Filter:
RISK-001 Operational
Critical
Compromise of Administrator Credentials

Risk of administrator credentials being compromised via phishing, brute force, or leaks.

Inherent 20
Residual 20
Mitigating None 4
RISK-002 Operational
Critical
Privilege Accumulation (Privilege Creep)

Users accumulate access privileges over time without proper review.

Inherent 15
Residual 15
Open 2
RISK-003 Operational
Critical
Data Exfiltration by Former Employees

Risk of former employees accessing systems after termination.

Inherent 15
Residual 15
Open None 2
RISK-004 Operational
Critical
Lateral Movement via Local Administrator

Attackers use shared local administrator passwords to move across the network.

Inherent 16
Residual 16
Open 2
RISK-005 Operational
Critical
Lack of Visibility into Suspicious Activities

Absence of adequate monitoring prevents threat detection.

Inherent 16
Residual 16
Open 3
RISK-006 Operational
High
MFA Bypass via Legacy Protocols

Attackers use protocols like IMAP/POP3 to bypass MFA.

Inherent 12
Residual 12
Open 1
RISK-007 Operational
Critical
Service Account Compromise

Service accounts with static credentials are easy targets.

Inherent 16
Residual 16
Open 2
RISK-008 Operational
High
Malicious OAuth Applications

Users grant excessive permissions to malicious applications.

Inherent 12
Residual 12
Open 1
RISK-009 Operational
Critical
Accountability Failure (Accountability)

Absence of a clear audit trail makes it difficult to hold administrative actions accountable to the ...

Inherent 15
Residual 15
Open 3
RISK-010 Operational
Critical
Conflicts of Interest due to Privileged Access

Unsegregated privileged access can enable conflicts of interest and fraud.

Inherent 15
Residual 15
Open 3
RISK-011 Strategic
High
Weaknesses in federation and third-party access due to inadequate MFA

Federated administrative accounts (partners, providers) or external users with elevated roles may au...

Inherent 12
Residual 12
Open 1
RISK-012 Operational
Medium
Operational unavailability due to MFA/IdP failures or token loss

Exclusive reliance on FIDO2/CBA without contingency planning can block operations in the event of ke...

Inherent 8
Residual 8
Open 1
RISK-013 Operational
Critical
MFA bypass via legacy protocols and uncovered flows

If phishing-resistant MFA (FIDO2/CBA) is not applied uniformly, endpoints that do not support MFA (e...

Inherent 15
Residual 15
Open 1