NIST SP 800-30
Risk assessment on one operating record
NIST Special Publication 800-30 Revision 1 is the federal guide to conducting risk assessments for information systems and the organisations that operate them. This page covers the four-step assessment process (Prepare, Conduct, Communicate, Maintain), the threat source taxonomy (adversarial, accidental, structural, environmental), the risk factor decomposition, the qualitative, semi-quantitative, and quantitative analytical approaches, how 800-30 sits next to NIST SP 800-39, NIST SP 800-37 (RMF), NIST SP 800-53, ISO 27001, ISO 27005, ISO 31000, FAIR, and COSO ERM, the recurring failure modes, the audit evidence the methodology expects, and how a workspace-driven approach turns 800-30 into a defensible operating record rather than a stack of disconnected assessments.
No credit card required. Free plan available forever.
NIST SP 800-30 risk assessment methodology explained
NIST Special Publication 800-30 Revision 1 (Guide for Conducting Risk Assessments, published September 2012) is the federal guide to the risk assessment process for information systems and the organisations that operate them. The publication sits underneath NIST SP 800-39 (Managing Information Security Risk) at the enterprise layer and feeds NIST SP 800-37 (the Risk Management Framework) at the operating layer. 800-30 specifies a four-step assessment process (Prepare, Conduct, Communicate, Maintain), a risk factor decomposition (threat source, threat event, vulnerability, predisposing condition, likelihood, impact), a taxonomy of threat sources, and a flexible analytical approach that accommodates qualitative, semi-quantitative, and quantitative analysis.
For CISOs, GRC owners, vulnerability management teams, AppSec teams, security engineering teams, security architects, enterprise risk teams, and the federal-side programmes operating under FISMA, FedRAMP, or CMMC, 800-30 is the methodology that produces the assessment evidence the rest of the programme references. Programmes already operating against NIST SP 800-37 (RMF), NIST SP 800-53, ISO 27001, or ISO 31000 use 800-30 as the underlying assessment process the higher-level framework reads against. The methodology is not a replacement for FAIR or COSO ERM; FAIR is one of the quantitative methods 800-30 accommodates, and COSO ERM consumes the 800-30 outputs into the enterprise risk portfolio.
Three-tier risk management context: where 800-30 sits
800-30 is one of the assessment processes inside the broader multi-tier risk management context NIST SP 800-39 describes. The three tiers carry different decisions and consume different assessment outputs. 800-30 is most commonly applied at Tier 3 (information system level) but uses the same task structure at all three tiers.
Tier 1: Organisation level
The strategic layer the assessment supports decisions at: enterprise risk strategy, mission and business function prioritisation, common control selection, security investment trade-offs, and the risk tolerance the rest of the framework reads against. Tier 1 assessments feed enterprise risk management decisions and shape the input set Tier 2 and Tier 3 assessments operate against. NIST SP 800-39 sits above 800-30 at this layer and defines the multi-tier risk management context. Programmes that skip Tier 1 produce per-system assessments that no enterprise-level decision can be reconciled against.
Tier 2: Mission and business process level
The layer covering enterprise architecture, information security architecture, business process design, and the per-process risk reads that inform Tier 1 and constrain Tier 3. Tier 2 assessments produce the risk-informed decisions about which business processes carry which risks, where the shared services sit, and how the mission requirements translate into security categorisation and control selection at the system level. Programmes that under-build Tier 2 carry process-design risk into Tier 3 system assessments where it is more expensive to correct.
Tier 3: Information system level
The operating layer most security teams encounter first: per-system risk assessments that feed the System Security Plan, the Authorisation to Operate decision, the continuous monitoring strategy, and the per-system POA&M entries. Tier 3 assessments produce the inputs the Authorising Official reads against under the NIST SP 800-37 RMF Authorise step. The 800-30 process described in this page is most commonly applied at Tier 3 but uses the same task structure at all three tiers.
The four-step assessment process: Prepare, Conduct, Communicate, Maintain
The 800-30 process is four sequential steps, each producing named outputs the next step reads against. The steps are sequential in dependency, not in calendar time: Maintain produces refreshed inputs that re-enter Prepare for the next assessment cycle, so the methodology operates as a loop rather than a one-off project. Each step is described in detail in 800-30 Section 3.
Step 1: Prepare for the assessment
Identify the purpose of the assessment (informing a decision, supporting an authorisation, satisfying a regulatory requirement, supporting an organisational risk management strategy update), the scope (the system, the business process, the organisational element, the time horizon), the assumptions and constraints (the level of detail, the resources available, the schedule, the dependencies on other assessments), the sources of information (threat intelligence, vulnerability data, predisposing conditions, organisational risk frame), and the risk model and analytical approach (the model that defines the risk factors, the values they take, the relationships between them, and the assessment approach: qualitative, semi-quantitative, or quantitative). Prepare produces the assessment plan that the rest of the process reads against. Programmes that compress Prepare into a sentence on a project plan reconstruct it during Conduct when the missing context becomes blocking.
