cannot be secured. Accept means acknowledging the risk and choosing not to treat it — appropriate when the risk is within the organisation’s tolerance and the cost of controls exceeds the potential loss.”

Q3: How would you explain a technical risk to a non-technical executive?

Strong answer: “I would translate the technical finding into business language. Instead of saying ‘we have a critical SQL injection vulnerability with a CVSS score of 9.8,’ I would say ‘our customer database has a weakness that could allow an attacker to steal all customer records. Based on our risk assessment, this could cost the organisation approximately $1.2 million in breach notification, regulatory fines, and lost customer trust. We can reduce this risk to acceptable levels with an $80,000 annual investment in application security controls.’ Executives care about business impact and cost, not technical severity scores.”

Q4: What is the NIST Risk Management Framework?

Strong answer: “The NIST RMF, defined in SP 800-37, provides a six-step lifecycle for managing security risk: Categorise the system based on the data it handles, Select appropriate security controls, Implement those controls, Assess whether they work effectively, Authorise the system to operate based on the residual risk, and Monitor the controls on an ongoing basis. It is widely used in US government and defence organisations and is covered extensively in the CompTIA Security+ exam.”

How Is Risk Management Used in Real Security Operations?

Section titled “How Is Risk Management Used in Real Security Operations?”

According to NIST SP 800-53 Rev. 5, security controls must be selected and prioritised based on organisational risk assessment results, meaning every operational security decision — from alert triage to vulnerability patching — is fundamentally a risk-driven activity.

As a new SOC analyst, risk management concepts directly influence your daily work:

  • Alert prioritisation. Risk context determines which alerts you handle first. A medium-severity alert on a payment processing server (high-value asset) may be more urgent than a critical alert on a development workstation (low-value asset).
  • Incident classification. When an incident occurs, you assess the risk — what data was exposed, what is the potential impact, who needs to be notified? This is risk assessment in real time.
  • Vulnerability management. When the vulnerability scanner reports 500 findings, the risk register and asset criticality ratings tell you which ones to patch first.
  • Exception requests. Teams sometimes request security exceptions (“we need to keep this legacy system running”). Risk assessment determines whether the exception is acceptable or too dangerous.

Australian organisations operate within specific risk management requirements:

  • ASD ISM Risk Management Controls. The Information Security Manual requires organisations to maintain a risk management framework, conduct regular risk assessments, maintain risk registers, and report risks to senior management. The ISM aligns with ISO 31000 (the general risk management standard) and ISO 27005.
  • SOCI Act Risk Obligations. The Security of Critical Infrastructure Act 2018 (amended 2021) requires operators of critical infrastructure to adopt, maintain, and comply with risk management programmes. This includes identifying hazards, assessing risks, and implementing controls to mitigate those risks.
  • APRA CPS 234. Financial institutions regulated by APRA must maintain an information security capability commensurate with the size and extent of threats to their information assets — risk-based language that requires formal risk assessment.
  • Privacy Act 1988. Organisations must take “reasonable steps” to protect personal information — what is “reasonable” is determined through risk assessment considering the sensitivity of the information and the consequences of a breach.

The Australian Signals Directorate’s Essential Eight itself is a risk-based framework — the eight strategies are prioritised based on their effectiveness at mitigating the most common cyber threats to Australian organisations.

Risk management is the discipline that connects technical cybersecurity to business outcomes — it is the language every security professional must speak.

  • Risk = Threat x Vulnerability x Impact. All three elements must be present for risk to exist. Reducing any one factor reduces the overall risk.
  • Qualitative assessment uses descriptive scales (High/Medium/Low) and is faster and more accessible. Quantitative assessment uses financial calculations (ALE = SLE x ARO) and is more precise for justifying investments.
  • Four treatment strategies — mitigate, transfer, avoid, accept — cover every possible response to a risk. The choice depends on cost, risk appetite, and business context.
  • Risk registers are living documents that track identified risks, their assessments, treatments, and owners. They must be reviewed regularly to remain useful.
  • Frameworks like NIST RMF, ISO 27005, and FAIR provide structured methodologies so risk assessment is consistent and repeatable.
  • Risk management is ongoing. The threat landscape, vulnerability landscape, and business context change continuously. A risk assessment is a snapshot, not a permanent answer.
  • Business language wins. Executives do not fund “vulnerability remediation” — they fund “risk reduction that protects revenue.” Translate technical findings into business impact.

