Framework

COSO ERM
enterprise risk management for cyber and information security

COSO Enterprise Risk Management (Integrating with Strategy and Performance, 2017) is the enterprise risk framework boards, audit committees, and senior leadership read against. This page covers the five components, the twenty principles, how cyber risk and information security work map into the framework, the operating cadence, the audit evidence the framework expects, and where COSO ERM sits alongside ISO 31000, NIST CSF 2.0, FAIR, and the wider risk regime.

No credit card required. Free plan available forever.

COSO ERM explained for cyber and information security

COSO Enterprise Risk Management - Integrating with Strategy and Performance (2017) is the enterprise risk framework boards, audit committees, and senior leadership most commonly read against. Published by the Committee of Sponsoring Organizations of the Treadway Commission, COSO ERM is intentionally cross-functional: it covers strategic, operational, reporting, and compliance risk, and it expects the cyber risk programme to participate in the enterprise portfolio rather than to operate as a parallel discipline. The 2017 update replaced the earlier 2004 cube model with five components and twenty principles, and it explicitly tied risk management to strategy and performance rather than treating risk as a downstream control activity.

For CISOs, GRC owners, internal auditors, and security leaders, COSO ERM is the language the audit committee uses, the framework SEC cybersecurity disclosures read against, and the anchor that keeps cyber risk visible at the board level. Programmes already operating against NIST CSF 2.0, ISO 27001, or SOC 2 do not need to migrate; COSO ERM sits on top of those frameworks as the enterprise reporting layer the board reads.

The five components of COSO ERM (2017)

The 2017 update structures the framework around five components that together describe how enterprise risk is governed, planned, performed, reviewed, and communicated. The component names are the highest-level vocabulary; the twenty principles beneath the components are what the work is actually planned and audited against.

Governance and Culture

Sets the tone at the top, names the board oversight model, defines risk roles and responsibilities, embeds the desired culture, and recruits and retains the talent the programme needs. The five principles in this component are where cyber risk reporting to the board lives, where the audit committee oversight cadence is recorded, and where the named CISO accountability is documented rather than implied.

Strategy and Objective-Setting

Integrates ERM with strategy, defines risk appetite, evaluates alternative strategies, and formulates business objectives. The four principles are where cyber risk appetite is articulated against strategic options. For security, this is where the board records the cyber risk appetite that downstream programmes (vulnerability management SLAs, exception thresholds, third-party risk tolerance) read against rather than each programme inventing its own.

Performance

Identifies risks to strategy and business objectives, assesses severity, prioritises responses, implements responses, and develops a portfolio view of risk. The five principles are the operating heart of the framework. For cyber, this is where vulnerability findings, control gaps, third-party risks, and incident exposures are quantified, prioritised against the appetite, and treated. The portfolio view is what lets leadership see cyber risk as one risk type among many rather than as an isolated technical concern.

Review and Revision

Assesses substantial change, reviews risk and performance, and pursues improvement in ERM. The three principles drive continuous adjustment. For cyber, this component covers the cadence on which the cyber risk register is refreshed against changes in the threat landscape, the regulatory regime, the business model, the technology stack, and acquired or divested business units.

Information, Communication, and Reporting

Leverages information and technology, communicates risk information, and reports on risk, culture, and performance. The three principles shape the reporting model. For cyber, this is where the security operating record translates into the board pack, the audit committee minutes, the management discussion and analysis disclosures, and the cross-functional risk dashboards leadership actually reads.

The twenty principles, organised by component

The twenty principles are the operating expectations the framework expects an organisation to demonstrate. Each principle is structured to support a yes or no audit read backed by evidence: governance documents, role registers, risk appetite statements, identification records, severity assessments, response decisions, change reviews, and reporting artefacts. Programmes that treat the twenty principles as audit checkpoints rather than aspirational language gain a defensible cycle that holds up under board, audit, and regulator scrutiny.