Step 2: Conduct the assessment
Execute the analytical work. Identify threat sources (adversarial, accidental, structural, environmental). Identify threat events the sources can initiate. Identify vulnerabilities and predisposing conditions that allow the events. Determine the likelihood the threat events occur given the conditions. Determine the impact if the events occur. Determine the resulting risk as a combination of likelihood and impact. Conduct produces the risk assessment results: the per-risk record with the threat source, the threat event, the vulnerability or predisposing condition, the likelihood, the impact, and the determined risk level. Conduct is technique-agnostic; qualitative matrices, semi-quantitative scoring, and quantitative methods (FAIR-aligned, Monte Carlo distributions, statistical models) all sit underneath this step.
Step 3: Communicate assessment results
Communicate the assessment results to decision-makers in a form they can act on. Communicate the determined risk levels, the underlying analysis, the assumptions made during Prepare, the limitations of the assessment, and the recommended risk responses. Identify the decisions the communication should inform (acceptance, avoidance, mitigation, sharing, transfer), the audiences (system owner, authorising official, senior leadership, regulator, board), and the format per audience. Communicate is not a one-off briefing; it is a structured exchange that lets decision-makers question the inputs and push back on the analysis. Programmes that limit communication to a written report and a one-line executive summary miss the interrogation step the methodology expects.
Step 4: Maintain the assessment
Monitor risk factors on an ongoing basis and update the assessment when the risk factors change. Update triggers include: the system architecture changes, a new threat actor or capability emerges, a new vulnerability is identified, a control changes effectiveness, an exception register entry is added or expires, an incident occurs that suggests previous risk estimates were miscalibrated, or the assessment reaches the periodic refresh cadence. Maintain produces the refresh evidence: the input deltas since the prior cycle, the analyst sign-off per refresh, the impact on the prior risk determinations, and the communication to the decision-makers who relied on the prior assessment. Maintain is the step that turns the assessment from a one-off project artefact into an operating record decisions continue to reference.
Threat source taxonomy: adversarial, accidental, structural, environmental
800-30 Appendix D defines four categories of threat source. The categorisation is the methodology backbone: assessments that focus only on adversarial threats and skip the other three categories miss the failure modes that drive most observed incidents. The taxonomy is meant to be exhaustive across the four categories, with the analyst sourcing per-category characterisation evidence per assessment.
Adversarial
Individuals, groups, organisations, or states that seek to exploit organisational dependence on cyber resources. Adversarial sources include nation-state actors, organised criminal groups, hacktivists, insiders with malicious intent, terrorist groups, and individual attackers. The assessment characterises adversarial sources by capability, intent, and targeting. NIST SP 800-30 Appendix D provides a taxonomy of adversarial threat sources with example assessment scales.
Accidental
Erroneous actions taken by individuals in the course of executing their everyday responsibilities. Accidental sources include user errors, system administrator errors, software flaws introduced during development, configuration errors during operation, and misuse arising from unclear procedures. The assessment characterises accidental sources by the range of effects the errors can produce rather than by intent.
Structural
Failures of equipment, environmental controls, or software due to ageing, resource depletion, or other circumstances exceeding expected operating parameters. Structural sources include hardware failures, software defects manifesting as failures, environmental control failures (power, cooling, communications), and resource exhaustion. The assessment characterises structural sources by failure rate and the resulting consequence range.
Environmental
Natural or man-made disasters, accidents, or failures of critical infrastructure on which the organisation depends but which are outside the control of the organisation. Environmental sources include natural disasters (earthquakes, floods, hurricanes, wildfires), unusual natural events, infrastructure failures (power grid, telecommunications backbone, transportation), and hazardous material releases. The assessment characterises environmental sources by frequency in the geographic context and the consequence range.
Risk factor decomposition the methodology expects
The 800-30 risk model decomposes each per-event risk determination into the named factors below. The decomposition is what lets the decision-maker push back on specific inputs rather than on the headline number, and what lets the per-cycle refresh produce a delta on the changed factors rather than a rebuild of the whole assessment. Each factor is described in 800-30 Section 2.3 and Appendices D through I.
- Threat source: the entity or condition that initiates the threat event. Threat sources are catalogued by type (adversarial, accidental, structural, environmental) and characterised by relevant attributes (capability, intent, targeting for adversarial sources; range of effects for accidental and structural sources; consequence severity for environmental sources).
- Threat event: the activity the threat source initiates that has a potential adverse effect. Threat events are described in terms of the action taken, not in terms of the source taking it; the same threat event can be initiated by different sources, and the methodology preserves this separation so the assessment can be reused across multiple source scenarios.
- Vulnerability: a weakness in an information system, system security procedure, internal control, or implementation that could be exploited by a threat source. Vulnerabilities cover technical vulnerabilities (the kind a scanner detects), procedural vulnerabilities (the kind audits surface), and architectural vulnerabilities (the kind threat modelling surfaces). The assessment reads vulnerability against the specific threat event under analysis rather than as a general statement.
