From Assets to Action: A Practical Risk Assessment Walkthrough (With Real Documents)

From Assets to Action: A Practical Risk Assessment Walkthrough (With Real Documents)

Risk assessment is one of those things that sounds simple in theory—but once you actually sit down to do it for a real environment, it quickly becomes clear how much structure and discipline it requires.

Instead of just explaining concepts, I recently completed a full sample risk assessment for a small business environment and documented every step. You can explore the full project here:

In this post, I’ll walk through the entire process, the documents I created, and the key lessons from doing this hands-on.


🏢 The Scenario: XYZ Limited

To make this practical, I created a realistic environment:

XYZ Limited — a small café that offers:

  • Public Wi-Fi for customers
  • A gaming zone (PS5s + PCs)
  • Reception systems for billing
  • An online ordering web application

This setup is simple—but surprisingly rich from a security perspective.

 


 


📌 Step 1: Asset Inventory (Foundation of Everything)

The first document I created was an Asset Inventory.

This included:

  • Hardware (PCs, PS5s, routers, switches)
  • Software (POS system, operating systems)
  • Data (customer database, employee records)
  • Services (web application) 

 

 🔑 Key Insight:

If you miss an asset here, you miss risks later. Everything depends on this step.


⚠️ Step 2: Threat & Vulnerability Register

Next, I mapped:

  • Threats → What can go wrong
  • Vulnerabilities → Why it can happen

Examples from the assessment:

  • Open Wi-Fi → Man-in-the-Middle attacks
  • Web application → SQL Injection
  • Reception PCs → Malware infection
  • Employees → Phishing attacks


📊 Step 3: Risk Analysis Matrix

This is where things get interesting.

I evaluated each risk using:

  • Likelihood (1–5)
  • Impact (1–5)

Then calculated:

Risk Score = Likelihood × Impact

Example:

  • SQL Injection → 5 × 5 = 25 (Critical)
  • Phishing → 4 × 3 = 12 (High)

🔑 Key Insight:

Not all vulnerabilities matter equally—risk analysis helps prioritize what actually matters to the business.


🛡️ Step 4: Risk Treatment Plan (Where Value Is Created)

This is the most important part of the entire process.

For each risk, I defined:

  • Treatment strategy (Mitigate, Avoid, Accept)
  • Specific controls
  • Responsible owner
  • Timeline

Example:

  • SQL Injection → Input validation + WAF
  • Weak passwords → Enforce policy + MFA
  • Open Wi-Fi → Network segmentation

🔑 Key Insight:

Identifying risk is easy. Reducing it in a practical, business-friendly way is the real skill.


🔁 Step 5: Continuous Monitoring

Risk assessment is not a one-time task.

For XYZ Limited, I recommended:

  • Regular vulnerability scans
  • Periodic reassessment
  • Monitoring logs and network activity

🧠 What This Project Taught Me

1. Risk Assessment ≠ Pentesting

As someone with a penetration testing background, this was a mindset shift.

  • Pentesting → Find vulnerabilities
  • Risk assessment → Prioritize based on business impact

2. Business Context Changes Everything

A vulnerability is only important if it affects:

  • Revenue
  • Customer trust
  • Operations

3. Documentation Is Half the Work

Clear, structured documentation:

  • Makes findings actionable
  • Helps stakeholders understand risk
  • Enables decision-making

📂 Final Deliverables

This project includes:

  • Asset Inventory
  • Threat & Vulnerability Register
  • Risk Analysis Matrix
  • (Next step: Risk Treatment Plan)

All documents are structured in a professional, report-ready format.

👉 GitHub: https://github.com/saadibabar/riskassessmentsample
👉 Portfolio: https://starstorm.netlify.app


🚀 Final Thoughts

Risk assessment is where technical security meets business reality.

It forces you to answer:

“What actually matters, and what should we fix first?”

If you’re coming from a technical background (like pentesting), I highly recommend practicing this—it’s a highly valuable skill in real-world security roles.


If you’d like feedback on your own risk assessment work or want to collaborate, feel free to reach out.

No comments:

From Assets to Action: A Practical Risk Assessment Walkthrough (With Real Documents)

From Assets to Action: A Practical Risk Assessment Walkthrough (With Real Documents) Risk assessment is one of those things that sounds simp...