  • Governance and Culture (1 to 5): Exercise Board Risk Oversight, Establish Operating Structures, Define Desired Culture, Demonstrate Commitment to Core Values, Attract Develop and Retain Capable Individuals.
  • Strategy and Objective-Setting (6 to 9): Analyzes Business Context, Defines Risk Appetite, Evaluates Alternative Strategies, Formulates Business Objectives.
  • Performance (10 to 14): Identifies Risk, Assesses Severity of Risk, Prioritizes Risks, Implements Risk Responses, Develops Portfolio View.
  • Review and Revision (15 to 17): Assesses Substantial Change, Reviews Risk and Performance, Pursues Improvement in ERM.
  • Information, Communication, and Reporting (18 to 20): Leverages Information and Technology, Communicates Risk Information, Reports on Risk Culture and Performance.

How cyber risk maps into the principles

COSO ERM does not contain cyber-specific language; it expects each risk type to read against the same component and principle structure. The mappings below name the cyber-side artefact each principle expects to see, written so an information security programme can produce the evidence as a side effect of operational work rather than as a separate audit deliverable.

  • Principle 1 (Exercise Board Risk Oversight) carries the audit committee cyber agenda, the named board liaison for cybersecurity, the briefing cadence, and the documented escalation thresholds. The evidence is the board pack, the meeting minutes, and the resolution record rather than narrative assertion.
  • Principle 7 (Defines Risk Appetite) carries the cyber risk appetite statement. This is where the organisation records the loss tolerance, the acceptable downtime, the regulatory exposure ceiling, and the third-party risk threshold the cyber programme operates inside. Without a documented appetite, prioritisation downstream is improvised.
  • Principle 10 (Identifies Risk) carries the cyber risk register. Findings raised through external scanning, authenticated DAST, code scanning, penetration testing, vendor reviews, and incident response feed the register against the same identification taxonomy used for other risk types.
  • Principle 11 (Assesses Severity of Risk) carries the cyber risk quantification or qualitative severity record. CVSS technical severity, EPSS exploit probability, CISA KEV active exploitation status, and FAIR-style frequency-and-magnitude estimates compose into the severity decision the framework expects to see.
  • Principle 12 (Prioritizes Risks) carries the cyber treatment queue. Prioritisation reads the severity output against the appetite from Principle 7 and produces the queue downstream remediation, exception, transfer, and acceptance decisions act on.
  • Principle 13 (Implements Risk Responses) carries the disposition record per cyber risk: mitigate, transfer, accept, share, or avoid. Each disposition has a named owner, a deadline, an evidence reference, and a closure or re-evaluation point.
  • Principle 14 (Develops Portfolio View) carries the cross-risk view that lets leadership see cyber against other risks. This is where the cyber programme stops looking like a separate world and starts reading as one risk type in the enterprise portfolio.
  • Principle 16 (Reviews Risk and Performance) carries the cyber programme performance review cadence. Aging findings, exception register growth, retest closure rates, and SLA conformance are the cyber-side performance signals that read against this principle.
  • Principle 19 (Communicates Risk Information) carries the cross-functional cyber communication record between security, legal, finance, audit, IT, and the business. Communication is structured rather than informal, and the absence of a record is a documented failure mode.
  • Principle 20 (Reports on Risk Culture and Performance) carries the leadership reporting model the cyber programme uses. The board pack, the audit committee report, the regulator-facing disclosures, and the management discussion and analysis pieces all read against this principle.

Operating cadence across the cycle

A COSO ERM cyber programme runs as a continuous cycle rather than an annual report. The cadence below is the practical ordering most programmes follow when COSO ERM is treated as the operating framework rather than a reporting wrapper. The cycle compounds: each re-baseline starts from the prior register, the register accuracy improves, and the board pack content gains continuity year over year.

  1. 1Establish the governance baseline. Document the audit committee oversight model, the executive cyber sponsor, the CISO authority and reporting line, the named risk-owner roles across the organisation, the policy hierarchy, and the desired culture and core values. The governance baseline is the input every other component reads against.
  2. 2Set the cyber risk appetite. Translate the enterprise risk appetite into cyber-specific terms: the loss tolerance, the acceptable downtime by criticality tier, the regulatory exposure ceiling, the third-party risk threshold, the data classification severity, and the incident materiality threshold. Capture the appetite as a board-approved statement with a documented review cycle.
  3. 3Build the cyber risk register against the appetite. Walk the in-scope assets, processes, and third parties, identify the cyber risks each carries, and record them in the register with severity, owner, treatment, and review cadence per entry. Borrow the identification taxonomy from existing operational and financial risk registers so the cyber register reads consistently with the rest of the enterprise risk portfolio.
  4. 4Operate the response cycle. Run the disposition decisions (mitigate, transfer, accept, share, avoid) through the structured engagement record rather than through email. Each disposition has a named owner, a deadline, an evidence reference, and a closure or re-evaluation point. The response cycle is the operating heart of Component 3.
  5. 5Run the review cadence. Refresh the register against substantial change (new technology, new regulation, business unit acquisition or divestiture, threat landscape shift, regulator action). Review aging findings, exception register growth, retest closure rates, and SLA conformance against the appetite. Document the lessons learned and feed them back into governance.
  6. 6Report on a defensible cadence. Build the board pack, the audit committee report, and the cross-functional risk dashboards from the same operating record rather than rebuilding the bundle each cycle. Reporting that is reproducible from a structured record is what makes COSO ERM durable across leadership turnover and audit cycles.

