Score likelihood, vulnerability, impact, and safeguards together easily. Compare inherent and residual risk without guesswork. Build clearer treatment plans with measurable priorities and evidence.
The active cell uses rounded impact and likelihood composites.
| Impact \ Likelihood | 1 | 2 | 3 | 4 | 5 |
|---|---|---|---|---|---|
| 5 |
Low 5 |
Moderate 10 |
Significant 15 |
High 20 |
Critical 25 |
| 4 |
Low 4 |
Moderate 8 |
Significant 12 |
High 16 |
High 20 |
| 3 |
Low 3 |
Moderate 6 |
Moderate 9 |
Significant 12 |
Significant 15 |
| 2 |
Low 2 |
Low 4 |
Moderate 6 |
Moderate 8 |
Moderate 10 |
| 1 |
Low 1 |
Low 2 |
Low 3 |
Low 4 |
Low 5 |
| Risk | Asset | Likelihood | Impact | Control % | Inherent Risk | Residual Risk | Residual Category |
|---|---|---|---|---|---|---|---|
| Ransomware on finance application | Finance reporting server | 4 | 4.4 | 58 | 17.6 | 7.88 | Moderate |
This method combines technical exposure with business damage. It also reflects how much protection exists after controls.
An IT risk assessment matrix helps teams rank threats with structure. It turns scattered observations into comparable numbers. That makes risk reviews easier. It also supports clear action plans. Security, operations, legal, and leadership can read the same picture.
Inherent risk represents the exposure before safeguards reduce it. This matters because some assets are critical even when controls look strong. A finance server, identity platform, or customer database can carry large business impact. The calculator reflects that through weighted scoring. It combines asset criticality, business disruption, data sensitivity, compliance pressure, financial loss, downtime, and affected users.
Residual risk is often the number decision makers need most. It answers a direct question. After our current controls, how much risk still remains? This calculator lowers inherent risk using control effectiveness, detection capability, and recovery strength. That gives a more realistic view of operational readiness. It also helps show whether existing controls are enough or still weak.
Many teams struggle to choose which issue to fix first. A risk matrix solves part of that problem. It groups threats by likelihood and impact. It also shows whether residual risk sits above risk appetite. That helps managers justify budget, assign owners, and schedule remediation. The matrix can support board reporting, internal audits, vendor reviews, and compliance conversations.
No score should replace expert review. Risk numbers guide discussion. They do not remove context. Analysts should still consider threat intelligence, regulatory deadlines, compensating controls, and business timing. Used well, this calculator creates consistency. It helps organizations document assumptions, compare scenarios, and build stronger treatment plans based on measurable evidence.
It is a structured method for rating risk by likelihood and impact. It helps teams compare threats, prioritize treatment, and document decisions with consistent scoring.
Inherent risk is the raw exposure before controls. Residual risk is what remains after preventive, detective, and recovery controls reduce the original risk level.
Technical events cause business consequences. Financial loss, service outage, and user disruption help quantify operational impact more realistically than technical severity alone.
Use evidence where possible. Consider coverage, reliability, testing results, exceptions, and maturity. A higher percentage means the current control set reduces more exposure.
Yes. It can support audit trails, workshop records, remediation tracking, and review packs. The CSV and PDF outputs also help preserve evidence.
Risk appetite is the threshold your organization accepts. When residual risk exceeds that value, the issue usually needs treatment, escalation, or formal acceptance.
Not always. The supplied weights work well for general IT risk reviews. Some teams may adjust them for cloud, privacy, infrastructure, or regulatory environments.
Yes. Replace the asset with the vendor service or dependency. Then score exposure, control strength, downtime, data sensitivity, and compliance impact the same way.
Important Note: All the Calculators listed in this site are for educational purpose only and we do not guarentee the accuracy of results. Please do consult with other sources as well.