Risk Register

Risk Register #

This page lists the mapping of risks to controls in our software process

Application logging failures

Description:

Inadequate logging or monitoring of application activities, leading to missed detection of malicious actions or operational issues.

Mitigations:


Code quality issues

Description:

Poorly written or unmaintainable code leading to security vulnerabilities, application errors, or system failures.

Mitigations:


Compromised secrets management

Description:

Exposure of sensitive information, such as API keys, passwords, or cryptographic keys, due to poor secrets management.

Mitigations:


Dependency vulnerabilities

Description:

Vulnerabilities or outdated components in third-party libraries or dependencies used in the software.

Mitigations:


Environment Breach

Description:

External attacker running workloads in our system

Mitigations:


Inadequate Risk Assessment

Description:

Failure to properly identify, assess, and mitigate risks throughout the SDLC.

Mitigations:


Insider Threat

Description:

Someone inside the company acts against the best intests

Mitigations:


Insufficient Change Management

Description:

Lack of control or oversight over changes to the system, potentially introducing vulnerabilities or breaking existing functionality.

Mitigations:


Insufficient Security Controls

Description:

Weak or missing security controls that fail to protect against known threats and vulnerabilities.

Mitigations:


Lack of Service Ownership

Description:

Ambiguity in responsibility for services or components, leading to delayed response to incidents or unresolved issues.

Mitigations:



© Stacc 2025, all rights reserved