Failure modes the framework is designed to surface

COSO ERM is forgiving on the choice of risk identification methods, the severity scoring approach, and the response decisions a programme takes. It is unforgiving about a small number of patterns that make the framework cosmetic rather than operational. The patterns below are the ones that recur across cyber adoptions and that erode the year-over-year continuity the framework expects.

  • Treating COSO ERM as a finance and audit framework only. The 2017 update explicitly integrates ERM with strategy and performance, and cyber risk is a strategic risk for almost every modern organisation. Programmes that exclude cyber from the ERM cycle leave a material risk type outside the portfolio view, and the board oversight expectation under Principle 1 is then unmet.
  • Adopting the appetite statement as a slogan. A risk appetite statement that says the organisation has low tolerance for cyber risk and stops there is not operational. The framework expects appetite to translate into thresholds the cyber programme operates inside (loss tolerance, acceptable downtime, regulatory exposure ceiling, third-party risk threshold), and the absence of those thresholds is a documented failure mode.
  • Running a parallel cyber risk register that does not feed the enterprise register. Cyber risk that lives in a security tool stack and does not reach the enterprise risk portfolio is invisible to the audit committee and the board. The framework is unforgiving about this separation, because the portfolio view under Principle 14 cannot be honest without the cyber input.
  • Confusing severity assessment with CVSS alone. CVSS measures technical severity, not business risk. The framework expects severity to combine technical signal (CVSS, EPSS, KEV) with business impact (asset criticality, regulatory exposure, customer commitments) before prioritisation. Programmes that prioritise on CVSS alone fail Principle 11 in practice.
  • Skipping the review cadence after substantial change. Acquisitions, divestitures, regulatory shifts, and major technology migrations each demand a register review. Programmes that refresh the cyber register annually regardless of change events lose the year-over-year continuity the framework expects under Principle 15.
  • Treating reporting as a year-end compilation. The framework expects reporting to be a continuous output of the operating record. Programmes that rebuild the board pack, the audit committee report, and the regulator disclosures from scratch each cycle cannot demonstrate the principle 20 expectations because the underlying record is reconstructed rather than maintained.

Evidence the framework expects to see

The COSO ERM evidence pack reads well when it is built as a side effect of the operating work rather than reconstructed at the year-end. The minimum set below maps to the principles examiners and audit committees most often read against, and the same artefacts feed parallel reads under NIST CSF 2.0, ISO 31000, ISO 27001, SOC 2, and the SEC cybersecurity disclosure rules when the underlying record is structured.