- Predisposing condition: a condition that, in combination with a vulnerability and a threat event, can elevate the likelihood of the event occurring or the magnitude of the consequence. Predisposing conditions include the absence of a control, the presence of an exception, the geographic location of the system, the dependencies on external services, and the privileged access design.
- Likelihood of occurrence: a weighted risk factor based on an analysis of the probability that a given threat event is capable of exploiting a given vulnerability or set of vulnerabilities. Likelihood is assessed at two layers: the likelihood the threat source initiates the threat event (initiation likelihood) and the likelihood the threat event results in an adverse impact given vulnerabilities and predisposing conditions (resulting-impact likelihood).
- Impact: the magnitude of harm that can be expected to result from a threat event. Impact reads against the harm to operations (mission, functions, image, reputation), the harm to assets, the harm to individuals, the harm to other organisations, and the harm to the nation. The methodology supports both qualitative impact scales (very low to very high) and quantitative impact estimation (financial loss expectancy).
- Risk: a function of likelihood of occurrence and resulting impact. The combination is the per-threat-event risk determination that feeds the risk response decision in Step 3. The 800-30 methodology does not prescribe a single combination function; the assessment plan in Step 1 names the function the assessment will use, and the same function is applied consistently across the per-event determinations.
Qualitative, semi-quantitative, and quantitative analysis
800-30 is deliberately analytical-approach-agnostic. The same risk factor decomposition supports three analytical approaches; the assessment plan in Step 1 names which approach the assessment will use. Programmes typically start with qualitative analysis and adopt semi-quantitative or quantitative approaches for the scenarios where the analytical investment is justified by the decision the assessment supports.
Qualitative analysis
Likelihood and impact expressed in non-numeric terms: very low, low, moderate, high, very high. Each level has a defined meaning the assessment plan documents (low likelihood means rare, moderate impact means significant degradation, etc.). Qualitative analysis is the lightest-weight option, scales to large scopes, and is the only practical choice when input quality does not support quantitative estimation. The risk is that qualitative outputs can hide significant variance: two risks scored high can differ by orders of magnitude in actual likelihood or impact.
Semi-quantitative analysis
Likelihood and impact expressed on numeric scales (typically 1 to 10 or 0 to 100) that preserve ordinal relationships without claiming to be true probabilities or true monetary values. Semi-quantitative outputs allow arithmetic combinations the qualitative approach does not support, and surface the variance the qualitative scales hide. The risk is that semi-quantitative scores are sometimes treated as if they were quantitative, and the precision the methodology does not actually provide gets inferred by readers.
Quantitative analysis
Likelihood expressed as a probability (or probability distribution) per time period; impact expressed in monetary or operational units. Quantitative analysis produces outputs that combine into expected loss expressions the board, the audit committee, the regulator, and the procurement function consume in their native language. FAIR and FAIR-aligned methods are the most common operationalisation of the quantitative path within 800-30. The risk is that quantitative analysis demands input quality that small programmes do not yet have, and producing quantitative output from inadequate inputs is worse than producing qualitative output from the same inputs.
CVE, CVSS, EPSS, KEV, and SSVC as 800-30 inputs
The vulnerability scoring and prioritisation signals modern programmes already use feed directly into the 800-30 factor decomposition. The discipline is to treat them as inputs to the assessment rather than as the assessment itself; the methodology adds the threat source characterisation, the predisposing conditions, the impact analysis, and the audience-specific communication that the vulnerability scores alone do not produce.
- CVSS scores feed the vulnerability factor for technical vulnerabilities the assessment reads against. The CVSS Base, Temporal, and Environmental metrics each contribute different signals: Base for the unmitigated severity, Temporal for the current exploit and remediation context, Environmental for the per-system context the assessment is bounded against.
- EPSS estimates feed the initiation likelihood factor for adversarial threat events tied to specific vulnerabilities. EPSS is not the threat event frequency; it is the probability the vulnerability is exploited within a defined time window, which is one input the analyst combines with the threat source characterisation to estimate the per-event likelihood.
- CISA KEV catalogue entries elevate the initiation likelihood factor for the specific vulnerabilities the catalogue lists. KEV is the active-exploitation signal; vulnerabilities on KEV warrant the high or very high initiation likelihood reading regardless of the EPSS estimate, because active exploitation in the wild is observed evidence rather than a probability estimate.
- SSVC decisions are not 800-30 inputs themselves; they are decisions the 800-30 assessment can feed. SSVC produces a per-vulnerability decision (Track, Track*, Attend, Act) for stakeholder-specific contexts and reads the same input set the 800-30 vulnerability factor reads against.
- Threat intelligence feeds (vendor subscriptions, ISAC sharing, regulator advisories) provide the threat source characterisation data the assessment reads against. The discipline is to source per-source data per assessment cycle rather than to carry the prior cycle characterisation forward without re-validation.
