Risk Management (2024)

Chapter Contents
31.1 Introduction | 31.2 Risk Classification | 31.3 Risk Identification | 31.4 Initial Risk Assessment | 31.5 Risk Mitigation and Residual Risk Assessment | 31.6 Conduct Residual Risk Assessment | 31.7 Risk Monitoring and Governance (Phase G) | 31.8 Summary

This chapter describes risk management, which is a technique used to mitigate risk when implementing an architecture project.

31.1 Introduction

There will always be risk with any architecture/business transformation effort. It is important to identify, classify, and mitigate these risks before starting so that they can be tracked throughout the transformation effort.

Mitigation is an ongoing effort and often the risk triggers may be outside the scope of the transformation planners (e.g., merger, acquisition) so planners must monitor the transformation context constantly.

It is also important to note that the enterprise architect may identify the risks and mitigate certain ones, but it is within the governance framework that risks have to be first accepted and then managed.

There are two levels of risk that should be considered, namely:

  1. Initial Level of Risk: Risk categorization prior to determining and implementing mitigating actions.
  2. Residual Level of Risk: Risk categorization after implementation of mitigating actions (if any).

The process for risk management is described in the following sections and consists of the following activities:

  • Risk classification
  • Risk identification
  • Initial risk assessment
  • Risk mitigation and residual risk assessment
  • Risk monitoring

31.2 Risk Classification

Risk is pervasive in any enterprise architecture activity and is present in all phases within the Architecture Development Method (ADM). From a management perspective, it is useful to classify the risks so that the mitigation of the risks can be executed as expeditiously as possible.

One common way for risks to be classified is with respect to impact on the organization (as discussed in 31.4 Initial Risk Assessment), whereby risks with certain impacts have to be addressed by certain levels of governance.

Risks are normally classified as time (schedule), cost (budget), and scope but they could also include client transformation relationship risks, contractual risks, technological risks, scope and complexity risks, environmental (corporate) risks, personnel risks, and client acceptance risks.

Another way of delegating risk management is to further classify risks by architecture domains. Classifying risks as business, information, applications, and technology is useful but there may be organizationally-specific ways of expressing risk that the corporate enterprise architecture directorate should adopt or extend rather than modify.

Ultimately, enterprise architecture risks are corporate risks and should be classified and as appropriate managed in the same or extended way.

31.3 Risk Identification

The maturity and transformation readiness assessments will generate a great many risks. Identify the risks and then determine the strategy to address them throughout the transformation.

The use of Capability Maturity Models (CMMs) is suitable for specific factors associated with architecture delivery to first identify baseline and target states and then identify the actions required to move to the target state. The implications of not achieving the target state can result in the discovery of risks. Refer to 30. Business Transformation Readiness Assessment for specific details.

Risk documentation is completed in the context of a Risk Management Plan, for which templates exist in standard project management methodologies (e.g., Project Management Book of Knowledge and PRINCE2) as well as with the various government methodologies.

Normally these methodologies involve procedures for contingency planning, tracking and evaluating levels of risk; reacting to changing risk level factors, as well as processes for documenting, reporting, and communicating risks to stakeholders.

31.4 Initial Risk Assessment

The next step is to classify risks with respect to effect and frequency in accordance with scales used within the organization. Combine effect and frequency to come up with a preliminary risk assessment.

There are no hard and fast rules with respect to measuring effect and frequency. The following guidelines are based upon existing risk management best practices. Effect could be assessed using the following example criteria:

  • Catastrophic infers critical financial loss that could result in bankruptcy of the organization.
  • Critical infers serious financial loss in more than one line of business leading to a loss in productivity and no return on investment on the IT investment.
  • Marginal infers a minor financial loss in a line of business and a reduced return on investment on the IT investment.
  • Negligible infers a minimal impact on a line of business' ability to deliver services and/or products.

Frequency could be indicated as follows:

  • Frequent: Likely to occur very often and/or continuously.
  • Likely: Occurs several times over the course of a transformation cycle.
  • Occasional: Occurs sporadically.
  • Seldom: Remotely possible and would probably occur not more than once in the course of a transformation cycle.
  • Unlikely: Will probably not occur during the course of a transformation cycle.

