PromptBase
Upgrade
Close icon
General
Home
Marketplace
Create
Hire
Login
Chat
Sell
Explore

Prompt Details

Model
(claude-4-5-haiku)
Token size
1,406
Example input
[ORGANIZATION_CONTEXT]: Healthcare system, 2,000 employees, HIPAA/HITECH regulated, critical: EHR across 12 facilities, patient portal, medical devices network [RISK_POSTURE]: Conservative [CONSTRAINTS]: $800K annual security budget, existing GRC tool (ServiceNow), CISO + 8 FTE security team, board requires quarterly reporting [MATURITY_TARGET]: Tier 3 (Repeatable)
Example output
# NIST CSF 2.0 Risk Management Strategy ## Healthcare System - Conservative Posture, Tier 3 Target --- ## EXECUTIVE SUMMARY This healthcare system requires a **conservatively-structured risk management framework** prioritizing patient safety, regulatory compliance, and operational continuity across distributed clinical environments. The strategy employs **quantitative financial thresholds coupled with clinical impact assessment**, leveraging existing ServiceNow GRC capabilities for Tier 3 repeatability. With $800K budget and established security team, the organization can achieve risk-informed governance within 12 months while maintaining quarterly board transparency. --- ## RISK APPETITE STATEMENT **Formal Policy Language:** > The [Healthcare System] accepts minimal risk tolerance for patient safety and data integrity functions. We define acceptable risk as: > > - **Patient Safety Systems (EHR, medical devices):** Zero tolerance for unmitigated vulnerabilities affecting clinical decision-making or patient data accuracy. Any identified deficiency must be remediated within 48 hours or system isolation initiated. > > - **Regulatory Compliance (HIPAA):** We accept only documented, risk-mitigated exceptions to control requirements, with board approval and audit trails. No unauthorized access incidents tolerated. > > - **Operational Continuity:** Maximum acceptable downtime of 4 hours for clinical systems; 24 hours for non-critical administrative systems. Financial loss threshold: $50K per incident. > > - **Data Confidentiality:** <0.1% acceptable breach rate (by volume of patients affected). Any breach affecting >100 patients triggers mandatory board notification and external forensics. > > - **Third-Party Risk:** All healthcare vendors managing patient data require SOC 2 Type II certification or equivalent; medical device manufacturers must demonstrate patch management SLAs. **Strategic Rationale:** Conservative posture reflects fiduciary duty to patients, regulatory requirements, and reputational stakes in healthcare. Quantified thresholds enable consistent decision-making and board governance. --- ## METHODOLOGY RECOMMENDATION | **Dimension** | **Recommendation** | **Rationale** | |---|---|---| | **Primary Framework** | **NIST 800-30 Rev. 1 + FAIR Financial Layer** | Combines federal-standard comprehensiveness with quantitative impact modeling; aligns with HIPAA audit expectations and CSF 2.0 maturity progression | | **Assessment Approach** | Hybrid: OCTAVE-lite for asset identification + NIST 800-30 for likelihood/impact scoring | OCTAVE's self-directed component engages clinical leadership; NIST 800-30 provides audit-defensible rigor | | **Quantification Method** | FAIR for high-impact risks (EHR, patient data breaches); Risk Register scoring for medium/low | Proportional investment: quantitative precision where financial/compliance stakes highest; qualitative assessment for operational risks | | **Tool Integration** | ServiceNow Risk & Compliance module as primary register; FAIR analysis conducted annually for top 15 risks | Leverages existing platform; reduces tool sprawl; enables automated threshold monitoring | | **Frequency** | Quarterly formal assessments; continuous monitoring via KRIs | Aligns with board reporting cadence; conservative posture requires ongoing vigilance | **Alternatives Considered:** - **ISO 27005:** More prescriptive but less healthcare-specific; would require additional HIPAA mapping - **OCTAVE Standalone:** Better for resource-constrained orgs; insufficient financial rigor for this scale/budget --- ## TOLERANCE THRESHOLDS ### Quantitative Framework | **Risk Level** | **Annual Financial Impact** | **Patient/Record Volume** | **Downtime Duration** | **Escalation Path** | |---|---|---|---|---| | **CRITICAL** | >$250K direct loss OR regulatory fine risk | >500 patients affected OR data integrity loss | >4 hours clinical system | CISO → CEO → Board (24h) | | **HIGH** | $50K–$250K impact | 50–500 patients OR limited system function | 1–4 hours clinical system | CISO → CFO/COO (48h) | | **MEDIUM** | $10K–$50K impact | <50 patients OR administrative data | <1 hour any system | Security Manager → CISO (1 week) | | **LOW** | <$10K impact | Operational inconvenience only | N/A (non-critical system) | Security Manager (2 weeks) | ### Qualitative Risk Criteria (Clinical/Operational) | **Risk Level** | **Patient Safety Impact** | **Compliance Violation Severity** | **Operational Criticality** | |---|---|---|---| | **CRITICAL** | Immediate harm to patient care; treatment delays | HIPAA Breach Rule (4.5% of records) OR OCR enforcement action imminent | >2 clinical facilities unable to function | | **HIGH** | Potential for patient harm if exploited; urgent remediation required | HIPAA violation without breach; audit finding likely | 1 clinical facility degraded; EHR partial functionality | | **MEDIUM** | Compliance control gap; low immediate patient impact | Policy deviation; internal audit finding | Non-emergency administrative function affected | | **LOW** | Administrative oversight; no clinical impact | Documentation gap; correctable through process | Single user productivity impact | ### Escalation Ownership Matrix | **Risk Level** | **Risk Owner** | **Approval Authority** | **Board Visibility** | |---|---|---|---| | **CRITICAL** | CISO + Clinical Leadership | CEO + Board Risk Committee | Immediate notification | | **HIGH** | CISO or Department Head | CFO or Chief Medical Officer | Monthly board summary | | **MEDIUM** | Security Manager | CISO | Quarterly risk register | | **LOW** | Operational Manager | Department Head | Annual summary only | --- ## TREATMENT DECISION MATRIX ### Structured Decision Framework | **Risk Level** | **ACCEPT Criteria** | **MITIGATE Decision Threshold** | **TRANSFER Options** | **AVOID Triggers** | |---|---|---|---|---| | **CRITICAL** | Only if: (1) Risk ≤$10K annually, (2) Board-approved, (3) Quarterly reassessment required | Always mitigate; cost-benefit not applied. Control effectiveness target: ≥95% | Cyber liability insurance (min. $10M coverage); vendor contractual indemnification | Patient safety compromise; regulatory violation; data integrity loss | | **HIGH** | If: (1) Residual risk <$30K, (2) CISO approval, (3) Semi-annual review | Mitigate if control cost <$75K implementation + $15K annual. ROI target: ≥2:1 | Insurance for third-party liability; vendor risk transfer clauses | Regulatory enforcement risk; >100 patient data exposure | | **MEDIUM** | If: (1) Residual <$15K, (2) Manager approval, (3) Annual review | Mitigate if control cost <$20K. ROI ≥1.5:1 acceptable | Operational risk insurance; vendor SLAs for availability | Systemic control gaps; audit findings | | **LOW** | Default: Accept unless stakeholder objects. Annual confirmation required | Mitigate if cost <$5K and minimal operational effort | Not typically transferred | Negligible | ### Residual Risk Documentation Requirements **For all CRITICAL and HIGH risks:** - Quantified residual risk statement (financial + operational impact post-mitigation) - Mitigation control effectiveness assessment (based on 12+ months of operation data or industry benchmark) - Documented exceptions and compensating controls - Re-assessment trigger (annual or event-driven) - Board attestation (for CRITICAL) **For MEDIUM risks:** - Risk register entry with treatment approach - CISO semi-annual confirmation --- ## ERM INTEGRATION MAP ### Healthcare System Risk Taxonomy Alignment | **Cybersecurity/Operational Risk Category** | **Enterprise Risk Class** | **CFO Reporting Ownership** | **Clinical Leadership Sync** | **Reporting Cadence** | |---|---|---|---|---| | **Patient Data Breach (unauthorized access)** | Compliance/Regulatory + Reputational | Finance (penalty reserve) | Chief Medical Officer | Monthly risk register; quarterly board | | **EHR System Unavailability** | Operational Continuity + Financial | COO (revenue impact) + IT | CMO (clinical workflows) | Real-time alerts; weekly risk review | | **Medical Device Security (networked devices)** | Patient Safety + Operational | Chief Medical Officer (clinical governance) | CMO + Biomedical Engineering | Quarterly risk register | | **Third-Party Vendor