Individual results vary. Career timelines, salary outcomes, and job availability depend on your location, experience, market conditions, and effort. The information on this page is educational, not a guarantee of employment outcomes.

  • Security Concepts for the foundational CIA triad and security principles that risk management protects
  • Incident Response for responding when risks materialise as actual incidents
  • CompTIA Security+ for the certification that covers risk management extensively
  • Threat Landscape for understanding the threats that risk assessment evaluates

Frequently Asked Questions

What is risk management in cybersecurity?

Risk management in cybersecurity is the structured process of identifying, assessing, prioritising, and treating risks to an organisation's information assets. It connects technical security work to business objectives by expressing security risks in terms of business impact and guiding investment decisions based on risk reduction.

What is the risk equation?

The fundamental risk equation is Risk = Threat x Vulnerability x Impact. A threat is something that could cause harm, a vulnerability is a weakness that could be exploited, and impact is the business consequence. If any factor is zero, the risk is zero.

What is the difference between qualitative and quantitative risk assessment?

Qualitative assessment uses descriptive scales like High/Medium/Low to rate likelihood and impact. It is faster and easier to communicate. Quantitative assessment uses financial calculations (SLE, ARO, ALE) to express risk in dollar amounts. It is more precise and enables direct cost-benefit analysis for security investments.

What is ALE and how is it calculated?

Annualised Loss Expectancy (ALE) is the expected annual financial loss from a specific risk. It is calculated as ALE = SLE x ARO, where SLE (Single Loss Expectancy) is the cost of one incident and ARO (Annualised Rate of Occurrence) is how often the incident is expected to occur per year.

What are the four risk treatment strategies?

The four strategies are: Mitigate (reduce risk with controls), Transfer (shift financial impact to a third party like an insurer), Avoid (eliminate the risk by removing the activity), and Accept (acknowledge the risk and choose to live with it). The choice depends on risk level, control costs, and organisational risk appetite.

What is a risk register?

A risk register is a documented inventory of identified risks with their assessment scores (likelihood and impact), treatment strategies, risk owners, implementation timelines, and current status. It is the central tracking document for an organisation's risk management programme and must be reviewed and updated regularly.

What is the NIST Risk Management Framework?

The NIST RMF (SP 800-37) is a six-step framework for managing security risk: Categorise the system, Select security controls, Implement controls, Assess control effectiveness, Authorise the system to operate, and Monitor controls on an ongoing basis. It is widely adopted in government and defence organisations.

What is the difference between risk appetite and risk tolerance?

Risk appetite is the overall level of risk an organisation is willing to accept to achieve its objectives — it is set by the board or senior management. Risk tolerance is the acceptable variation from the risk appetite for a specific risk or category. Risk appetite is strategic; risk tolerance is operational.

What is residual risk?

Residual risk is the risk that remains after controls have been implemented. No control eliminates risk entirely. For example, after deploying a firewall and WAF, there is still some residual risk of a web application attack. If the residual risk is within the organisation's risk tolerance, it can be accepted.

How does risk management apply to entry-level cybersecurity roles?

Entry-level analysts use risk concepts daily: prioritising alerts based on asset criticality, classifying incident severity by business impact, recommending patches based on vulnerability risk scores, and documenting findings in risk-aware language. Understanding risk management demonstrates business maturity that distinguishes you from candidates with only technical skills.


Technical content verified in March 2026 against CompTIA Security+ SY0-701 exam objectives, NIST SP 800-37 Rev. 2, ISO 27005:2022, FAIR model documentation, and the ASD Information Security Manual (ISM).