  • Board oversight evidence: audit committee charter naming cybersecurity oversight, board pack history covering cyber agenda items, meeting minutes recording the cyber discussions and decisions, and the documented escalation thresholds (Principle 1)
  • Operating structure record: organisational chart showing the cyber reporting line, named risk-owner roster across the organisation, RACI matrix for cyber risk decisions, and the executive cyber sponsor identification (Principles 2, 3)
  • Culture and core values evidence: documented core values referencing risk responsibility, security awareness training cohort and completion record, code of conduct, and the disciplinary record where culture violations were addressed (Principles 4, 5)
  • Cyber risk appetite statement: board-approved document covering loss tolerance, acceptable downtime, regulatory exposure ceiling, third-party risk threshold, and the review cycle (Principles 7, 8)
  • Cyber risk register: structured register with risk identification, severity assessment combining CVSS, EPSS, KEV, and qualitative or quantitative impact, prioritisation rationale, treatment decision, named owner, review cadence, and closure or re-evaluation evidence (Principles 10, 11, 12, 13)
  • Portfolio view artefact: enterprise risk portfolio showing cyber risk alongside operational, financial, strategic, compliance, and reputational risk, with severity and treatment status reading consistently across the portfolio (Principle 14)
  • Substantial change record: documented review of cyber posture against material business changes (acquisitions, divestitures, new product launches, regulatory shifts, technology migrations), with the resulting register adjustments captured (Principle 15)
  • Performance review record: aging findings, exception register growth, retest closure rates, SLA conformance, and the trended performance signals leadership reads against the appetite (Principle 16)
  • Improvement record: documented improvements to the ERM programme based on lessons from incidents, exercises, audits, and external assessments (Principle 17)
  • Information and technology leverage evidence: the systems of record the programme uses, the data quality controls applied, and the access and audit trail evidence the supporting platforms produce (Principle 18)
  • Cross-functional communication record: documented communication between security, legal, finance, IT, audit, and the business covering material cyber risk events and decisions (Principle 19)
  • Reporting model: board pack, audit committee report, regulator-facing disclosures, and management discussion and analysis content covering cyber risk culture and performance, with the source records that back each claim (Principle 20)

How COSO ERM relates to adjacent frameworks

COSO ERM is the enterprise risk framework. The frameworks below cover related ground at different layers, and most cyber programmes read against several of them simultaneously. The relationships matter because programmes that try to operate each framework in isolation rebuild the same evidence multiple times.

COSO ERM vs ISO 31000

ISO 31000 is the international standard on risk management, principles based, and intentionally light on prescriptive structure. COSO ERM is more structured (five components, twenty principles) and explicitly integrates with strategy and performance. The two compose well: ISO 31000 supplies the operational risk management discipline the risk team uses day to day, and COSO ERM supplies the enterprise framing the board reads against. Programmes that operate both use ISO 31000 as the working standard and COSO ERM as the enterprise reporting frame.

COSO ERM vs NIST CSF 2.0

NIST CSF 2.0 is the cybersecurity outcome framework with the new GOVERN function. COSO ERM is the enterprise risk framework. The two cross-walk: NIST CSF 2.0 GOVERN subcategories (GV.OC, GV.RM, GV.RR, GV.PO, GV.OV, GV.SC) read directly against COSO ERM Component 1 (Governance and Culture) and Component 2 (Strategy and Objective-Setting). Programmes operate NIST CSF 2.0 as the cybersecurity outcome layer and COSO ERM as the enterprise risk layer, with the same evidence reading across both.

COSO ERM vs FAIR and CRQ

FAIR is the open quantitative cyber risk model. CRQ is the broader practice of expressing cyber risk in financial terms. COSO ERM does not prescribe quantification methods, but the severity assessment expectation under Principle 11 and the portfolio view expectation under Principle 14 read well against quantitative output. Programmes that adopt FAIR or another quantification method use it as the engine that produces the severity and portfolio inputs COSO ERM Components 2 and 3 expect.

COSO ERM vs SEC Cybersecurity Disclosure

The SEC cybersecurity disclosure rules (Item 106 of Regulation S-K) require registrants to describe their processes for assessing, identifying, and managing material cybersecurity risks, plus the board oversight model. The disclosure language reads naturally in COSO ERM vocabulary. Programmes that operate against COSO ERM produce most of the artefacts the SEC rules expect (governance description, risk management process, board oversight evidence) as a side effect of the framework rather than as a separate exercise.

COSO ERM vs SOC 2 Trust Services Criteria

SOC 2 reports under the AICPA trust services criteria explicitly reference COSO ERM, and the COSO components map across the SOC 2 Common Criteria. CC3 (Risk Assessment) is the closest direct mapping to COSO Components 2 and 3. Programmes that operate against both keep one underlying control evidence pack and read it under COSO ERM at the enterprise layer and under SOC 2 at the assurance layer.

COSO ERM vs COSO Internal Control

COSO Internal Control - Integrated Framework (the 2013 update) is the older COSO framework most commonly used for SOX 404 internal control over financial reporting. COSO ERM (2017) is broader, covering all enterprise risk types, and integrates with strategy and performance. The two are complementary: Internal Control is the SOX-aligned framework over financial reporting, ERM is the enterprise risk framework over all risk types including cyber, and they share governance vocabulary so an organisation operating SOX 404 inherits part of the ERM evidence pack.

