Home · Docs · Risk Center Guide

Risk Center Guide

Last updated: 2026-04-29
Status: Stable


Purpose

The Risk Center is the CISO's primary workspace in URIP. It answers one question: Where is my organisation most exposed today?

The Risk Center comprises six interconnected views, all drawing from the same normalised risk data layer.


Views

1. Risk Dashboard (/dashboard.html)

The executive summary view. Load this first every morning.

Risk Dashboard

What to do on the dashboard: 1. Check the SLA Banner (top) — if it's red, you have overdue critical risks 2. Scan the KPI strip — Total / Critical / High / Medium / Low / KEV counts 3. Review the Top 10 Risks table — these are your highest-composite-score open findings 4. Check Connector Health — any red indicators mean data is not flowing; fix immediately

Export: Click the Export button (top right) to generate a PDF dashboard snapshot for board reporting.

Pitfalls: - Dashboard KPIs are cached for 5 minutes. Use Refresh button to force-update. - Connector health "degraded" is not an emergency — it usually means rate-limited. "Error" requires action.


2. Risk Overview (/risk-overview.html)

Executive risk narrative view. Used for board decks and QBRs.

Risk Overview

Key panels: - Composite Risk Trend — 30/60/90-day composite score trend. Rising = worsening posture. - Risk by Domain — Stacked bar showing which security domain carries the most risk - Top 5 Assets at Risk — Assets with the highest aggregate risk score across all findings - EPSS Distribution — What percentage of your open CVEs have EPSS > 0.5 (high exploit probability in next 30 days)

See also: USER_GUIDE.md — Risk Overview


3. Risk Register (/risk-register.html)

The full working list. This is where analysts spend most of their time.

Risk Register

Step-by-step: Triaging a new finding

  1. Navigate to /risk-register.html
  2. Sort by Score (descending) — default
  3. Click the highest-score finding
  4. In the detail drawer, read: - EPSS probability — if > 0.50, treat as urgent regardless of CVSS - KEV flag — if present, treat as top priority - MITRE ATT&CK — which threat actor groups exploit this - Affected asset — is it T1 (production) or T4 (lab)?
  5. Set status: Assign the finding to the relevant team member with a due date
  6. If the risk cannot be remediated: click Accept Risk and provide justification

Bulk operations: - Check multiple rows → Bulk Assign → select user → set due date → Apply - Check multiple rows → Bulk Accept → enter a shared justification → set review date → Apply — useful for accepting a batch of low-severity risks on non-production assets - Use Export to download the filtered list as CSV for reporting

Complex filtering cookbook:

Use multiple filters together to triage precisely:

Scenario Filters to apply
"Show me critical KEV-flagged risks on T1 assets in the Cloud domain" Severity = Critical; KEV = Yes; Asset Tier = T1; Domain = Cloud
"Show me everything assigned to my team that is overdue" Assigned to = [team member]; Status = Open; Due date = Past
"Show me high EPSS risks on endpoints that nobody has claimed" Severity = High; Domain = Endpoint; Assigned to = Unassigned; EPSS > 0.5
"Show me risks from a specific connector that appeared this week" Source = [connector]; Date range = Last 7 days

Viewing the audit trail for a specific risk: 1. Open any risk in the Risk Register 2. In the detail drawer, scroll to the Activity tab 3. You see a chronological list of every action on this risk: who created it, who assigned it, who accepted it, what justification was given, when the status changed, and every comment 4. This is drawn from the immutable audit log — it cannot be edited or deleted

Can two people edit the same risk simultaneously? Yes. URIP uses last-write-wins: the most recent save is kept. Both versions are preserved in the audit log, so you can always see what the other person changed.

Keyboard shortcuts: - ? — open keyboard help - / — jump to filter search


4. Threat Intelligence (/threat-map.html)

Live view of threats relevant to your organisation.

Threat Map

Using the threat map: 1. Toggle My Assets Only to filter the map to IOCs matching your connected assets 2. Click a map marker to see the associated pulse or threat actor 3. The Feed Panel (right) shows chronological threat events: - New KEV entries — check if they match your open risks immediately - EPSS spikes — a CVE's exploit probability jumping means a new exploit kit landed - OTX pulses matching your assets' IPs or domains

Intelligence feeds:

Feed What it tells you
FIRST.org EPSS Probability score (0–1) that a CVE will be exploited in the next 30 days
CISA KEV Binary: is this CVE being actively exploited right now?
MITRE ATT&CK Which threat actor groups exploit each CVE
AlienVault OTX Real-time IOC matches against your asset IP/domain list

Action: When the feed shows a new KEV entry, immediately check the Risk Register filtered by that CVE.


5. Remediation Tracker (/remediation-tracker.html)

SLA-enforced view of in-flight remediation work.

Remediation Tracker

Daily workflow: 1. Sort by Days Remaining (ascending) — shows what's about to breach SLA first 2. Filter by Overdue only — address these first 3. For each overdue risk: contact the assignee or escalate via the Comment button 4. For risks that are resolved: click Mark Resolved → status moves to "Pending Retest"

Auto-Remediation (when configured): - Click Auto-Remediate on a risk - Select executor (CrowdStrike RTR / Ansible / Fortinet / CyberArk) - Review the Implication Check — what else might be affected - Click Approve to trigger execution - Monitor status in the remediation job list

SLA configuration: Default SLAs (Critical: 7d, High: 30d, Medium: 90d, Low: 180d) are configurable at /admin-scoring.html.


6. Risk Acceptance (/acceptance-workflow.html)

Formal workflow for risks that cannot be remediated.

When to accept a risk: - Legacy system that cannot be patched (e.g., Windows XP air-gapped PLC) - Vendor dependency that is outside your control - Risk appetite decision (risk is below your defined threshold)

Acceptance is NOT: - A way to hide risks from compliance controls - Permanent — all acceptances expire and auto-reopen

Step-by-step: 1. From Risk Register, click Accept Risk on the relevant finding 2. Write a clear justification (auditors will read this) 3. Set a review date (max 1 year for Critical, max 2 years for High) 4. Optionally list compensating controls in place 5. Submit — the acceptance is logged in the immutable audit trail

Accepted risks and compliance: Accepted risks still appear as failing compliance controls. A risk acceptance is not equivalent to a control pass. If a control is failing due to an accepted risk, you must add a control-level note explaining the business justification.


See Also