Compromise** | Supply Chain/Operational | Procurement + Security | CMO (if clinical vendor) | Semi-annual; immediate if vendor affects patient care | | **Ransomware/Extortion** | Financial + Operational + Reputational | CFO + General Counsel | COO (operational impact) | Monthly KRI; incident escalation protocol | | **Regulatory Non-Compliance** | Compliance/Regulatory | General Counsel + Compliance | CMO (HIPAA clinical workflows) | Quarterly; pre-audit | | **Insider Threat (staff misuse)** | Compliance + Reputational | HR (personnel) + Security | CMO (clinical staff governance) | Semi-annual audit; real-time alerts for critical systems | | **IT Infrastructure Degradation** | Operational Continuity | CIO + COO | CMO (clinical system dependencies) | Monthly monitoring; quarterly risk register | ### Aggregation Methodology for Board Reporting **Risk Scoring Approach:** - **Financial Aggregation:** Sum of quantified CRITICAL + HIGH risk financial impacts; MEDIUM/LOW tracked separately - **Compliance Status:** Count of open violations; trending vs. prior quarter - **Operational Resilience:** % of critical systems meeting uptime SLA; trend analysis - **Risk Velocity:** Month-over-month change in risk profile (increasing/stable/decreasing) **Board Reporting Format (Quarterly):** 1. **Risk Heat Map:** CRITICAL (red), HIGH (amber), MEDIUM (yellow), LOW (green) — visual dashboard 2. **Trend Analysis:** Comparison to prior quarter; driver of any increases 3. **Treatment Status:** % of risks with active mitigation; expected residual risk trajectory 4. **KRI Performance:** Green/Yellow/Red status for top 8 KRIs (see framework below) 5. **Regulatory Posture:** Compliance violations, audit findings, enforcement actions (trend) 6. **Recommendations:** Proposed treatment decisions requiring board approval (if any) --- ## KEY RISK INDICATOR (KRI) FRAMEWORK ### Tier 1 KRIs (Board Visibility — Quarterly) | **KRI** | **Target Threshold (Green/Yellow/Red)** | **Data Source** | **Frequency** | **Owner** | **Rationale** | |---|---|---|---|---|---| | **HIPAA Breach Incidents (annual count)** | Green: 0 / Yellow: 1 / Red: ≥2 | Breach notification log (legal/security) | Monthly calculation; quarterly report | General Counsel | Patient privacy baseline | | **Critical System Availability (%)** | Green: ≥99.5% / Yellow: 99–99.4% / Red: <99% | EHR/Portal/Medical Device uptime logs | Weekly; quarterly avg | CIO | Patient care continuity | | **Unpatched Critical Vulnerabilities (age >30 days)** | Green: 0 / Yellow: 1–2 / Red: ≥3 | Vulnerability scanner (Nessus/Qualys) | Weekly; monthly report | CISO | Attack surface exposure | | **Third-Party Vendor Compliance Status (%)** | Green: ≥95% compliant / Yellow: 85–94% / Red: <85% | Vendor audit/attestation records (ServiceNow) | Semi-annual; quarterly tracking | Vendor Risk Manager | Supply chain integrity | | **Regulatory Findings (Open OCR/State violations)** | Green: 0 / Yellow: 1–2 / Red: ≥3 | OCR/State AG correspondence; audit log | Quarterly | Compliance Officer | Regulatory posture | | **Insider Threat Alerts (confirmed threats/month)** | Green: 0 / Yellow: 1 / Red: ≥2 | SIEM (Splunk) + DLP alerts; security review | Monthly | Security Operations Center | Employee risk monitoring | | **Risk Register Aging (risks overdue for review %)** | Green: <5% overdue / Yellow: 5–10% / Red: >10% | ServiceNow risk register (auto-calculated) | Monthly | CISO | Risk governance discipline | | **Annual Risk Assessment Completion (%)** | Green: ≥90% planned assessments complete / Yellow: 70–89% / Red: <70% | Project management; assessment log | Quarterly | Risk Management Office | Systematic coverage | ### Tier 2 KRIs (Operational — Monthly to CISO) | **KRI** | **Target Threshold** | **Data Source** | **Frequency** | |---|---|---|---| | **Mean Time to Detect (MTTD) for security incidents** | Green: <2 hours / Yellow: 2–6 hours / Red: >6 hours | SIEM logs (Splunk) | Weekly | | **Mean Time to Remediate (MTTR) for HIGH risk findings** | Green: <30 days / Yellow: 30–60 days / Red: >60 days | Vulnerability tracking (ServiceNow) | Monthly | | **MFA enrollment (% of user population)** | Green: ≥95% / Yellow: 85–94% / Red: <85% | IAM system (Okta/Azure AD) | Monthly | | **Security training completion (% of staff)** | Green: ≥95% annual / Yellow: 85–94% / Red: <85% | LMS (Learning Management System) | Quarterly | | **Backup