Where SecPortal fits in a COSO ERM cyber programme

SecPortal is the operating layer for the COSO ERM cyber cycle, not a replacement for the framework or for the enterprise risk register the broader risk function maintains. The platform handles the cyber-side workstreams (engagement structure, finding intake, severity scoring, treatment dispositions, retest evidence, leadership reporting) so the cyber inputs Component 3 expects are produced as structured records rather than reconstructed when reporting is due. The same workspace that hosts the engagement record hosts the SAST, SCA, authenticated DAST, external scanning, and pentest evidence the operating signal depends on, so the line from artefact to risk register stays traceable.

  • Engagement management dedicated to the COSO ERM cycle, with phases (governance baseline, appetite definition, register build, response cycle, review cadence, reporting) tracked as workstreams rather than as one document stitched together at the year end
  • Findings management with CVSS 3.1 scoring, structured fields, and tags so the cyber findings raised through external scanning, authenticated DAST, code scanning, and penetration testing feed the cyber risk register against the severity assessment expectation under Principle 11
  • Compliance tracking that maps the same evidence pack across COSO ERM components and principles, NIST CSF 2.0 functions, ISO 31000 process steps, ISO 27001 Annex A, SOC 2 trust services criteria, and SEC cybersecurity disclosure expectations, so the cross-framework footprint reads from a single source rather than a manually reconciled spreadsheet stack
  • AI report generation that turns the operating record into a structured leadership report and a board-ready summary covering the appetite, the register state, the response disposition rate, the performance signals, and the substantial-change reviews, without manual rewriting at each cycle
  • Activity log with CSV export that captures every state change to a finding, a register entry, a disposition, or a review record, with timestamp and named user, so the trail is reproducible at audit time without a multi-team excavation
  • Document management for the audit committee charter, the cyber risk appetite statement, the policy hierarchy, the board pack history, the audit committee minutes, the regulator-facing disclosures, and the management discussion and analysis content the framework expects to see
  • Team management with role-based access so the risk-owner roster, the executive sponsor, the audit committee liaison, the CISO, and the cross-functional partners named under Component 1 each have the right permissions, and the access decisions read into the activity log
  • Continuous monitoring with scheduled scans across external, authenticated, and code surfaces so the operational signal feeding the register is current rather than reconstructed when reporting is due

The day-to-day cyber risk work is where COSO ERM Component 3 (Performance) reads against the operating record. The security leadership reporting workflow carries the cadence Principles 1, 19, and 20 expect across the audit committee and the board. The vulnerability prioritisation workflow translates the appetite from Principle 7 into the per-finding queue Principle 12 expects. The vulnerability acceptance and exception workflow records the documented exceptions Principles 7 and 13 require. The control mapping crosswalks workflow keeps the COSO ERM evidence pack readable under NIST CSF 2.0, ISO 27001, SOC 2, and the SEC disclosure rules without a manual reconciliation each cycle.

For CISOs and security leaders carrying the Component 1 oversight cadence, the CISOs and security leaders workspace bundles the platform with the engagement structure the audit committee reads against. For the GRC function that owns the cross-framework evidence pack, the GRC and compliance teams workspace covers the audit-side discipline that turns the COSO ERM artefacts into a portable evidence record. For the vulnerability management function feeding the cyber inputs Components 2 and 3 expect, the vulnerability management teams workspace covers the lifecycle work that produces the operational signal the register reads against.

For deeper reading on the leadership-side disciplines this framework supports, the board-level security reporting guide covers the structure, narrative, and cadence Principles 19 and 20 expect. The cyber risk quantification guide covers FAIR, CRQ adoption, and the financial language Principles 7, 11, and 14 read against. The security program KPIs and metrics framework covers the operating metrics the performance review under Principle 16 reads against. The CISO security metrics dashboard guide covers the dashboard structure the cross-functional reporting under Principle 19 expects. For analytical context on how cyber programmes age and the patterns that erode evidence continuity, the security control drift research covers the substantial-change patterns Principles 15 and 17 are designed to surface.

Key control areas

SecPortal helps you track and manage compliance across these domains.