Combining the two factors to infer impact would be conducted using a heuristically-based but consistent classification scheme for the risks. A potential scheme to assess corporate impact could be as follows:

  • Extremely High Risk (E): The transformation effort will most likely fail with severe consequences.
  • High Risk (H): Significant failure of parts of the transformation effort resulting in certain goals not being achieved.
  • Moderate Risk (M): Noticeable failure of parts of the transformation effort threatening the success of certain goals.
  • Low Risk (L): Certain goals will not be wholly successful.

These impacts can be derived using a classification scheme, as shown in Figure 31-1.

Risk Management (1)

Figure 31-1: Risk Classification Scheme

31.5 Risk Mitigation and Residual Risk Assessment

Risk mitigation refers to the identification, planning, and conduct of actions that will reduce the risk to an acceptable level.

The mitigation effort could be a simple monitoring and/or acceptance of the risk to a full-blown contingency plan calling for complete redundancy in a Business Continuity Plan (with all of the associated scope, cost, and time implications).

Due to the implications of this risk assessment, it has to be conducted in a pragmatic but systematic manner. With priority going to frequent high impact risks, each risk has to be mitigated in turn.

31.6 Conduct Residual Risk Assessment

Once the mitigation effort has been identified for each one of the risks, re-assess the effect and frequency and then recalculate the impacts and see whether the mitigation effort has really made an acceptable difference. The mitigation efforts will often be resource-intensive and a major outlay for little or no residual risk should be challenged.

Once the initial risk is mitigated, then the risk that remains is called the "residual risk". The key consideration is that the mitigating effort actually reduces the corporate impact and does not just move the risk to another similarly high quadrant. For example, changing the risk from frequent/catastrophic to frequent/critical still delivers an Extremely high risk. If this occurs, then the mitigation effort has to be re-considered.

The final deliverable should be a transformation risk assessment that could be structured as a worksheet, as shown in Figure 31-2.

Risk Management (2)

Figure 31-2: Sample Risk Identification and Mitigation Assessment Worksheet

31.7 Risk Monitoring and Governance (Phase G)

The residual risks have to be approved by the IT governance framework and potentially in corporate governance where business acceptance of the residual risks is required.

Once the residual risks have been accepted, then the execution of the mitigating actions has to be carefully monitored to ensure that the enterprise is dealing with residual rather than initial risk.

The risk identification and mitigation assessment worksheets are maintained as governance artifacts and are kept up-to-date in Phase G (Implementation Governance) where risk monitoring is conducted.

Implementation governance can identify critical risks that are not being mitigated and might require another full or partial ADM cycle.

31.8 Summary

Risk Management is an integral part of enterprise architecture. Practitioners are encouraged to use their corporate risk management methodology or extend it using the guidance in this chapter. In the absence of a formal corporate methodology, architects can use the guidance in this chapter as a best practice.
return to top of page

Navigation

The TOGAF document set is designed for use with frames. To navigate around the document:

  • In the main Contents frame in the left margin of the page, click the relevant hyperlink to load the Contents List for that Part of the TOGAF document or go direct to a chapter within the document.
  • Within a chapter you can select Previous and Next at the top and bottom of the page to move to the previous or next chapter, or select Home to return to the welcome page.
return to top of page
Downloads

Downloads of TOGAF®, an Open Group Standard, are available under license from the TOGAF information web site. The license is free to any organization wishing to use the TOGAF standard entirely for internal purposes (for example, to develop an information system architecture for use within that organization). A book is also available (in hardcopy and pdf) from The Open Group Bookstore as document G116.

Copyright © 1999-2011 The Open Group, All Rights Reserved. Not for redistribution.
TOGAF is a registered trademark of The Open Group in the United States and other countries.
Risk Management (2024)

FAQs

Risk Management? ›

Overview. Risk management is the continuing process to identify, analyze, evaluate, and treat loss exposures and monitor risk control and financial resources to mitigate the adverse effects of loss. Loss may result from the following: financial risks such as cost of claims and liability judgments.