restoration tests (successful / annual)** | Green: 12 tests/year, 100% successful / Yellow: <12 or 1 failure / Red: ≥2 failures | Backup system logs (Veeam/Commvault) | Monthly aggregate | ### KRI Automation via ServiceNow - **Data Integration:** Connect SIEM (Splunk), vulnerability scanner, IAM, LMS to ServiceNow via API - **Threshold Logic:** Automated red/yellow/green flagging based on rules above - **Alert Escalation:** Yellow/Red KRIs trigger automatic CISO notification; Red KRIs auto-escalate to board risk committee - **Trend Visualization:** Dashboard showing 12-month KRI trajectory for board/executive review --- ## IMPLEMENTATION ROADMAP ### Phased Approach to Tier 3 Maturity (12-Month Timeline) | **Phase** | **Timeline** | **Key Activities** | **Resource Allocation** | **Success Criteria** | **Dependencies** | |---|---|---|---|---|---| | **Phase 1: Foundation** | Months 1–3 | • Finalize risk appetite statement (exec alignment) • Design NIST 800-30 assessment process • Configure ServiceNow GRC module for risk register • Establish KRI automated dashboard • Define governance roles (Risk Committee structure) | CISO (40%), Risk Manager (100%), IT (20%) | Approved appetite statement; GRC tool operational; governance charter signed | Executive sponsor alignment; ServiceNow admin support | | **Phase 2: Initial Assessment** | Months 4–5 | • Conduct full NIST 800-30 risk assessment across 12 facilities • Quantify top 15 risks using FAIR methodology • Populate risk register in ServiceNow • Complete vendor risk assessments (all vendors managing patient data) • Establish baseline KRI values | CISO (30%), Assessment team (100%), Vendor team (50%) | ≥90% of risks assessed and documented; risk register >95% populated; baseline KRIs established | Phase 1 completion; assessment tools ready | | **Phase 3: Mitigation Planning** | Months 6–8 | • Develop mitigation strategies for CRITICAL/HIGH risks (cost-benefit analysis) • Negotiate vendor contracts with new risk transfer requirements • Design control effectiveness metrics • Roll out Phase 1 of security awareness training (100% staff) • Implement first tranche of controls (prioritized by risk reduction/cost) | CISO (40%), Security team (100%), Procurement (30%), Training (50%) | Mitigation plans approved for CRITICAL/HIGH; vendor contracts renewed; first controls deployed and tested | Assessment completion; budget approval | | **Phase 4: Continuous Monitoring** | Months 9–12 | • Deploy KRI monitoring via automated ServiceNow dashboard • Establish quarterly board reporting cadence (Risk Committee) • Conduct first internal risk register audit • Update risk assessments (50% of register) • Complete annual training and security awareness • Refine tolerance thresholds based on 6 months operational data | CISO (20%), Security Ops (100%), Audit (20%) | KRI dashboard operational; 3 board reports delivered; audit findings <5% | Phase 3 completion; monitoring tools configured | | **Post-Implementation** | Month 13+ | • Semi-annual full risk assessments • Continuous risk register updates (emerging risks, treatment status) • Annual FAIR quantification of top risks • Ongoing board reporting (quarterly) • Maturity reassessment annually; plan for Tier 4 | CISO (15%), Risk team (40%) | Sustained Tier 3 performance; <3-month lag in risk assessments; board satisfaction | Phase 4 success | ### Resource Requirements by Phase **Staffing:** - **CISO:** Strategy, governance, oversight (40% allocation during Phases 1–3; 15% sustain) - **Risk Manager (new FTE or reallocated):** Day-to-day register management, assessments, board reporting (100% ongoing) - **Security Operations:** SIEM monitoring, incident response integration (50% Phase 4+) - **IT/GRC Administrator:** ServiceNow configuration, automation, KRI dashboard (40% Phase 1, 20% sustain) - **Audit/Compliance:** Assessment participation, control validation (30% Phase 2–3, 20% sustain) **Budget Allocation (from $800K annual):** - **Phase 1 (tool/governance):** $80K (ServiceNow consulting, training) - **Phase 2 (assessment):** $120K (external FAIR specialist for top risks, vendor assessment tools) - **Phase 3 (mitigation):** $400K (security controls: endpoint detection, enhanced logging, network segmentation) - **Phase 4+ (sustain):** $200K annual (monitoring tools, threat intel, annual assessments) --- ## CONFIDENCE ASSESSMENT | **Dimension** | **Confidence