- Internal incident history provides the calibration data for the likelihood and impact estimates the assessment produces. Programmes with a documented incident record can validate per-source characterisations against observed events; programmes without an incident record carry higher uncertainty in the estimates and must reflect that uncertainty in the confidence band the analysis reports against.
800-30 next to RMF, 800-53, ISO 27001, ISO 27005, ISO 31000, FAIR, and COSO ERM
800-30 is the assessment process, not the broader risk management framework. The publication sits inside a broader risk management ecosystem with named relationships to the adjacent standards. Mature programmes typically operate several of these standards together; 800-30 is the assessment engine the rest of the ecosystem reads against.
- NIST SP 800-39 (Managing Information Security Risk) sits above 800-30 at the strategic enterprise risk management layer and defines the three-tier context 800-30 operates within.
- NIST SP 800-37 (RMF) sits below 800-30 as the operating sequence for federal systems. The 800-30 assessment feeds the RMF Categorise step (FIPS 199 categorisation), the Select step (control tailoring), the Authorise step (residual-risk determination), and the Monitor step (ongoing risk reassessment).
- NIST SP 800-53 is the control catalogue the RMF Select step picks from. The 800-30 assessment informs which baseline (low, moderate, high) the system selects and which tailoring decisions are justified by the per-system risk determinations.
- ISO 27001 clause 6.1.2 requires a documented information security risk assessment process. 800-30 satisfies the methodological requirement clause 6.1.2 reads against, and the per-assessment evidence reads cleanly into the ISO 27001 Statement of Applicability and the residual risk treatment plan.
- ISO/IEC 27005 (Information security risk management) is the ISO-side counterpart to 800-30 with a parallel process structure and a similar risk factor decomposition. Programmes that operate primarily under ISO 27001 typically reference 27005 for the process; programmes that operate under FISMA or sell to federal customers reference 800-30. The two are deliberately compatible.
- ISO 31000 is the enterprise risk management umbrella standard. 800-30 sits inside the ISO 31000 assessment sub-process (identification, analysis, evaluation), and ISO 31000 wraps 800-30 with the broader framework components (leadership, integration, design, implementation, evaluation, improvement) the methodology does not address.
- FAIR is the most common operationalisation of the quantitative path within 800-30. Federal programmes that require quantitative analysis typically reference 800-30 for the process and FAIR for the method.
- COSO ERM is the enterprise risk management framework boards and audit committees read against. 800-30 outputs feed COSO ERM Principle 11 (Assesses Severity of Risk) and Principle 14 (Develops Portfolio View).
Recurring failure modes 800-30 programmes hit
Programmes that struggle with 800-30 typically hit a small set of recurring failure modes. Naming the failure modes upfront lets the programme design the assessment operating model to avoid them rather than discovering them at the regulator examination or the AO defence.
Treating 800-30 as a one-off project. The methodology explicitly includes Maintain as Step 4 because risk assessments age. Programmes that produce the assessment as a project deliverable, file the report, and revisit it at the next audit cycle carry stale risk determinations into operating decisions. The fix is to hold the assessment as an operating record with the refresh triggers named in the plan.
Skipping Step 1 Prepare. The assessment plan defines the scope, the model, the analytical approach, the assumptions, the sources, and the constraints. Programmes that compress Prepare into a single paragraph reconstruct the missing context during Conduct, often inconsistently across analysts. The methodology defence rests on the Prepare evidence; the assessor cannot examine an assessment if the plan that produced it is missing.
Treating risk as a single score without showing the decomposition. The 800-30 methodology decomposes risk into the named factors (threat source, threat event, vulnerability, predisposing condition, likelihood, impact) for a reason: the decomposition is what lets the decision-maker push back on specific inputs rather than on the headline number. Programmes that report risk as a single score without the underlying factor decomposition lose the methodology value.
Conflating likelihood of initiation with likelihood of impact. 800-30 explicitly separates the likelihood the threat source initiates the threat event from the likelihood the event results in adverse impact given the conditions. A high-likelihood event with low-likelihood impact (because controls are effective) is different from a low-likelihood event with high-likelihood impact (because controls would fail if the event occurred). Programmes that collapse the two distinctions lose the audit trail for why a specific control investment shifts the risk.
Treating the threat source taxonomy as optional. The four-source taxonomy (adversarial, accidental, structural, environmental) is the methodology backbone. Programmes that focus only on adversarial threats and ignore accidental, structural, and environmental sources produce assessments that miss the failure modes that actually drive most observed incidents (insider errors, hardware failures, infrastructure outages). The Appendix D taxonomy is meant to be exhaustive across the four categories, not optional.
Communicating only to the system owner. Step 3 names multiple audiences (system owner, authorising official, senior leadership, regulator, board) and expects the communication to be tailored per audience. Programmes that produce one report and circulate it unchanged lose the methodology value the audience-tailored communication is meant to add. The same risk reads differently to the AO accepting it, the board carrying enterprise risk responsibility, and the regulator examining the programme.