What are the 5 rules of risk management? ›

We will also outline how to effectively implement and streamline each step in the workflow for maximum success.
  • Step 1: Identifying Risks. ...
  • Step 2: Risk Assessment. ...
  • Step 3: Prioritizing the Risks. ...
  • Step 4: Risk Mitigation. ...
  • Step 5: Monitoring the Results.

What are 5 risk management strategies? ›

There are five basic techniques of risk management:
  • Avoidance.
  • Retention.
  • Spreading.
  • Loss Prevention and Reduction.
  • Transfer (through Insurance and Contracts)

What are the five 5 stages of risk management? ›

There are five basic steps that are taken to manage risk; these steps are referred to as the risk management process. It begins with identifying risks, goes on to analyze risks, then the risk is prioritized, a solution is implemented, and finally, the risk is monitored.

What are the 4 C's of risk management? ›

Start by practicing good risk management, building on the old adage of four Cs: compassion, communication, competence and charting.

What are the 5 pillars of risk management? ›

The pillars of risk are effective reporting, communication, business process improvement, proactive design, and contingency planning. These pillars can make it easier for companies to successfully mitigate risks associated with their projects.

What are the 5 W's in risk management? ›

Unveiling the Five W's of Risk Management
  • Players: The Who of Risk Management. ...
  • Essence: The What of Risk Management. ...
  • Territory: The Where of Risk Management. ...
  • Timing: The When of Risk Management. ...
  • Motivation: The Why of Risk Management.
Mar 7, 2024

What are the 5 Ts of risk management? ›

Risk management responses can be a mix of five main actions; transfer, tolerate, treat, terminate or take the opportunity. Transfer; for some risks, the best response may be to transfer them. need to be set and should inform your decisions. Treat; by far the greater number of risks will belong to this category.

What are the 4 T's of risk management? ›

There are always several options for managing risk. A good way to summarise the different responses is with the 4Ts of risk management: tolerate, terminate, treat and transfer.

What are the 5 Rs of risk management? ›

Engineers and other risk managers must tailor their response plans to address the potential exposures during rescue, recovery, reentry, reconstruction, and rehabitation.

What are the 7 R's of risk management? ›

The activities associated with risk management are as follows: • recognition of risks; • ranking of risks; • responding to significant risks; • resourcing controls; • reaction (and event) planning; • reporting of risk performance; • reviewing the riskmanagement system.

What are the 4 basic principles of risk management? ›

In the Aviation Instructors Handbook, the FAA outlines four principles of risk management worth considering.
  • Accept no unnecessary risk. ...
  • Make risk decisions at the appropriate level. ...
  • Accept risks when the benefits outweigh the costs. ...
  • Integrate risk management into planning at all levels.
Mar 14, 2024

What are the 6 basic principles of risk management? ›

  • Step 1: Hazard identification. This is the process of examining each work area and work task for the purpose of identifying all the hazards which are “inherent in the job”. ...
  • Step 2: Risk identification.
  • Step 3: Risk assessment.
  • Step 4: Risk control. ...
  • Step 5: Documenting the process. ...
  • Step 6: Monitoring and reviewing.

What are the four 4 ways to manage risk? ›

There are four main risk management strategies, or risk treatment options:
  • Risk acceptance.
  • Risk transference.
  • Risk avoidance.
  • Risk reduction.
Apr 23, 2021

What are the 5 elements of risk management? ›

There are at least five crucial components that must be considered when creating a risk management framework. They are risk identification; risk measurement and assessment; risk mitigation; risk reporting and monitoring; and risk governance.

Top Articles
Latest Posts
Article information

Author: Pres. Carey Rath

Last Updated:

Views: 5960

Rating: 4 / 5 (41 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Pres. Carey Rath

Birthday: 1997-03-06

Address: 14955 Ledner Trail, East Rodrickfort, NE 85127-8369

Phone: +18682428114917

Job: National Technology Representative

Hobby: Sand art, Drama, Web surfing, Cycling, Brazilian jiu-jitsu, Leather crafting, Creative writing

Introduction: My name is Pres. Carey Rath, I am a faithful, funny, vast, joyous, lively, brave, glamorous person who loves writing and wants to share my knowledge and understanding with you.