Level** | **Supporting Factors** | **Assumptions/Risks** | |---|---|---|---| | **Risk Appetite Definition** | **HIGH** | Clear business context (healthcare, HIPAA, 12 facilities); quantified thresholds grounded in industry standards | Assumes executive team alignment on conservative posture (recommend board validation) | | **Methodology Selection** | **HIGH** | NIST 800-30 + FAIR is well-established in healthcare; ServiceNow integration straightforward | Assumes adequate FAIR training; may require external consultant for first 2 cycles | | **Tolerance Thresholds** | **MEDIUM-HIGH** | Grounded in regulatory requirements + organizational financial constraints; benchmarked to healthcare industry | $250K CRITICAL threshold may need adjustment post-first-assessment if discovery reveals different risk distribution | | **Treatment Matrix** | **MEDIUM-HIGH** | Decision logic clear and consistent; ROI thresholds realistic for $800K budget | Assumes security team capacity adequate for mitigation execution; may need contractor support | | **ERM Integration** | **MEDIUM** | Framework provided; integration depends on CFO/COO current risk governance maturity | If enterprise GRC tool already exists, mapping should be verified; may require cross-functional alignment meeting | | **KRI Framework** | **HIGH** | Indicators directly measurable via existing tools (Splunk, ServiceNow, IAM, LMS) | Assumes data quality in source systems; recommend validation of SIEM/backup logs in Phase 1 | | **Implementation Timeline** | **MEDIUM** | 12-month path to Tier 3 is aggressive but achievable with dedicated resources | Delays possible if: (1) Phase 1 governance alignment stalled, (2) vendor assessments reveal major compliance gaps, (3) major incident disrupts timeline | | **Overall Confidence** | **HIGH** | Mature healthcare organization with established team and budget; existing tool foundation strong | Success depends on executive commitment to conservative posture and board risk governance discipline | --- ## CHAIN READY STATUS ✅ **GV.RM Framework Complete** **Ready for next CSF 2.0 function:** - **GV.RR (Risk Reporting):** Board reporting cadence defined; KRI framework operationalized - **GV.RE (Risk Roles):** Governance matrix established; escalation paths clear - **GV.RR Risk Committee Charter:** Recommend board approval in Phase 1; quarterly review cycle **Recommended Next Steps:** 1. **Board Risk Committee Alignment (Week 1–2):** Present appetite statement, tolerance thresholds, KRI framework; obtain formal approval 2. **CISO + Finance Alignment (Week 2):** Validate $800K budget allocation across 4 phases; confirm contingency reserves 3. **Phase 1 Kickoff (Week 3):** ServiceNow configuration sprint; governance charter finalization 4. **Quarterly Check-In (End Month 3):** Board review of GRC tool operational status; KRI baseline validation --- ## APPENDIX: INDUSTRY BENCHMARKS (Healthcare Context) | **Metric** | **Typical Healthcare System** | **Your Target (Conservative)** | **Rationale** | |---|---|---|---| | Breach incidents/year | 0.8–1.5 | 0 (aspirational; <0.5 realistic) | Conservative posture; 2K employee org | | Critical system uptime | 99.0–99.5% | ≥99.5% | EHR criticality requires higher standard | | Annual risk assessments completed | 60–75% | ≥90% | Tier 3 requires systematic coverage | | MTTD (security incidents) | 4–8 hours | <2 hours | 24/7 SOC justifiable given HIPAA stakes | | Vendor compliance rate | 70–80% | ≥95% | Tighter third-party governance | | Board oversight (meetings/year) | 2–4 | 4 (quarterly) | Quarterly cadence supports Tier 3 maturity | --- **Strategy validated for Tier 3 maturity target and conservative organizational posture. Framework implements GV.RM 01–07 requirements and positions organization for board-level risk governance. Proceed to Phase 1 planning.**
🌀 Claude

Csf 20 Risk Strategy Builder

Add to Cart
Instant accessInstant access
Usage rightsCommercial use
Money-back guaranteeMoney‑back
By purchasing this prompt, you agree to our terms of service
CLAUDE-4-5-HAIKU
Tested icon
Guide icon
4 examples icon
Free credits icon
Transform vague “we need better security” conversations into board-ready cybersecurity risk governance artifacts aligned with NIST CSF 2.0 GV.RM. This prompt produces a governance-level risk management architecture
...more
Added over 1 month ago
Report
Browse Marketplace