Holding the assessment record outside the operating record. The 800-30 inputs (threat intelligence, vulnerability state, control effectiveness, predisposing conditions, incident history) come from places the security programme already produces evidence. Programmes that hold the assessment in a separate analytical environment that does not reconcile with the operating record discover at refresh time that the inputs have drifted from the source-of-truth state. The fix is to source inputs from the operating record so the per-cycle refresh is a re-read rather than a rebuild.
Inflating quantitative claims the inputs do not support. Quantitative outputs are valuable only when the inputs support them. Programmes that adopt FAIR or another quantitative method, then feed it with point-estimate guesses dressed as distributions, produce numbers that collapse under audit. The fix is calibrated estimation training for the analysts and an explicit confidence-band convention the output reports against, not a more sophisticated combination engine.
Evidence the methodology expects to see
A defensible 800-30 programme produces a stable evidence set per assessment cycle. The same set reads cleanly under NIST SP 800-37 (RMF), NIST SP 800-53, ISO 27001 clause 6.1.2, ISO 27005, ISO 31000, COSO ERM, FedRAMP, CMMC, SOC 2, PCI DSS, and the regulator-side examinations that consume risk assessment evidence as part of the broader programme review.
- Risk assessment plan per Step 1: purpose, scope, assumptions and constraints, sources of information, risk model, analytical approach, and the decisions the assessment is meant to inform
- Risk assessment results per Step 2 with the per-threat-event record: the threat source, the threat event description, the vulnerabilities and predisposing conditions, the initiation likelihood, the resulting-impact likelihood, the impact magnitude, and the determined risk level
- Threat source catalogue per assessment with the per-source characterisation: capability, intent, and targeting for adversarial sources; range of effects for accidental and structural sources; consequence severity for environmental sources; per-source confidence in the characterisation
- Vulnerability catalogue per assessment with the per-vulnerability record: technical vulnerabilities sourced from scanner output, procedural vulnerabilities sourced from audit findings, architectural vulnerabilities sourced from threat modelling, per-vulnerability validation evidence
- Predisposing conditions record per assessment with the per-condition rationale, the per-condition impact on likelihood and impact estimates, and the linkage to the operating evidence (exception register entries, control deviation records, geographic context, external service dependencies)
- Communication record per Step 3: the audience-specific outputs, the interrogation evidence (questions raised by decision-makers, analyst responses, input revisions arising from the exchange), and the per-audience decision record arising from the communication
- Maintenance record per Step 4: the per-cycle refresh triggers met, the input deltas applied, the analyst sign-off per refresh, the impact on the prior risk determinations, and the communication to the decision-makers who relied on the prior assessment
- Analyst sign-off record per assessment with the analyst identity, the training and calibration evidence, the input rationale per leaf factor, the confidence band per estimate, and the reviewer counter-signature
- Decision record per assessment: which decisions the assessment informed, the disposition per decision (acceptance, avoidance, mitigation, sharing, transfer), the per-decision rationale, the per-disposition implementation reference, and the per-decision review cadence
- Cross-framework reference per assessment: the ISO 31000 process step the assessment maps to, the NIST SP 800-37 RMF step it feeds (Categorise, Select, Authorise, Monitor), the NIST CSF 2.0 outcome category it supports, the ISO 27001 clause 6.1.2 evidence it produces, the COSO ERM principle it informs, and the regulatory read it supports
How 800-30 reads across enterprise security functions
800-30 is a cross-functional methodology. The same assessment record reads differently depending on the function that holds the work. Programmes that run 800-30 as a GRC exercise alone lose the engineering depth the inputs require; programmes that run it as an engineering exercise alone lose the governance depth the audience-tailored communication is meant to add. The named functions below own different parts of the same assessment record.
GRC and compliance teams
Run 800-30 as the federal-grade vocabulary that pairs with the ISO 27001 clause 6.1.2 risk assessment evidence and the ISO 27005 process detail. Hold the per-assessment plan, the per-event results, the audience-tailored communication, and the maintenance record on the workspace so the GRC programme produces one defensible record set the ISO 27001 audit, the SOC 2 examination, and the parallel regulator reads all consume from. Carry the cross-framework reference per assessment so the 800-30 determinations feed the rest of the framework portfolio without a parallel reconciliation exercise.
CISOs and security leaders
Read 800-30 as the methodology the federal-side procurement reviews, the regulator examinations, and the enterprise risk committee read against. Track the per-assessment refresh cadence, the per-assessment decision register, the audit committee briefing record, and the residual-risk acceptance evidence per system. The defensible CISO position is that every operating decision carrying material risk has a 800-30-aligned assessment behind it, the assessment is current per the refresh trigger schedule, and the decision record reads against the same operating record the rest of the programme produces.