Component 1: Governance and Culture

Governance and Culture sets the tone at the top, names the board oversight model, defines risk roles and responsibilities, embeds the desired culture, and recruits and retains the talent the programme needs. The five principles in this component (Exercise Board Risk Oversight, Establish Operating Structures, Define Desired Culture, Demonstrate Commitment to Core Values, Attract Develop and Retain Capable Individuals) are where cyber risk reporting to the board lives. The audit committee oversight cadence, the executive cybersecurity sponsorship, and the named CISO accountability all sit under this component.

Component 2: Strategy and Objective-Setting

Strategy and Objective-Setting integrates ERM with strategy, defines risk appetite, evaluates alternative strategies, and formulates business objectives. The four principles (Analyzes Business Context, Defines Risk Appetite, Evaluates Alternative Strategies, Formulates Business Objectives) are where cyber risk appetite is articulated against strategic options. For security, this is where the board records the cyber risk appetite that downstream programmes (vulnerability management SLAs, exception thresholds, third-party risk tolerance) read against.

Component 3: Performance

Performance identifies risks to strategy and business objectives, assesses severity, prioritises responses, implements responses, and develops a portfolio view of risk. The five principles (Identifies Risk, Assesses Severity of Risk, Prioritizes Risks, Implements Risk Responses, Develops Portfolio View) are the operating heart of the framework. For cyber, this is where vulnerability findings, control gaps, third-party risks, and incident exposures are quantified, prioritised against the appetite, and treated. The portfolio view is what lets leadership see cyber risk as one risk type among many rather than as an isolated technical concern.

Component 4: Review and Revision

Review and Revision assesses substantial change, reviews risk and performance, and pursues improvement in ERM. The three principles (Assesses Substantial Change, Reviews Risk and Performance, Pursues Improvement in ERM) drive continuous adjustment. For cyber, this component covers the cadence on which the cyber risk register is refreshed against changes in the threat landscape, regulatory regime, business model, technology stack, and acquired or divested business units.

Component 5: Information, Communication, and Reporting

Information, Communication, and Reporting leverages information and technology, communicates risk information, and reports on risk, culture, and performance. The three principles (Leverages Information and Technology, Communicates Risk Information, Reports on Risk Culture and Performance) shape the reporting model. For cyber, this is where the security operating record translates into the board pack, the audit committee minutes, the management discussion and analysis disclosures, and the cross-functional risk dashboards leadership reads.

The twenty principles in operating practice

The twenty principles below the five components are the operating expectations the framework expects an organisation to demonstrate. Each principle is structured to support a yes or no audit read backed by evidence: governance documents, role registers, risk appetite statements, risk identification records, severity assessments, response decisions, change reviews, and reporting artefacts. Programmes that treat the twenty principles as audit checkpoints rather than aspirational language gain a defensible cycle that holds up under board, audit, and regulator scrutiny.

COSO ERM vs ISO 31000 and NIST CSF 2.0

COSO ERM, ISO 31000, and NIST CSF 2.0 are complementary rather than competing. COSO ERM is the enterprise risk framework boards read against. ISO 31000 is the principles-based risk management standard organisations and risk teams operate against. NIST CSF 2.0 is the cybersecurity outcome framework with the new GOVERN function that consolidates the cyber-side governance practices. Programmes that operate against multiple regimes use COSO ERM at the enterprise layer, ISO 31000 for the operational risk discipline, and NIST CSF 2.0 for the cybersecurity outcome layer, with the same underlying evidence reading across all three.

Audit and assurance reads under COSO ERM

Internal auditors, external auditors, and regulators frequently use COSO ERM as the framework against which the wider risk programme is examined. For SEC-registered companies, the SEC Cybersecurity Disclosure rules expect risk management and governance disclosures that align with COSO-style language. For SOC 2 reporting entities, the COSO ERM components map across the trust services criteria. For audit committees, COSO ERM is often the reference vocabulary for cyber risk oversight. Programmes that build an evidence pack readable under COSO ERM reduce the cost of these parallel reviews.

Run a defensible COSO ERM cyber programme on one record

Hold the cyber risk register, the appetite-aligned prioritisation, the response evidence, the review cadence, and the leadership reporting on one workspace, then read the same record across NIST CSF 2.0, ISO 31000, and SOC 2. Start free.

No credit card required. Free plan available forever.