Vulnerability management teams
Supply the vulnerability catalogue, the predisposing conditions sourced from exception register entries, the patch state per asset, the per-finding remediation SLA adherence, and the per-asset criticality scoring into the inputs Step 2 reads against. The signal 800-30 reads against is the operating record, not the snapshot the analyst pulls during the assessment week. Programmes that run vulnerability management on the same workspace the 800-30 assessment reads from produce assessments that refresh per cycle rather than per audit.
AppSec and product security teams
Carry the code-scanning state, the dependency vulnerability state, the secure-coding adherence record, the threat modelling output, and the SDLC predisposing conditions into the vulnerability and predisposing conditions records for application-system assessments. The 800-30 assessment for an application reads against the development-side evidence as the primary input source, not as a footnote; programmes that supply per-repo finding state, per-build dependency state, and per-release retest evidence produce assessments the AO can defend against the live engineering posture.
Security engineering and security architects
Own the predisposing conditions record across architecture decisions, trust boundaries, dependency design, and the operating environment context the assessment reads against. The architecture decisions the engineering team makes show up in the 800-30 assessment as predisposing conditions; programmes that hold the architecture evidence on the workspace let the assessment update automatically when the architecture changes, rather than waiting for the next audit cycle to surface the drift.
Federal programmes (FISMA, FedRAMP, CMMC)
Operate 800-30 as the assessment process that feeds the NIST SP 800-37 RMF Categorise step, the Select step, the Authorise step, and the Monitor step. The per-system 800-30 assessment produces the input set the SSP categorisation reads against, the input set the 800-53 baseline tailoring reads against, the residual-risk determination the AO signs against, and the continuous monitoring evidence the next reauthorisation reads against. Federal programmes treat 800-30 as the methodology default; the audit defence rests on the 800-30 alignment evidence.
Enterprise risk management teams
Bring the 800-30 outputs into the enterprise risk portfolio so cyber risk sits next to operational risk, financial risk, strategic risk, and compliance risk on a comparable expression layer. The portfolio view COSO ERM Component 3 expects reads cleanly against the 800-30 quantitative outputs when the inputs support the quantitative path; the qualitative outputs feed the portfolio view through the cross-framework reference per assessment.
Running 800-30 on SecPortal
SecPortal is built around the operating record an 800-30 assessment programme reads against: the engagement carries the per-assessment lifecycle from Prepare through Maintain, the findings record carries the vulnerability state feeding the assessment inputs, the documents area carries the assessment plan and the per-cycle artefact set, and the activity log carries the assessment audit trail. The platform alignment below maps the verified product capabilities to the 800-30 process so the methodology is held on one operating record rather than across a separate analytical environment that drifts from the live posture.
- Engagement management as the workspace anchor for the assessment lifecycle, with the per-assessment Prepare plan, the Conduct execution record, the Communicate audience pack, and the Maintain refresh cadence tracked as a single engagement rather than as four parallel projects that drift apart
- Findings management with CVSS 3.1 calibration so the vulnerability inputs the 800-30 assessment reads against carry the same severity vocabulary the scanner intake, the manual finding triage, the exception register, and the remediation SLA record use
- Compliance tracking across NIST SP 800-37 (RMF), NIST SP 800-53, NIST SP 800-171, NIST CSF 2.0, FedRAMP, CMMC, ISO 27001, SOC 2, PCI DSS, and the additional framework catalogues so the 800-30 risk determinations feed the parallel framework reads without rebuilding the underlying input set
- Authenticated scanning and external scanning so the vulnerability catalogue Step 2 reads against carries live posture evidence on the assessed scope rather than a snapshot from the assessment week, with the per-asset coverage record archived per refresh
- Code scanning via Semgrep against connected repositories so the AppSec input feeding the vulnerability and predisposing conditions records for application-system assessments reads against the live code state rather than against a prior commit
- Repository connections via GitHub, GitLab, and Bitbucket OAuth so the architectural vulnerability inputs and the supply-chain predisposing conditions read against the same source-control evidence the SDLC programme already produces
- Document management for the assessment plan, the threat source catalogue, the vulnerability catalogue, the predisposing conditions record, the per-assessment results, the audience-specific communication outputs, and the maintenance record so the 800-30 evidence package lives on the operating record rather than across a folder hierarchy that drifts from the assessment reality
- Activity log with CSV export so every change to an assessment scope, an input source, an analyst sign-off, a determined risk level, a disposition, or a refresh trigger is reproducible from one source, which is the assessment audit trail the methodology defence reads against
- Multi-factor authentication for workspace access so the analyst sign-off, the reviewer counter-signature, and the disposition approval the maintenance record reads against carry the authentication evidence the audit committee expects
- Team management with RBAC so the analyst role, the reviewer role, the approver role, and the decision-maker role the assessment plan names are enforced at the workspace layer rather than at the per-document level
- AI report generation that turns the per-assessment record into the audience-specific outputs the Communicate step expects: the technical assessment narrative for the system owner, the residual-risk summary for the authorising official, the enterprise-risk reading for senior leadership, the regulator-facing summary, and the board-level briefing pack
- Retesting workflows paired to the mitigation commitments arising from the assessment so the closure evidence the next maintenance cycle reads against carries the verify-after-fix record rather than a status statement that has drifted from the operating reality
What SecPortal does not do
SecPortal is the operating record an 800-30 assessment programme is held on, not the analytical engine that produces quantitative outputs. The workspace does not run a built-in Monte Carlo simulation engine, does not maintain a built-in threat intelligence catalogue, does not federate with asset inventory or CMDB systems, does not provide an automated risk register editor with quantitative combination logic, does not consume real-time CISA KEV or FIRST EPSS feeds through a packaged API, does not auto-route exception approvals through a workflow engine, and does not integrate with GRC platforms (Archer, ServiceNow GRC, Onspring), ticketing systems (Jira, ServiceNow ITSM), or SIEM and SOAR platforms. The discipline SecPortal supports is holding the assessment plan, the per-event results, the audience-specific communication outputs, and the maintenance record as workspace evidence the methodology defence reads against; the analytical engine, the external intelligence feeds, and the GRC tool integrations belong to other systems the programme operates alongside SecPortal.
Related reading on SecPortal
- NIST SP 800-37 (RMF) is the operating sequence 800-30 assessments feed into through the Categorise, Select, Authorise, and Monitor steps.
- NIST SP 800-53 is the control catalogue the RMF Select step picks from, with the baseline informed by the 800-30 risk determinations.
- ISO 31000 is the enterprise risk management umbrella 800-30 operates inside as the assessment sub-process.
- ISO/IEC 27005 is the ISO-side counterpart with deliberately compatible process structure that ISO 27001-aligned programmes reference instead of 800-30 for clause 6.1 evidence.
- ISO 27001 clause 6.1.2 reads against 800-30-aligned assessments as the methodological satisfaction of the risk assessment process requirement.
- FAIR (Factor Analysis of Information Risk) is the most common operationalisation of the quantitative path within 800-30.
- COSO ERM consumes 800-30 outputs into the enterprise risk portfolio Principles 11 and 14 read against.
- FedRAMP operates 800-30-aligned assessments as part of the authorisation package every cloud service provider produces.
- CMMC reads 800-30-aligned assessment evidence as part of the contractor maturity examination at the higher CMMC levels.
- NIST AI Risk Management Framework extends the assessment process to AI components with the MEASURE function reading against the 800-30-style analytical approach catalogue.
- Cybersecurity risk assessment guide covers the wider risk assessment landscape, the methodology comparison, and the operating model that survives the second cycle.
- Cyber risk quantification guide covers the quantitative path within 800-30 and the FAIR adoption model that produces the board-readable financial output.
- Risk assessment operating model covers the per-cycle refresh cadence, the audience-tailored communication, and the maintenance record the methodology expects.
- Security leadership reporting workflow carries the audience-tailored communication outputs Step 3 produces for the executive, board, and audit committee audiences.
- Vulnerability acceptance and exception management carries the disposition record the assessment results feed into when the decision is to accept rather than mitigate.
- Control mapping cross-framework crosswalks carries the per-assessment cross-framework reference that lets 800-30 outputs feed parallel framework reads without rebuilding the underlying input set.
- Audit fieldwork evidence request fulfillment carries the assessor read against the per-assessment artefact set during ISO 27001, SOC 2, FedRAMP, CMMC, and PCI DSS examinations.
- Asset criticality scoring carries the per-asset criticality input feeding the impact factor 800-30 assessments read against.
- Threat-intelligence-driven prioritisation carries the threat source characterisation input feeding the initiation likelihood factor 800-30 assessments read against.
- SecPortal for CISOs covers the executive workspace that holds the 800-30 assessment programme alongside the operating record the assessments read against.
- SecPortal for GRC and compliance teams covers the GRC workspace that holds the cross-framework reconciliation 800-30 outputs consume into.
Key control areas
SecPortal helps you track and manage compliance across these domains.
Step 1: Prepare for the assessment
Identify the purpose, the scope, the assumptions and constraints, the sources of information, the risk model, and the analytical approach. The Prepare step produces the assessment plan the rest of the process reads against. The plan names the decisions the assessment is meant to inform, the time horizon, the level of detail, the analytical approach the assessment will use (qualitative, semi-quantitative, quantitative), and the input sources the analyst will draw from. Programmes that compress Prepare into a project plan line reconstruct it during Conduct when the missing context becomes blocking and inconsistent across analysts.
Step 2: Conduct the assessment
Execute the analytical work. Identify threat sources from the four-category taxonomy (adversarial, accidental, structural, environmental). Identify the threat events the sources can initiate. Identify the vulnerabilities and predisposing conditions that allow the events. Determine the likelihood the events occur given the conditions. Determine the impact if they occur. Determine the resulting risk as a combination of likelihood and impact. The Conduct step produces the per-event risk record: the threat source, the event description, the vulnerabilities and predisposing conditions, the likelihood (initiation and resulting-impact), the impact magnitude, and the determined risk level.
Step 3: Communicate assessment results
Communicate the results to decision-makers in a form they can act on. The communication is tailored per audience: the system owner reads the technical detail, the Authorising Official reads the residual-risk summary, senior leadership reads the enterprise-risk implications, the regulator reads the methodology defence, the board reads the strategic implication. Communicate is a structured exchange the methodology defines, not a one-off briefing; the assessment record carries the interrogation evidence and the per-audience decision arising from the exchange.
Step 4: Maintain the assessment
Monitor risk factors on an ongoing basis and update the assessment when the factors change. Update triggers include system architecture changes, new threat actors or capabilities, new vulnerabilities, control effectiveness changes, exception register additions or expirations, incident observations, and the periodic refresh cadence. The Maintain step produces the refresh record: the input deltas since the prior cycle, the analyst sign-off per refresh, the impact on the prior determinations, and the communication to the decision-makers who relied on the prior assessment.
Threat source taxonomy: the methodology backbone
800-30 Appendix D defines four categories of threat source: adversarial (individuals, groups, organisations, or states that seek to exploit organisational dependence on cyber resources), accidental (erroneous actions taken in the course of everyday work), structural (failures of equipment, environmental controls, or software due to ageing or resource depletion), environmental (natural or man-made disasters and infrastructure failures). The taxonomy is meant to be exhaustive; assessments that focus only on adversarial threats miss the failure modes that drive most observed incidents.
Risk factor decomposition
The 800-30 risk model decomposes each per-event determination into named factors: threat source (the entity or condition initiating the event), threat event (the activity initiated), vulnerability (the weakness the event exploits), predisposing condition (the contributing context), likelihood of occurrence (with the explicit separation between initiation likelihood and resulting-impact likelihood), and impact magnitude. The decomposition lets the decision-maker push back on specific inputs rather than on the headline number, and lets the per-cycle refresh produce a delta on the changed factors rather than a rebuild.
Qualitative, semi-quantitative, and quantitative analysis
800-30 is deliberately analytical-approach-agnostic. Qualitative analysis uses non-numeric scales (very low to very high) and scales to large scopes when input quality is limited. Semi-quantitative analysis uses numeric scales (typically 1 to 10) that preserve ordinal relationships without claiming true probability or monetary expression. Quantitative analysis expresses likelihood as probability and impact in monetary or operational units; FAIR is the most common operationalisation of the quantitative path. The assessment plan in Step 1 names which approach the assessment will use, and the methodology defence reads the alignment between the inputs available and the approach chosen.
Three-tier risk management context
800-30 operates inside the multi-tier risk management context NIST SP 800-39 describes. Tier 1 (organisation level) carries enterprise risk strategy, mission prioritisation, common control selection, and risk tolerance decisions. Tier 2 (mission and business process level) carries enterprise architecture and the per-process risk reads. Tier 3 (information system level) carries the per-system assessments most security teams encounter first. 800-30 uses the same four-step process at all three tiers but produces different outputs per tier.
800-30 next to 800-39, 800-37, and 800-53
NIST SP 800-39 sits above 800-30 at the strategic enterprise risk management layer. NIST SP 800-37 (RMF) sits below 800-30 as the operating sequence for federal systems; the 800-30 assessment feeds the RMF Categorise step (FIPS 199 categorisation), the Select step (baseline tailoring), the Authorise step (residual-risk determination), and the Monitor step (ongoing reassessment). NIST SP 800-53 is the control catalogue the RMF Select step picks from. The four publications operate as one ecosystem; federal programmes that adopt RMF without aligning to 800-30 carry assessment evidence that does not satisfy the Authorise step defence.
800-30 next to ISO 27001, ISO 27005, and ISO 31000
ISO 27001 clause 6.1.2 requires a documented risk assessment process; 800-30 satisfies the methodological requirement and produces evidence that reads cleanly into the Statement of Applicability and the risk treatment plan. ISO/IEC 27005 is the ISO-side counterpart to 800-30 with a parallel four-step process and similar risk factor decomposition; programmes operating under ISO 27001 typically reference 27005, programmes operating under FISMA reference 800-30, and the two are deliberately compatible. ISO 31000 is the enterprise risk management umbrella; 800-30 operates inside the ISO 31000 assessment sub-process and ISO 31000 wraps it with the broader framework components (leadership, integration, design, implementation, evaluation, improvement).
800-30 next to FAIR and COSO ERM
FAIR (Factor Analysis of Information Risk) is the most common operationalisation of the quantitative path within 800-30. Federal programmes requiring quantitative analysis reference 800-30 for the process and FAIR for the method; the FAIR ontology fits underneath the 800-30 risk factor decomposition with FAIR providing the analytical engine. COSO ERM is the enterprise risk management framework boards and audit committees read against; 800-30 outputs feed COSO ERM Principle 11 (Assesses Severity of Risk) and Principle 14 (Develops Portfolio View) as the cyber-risk inputs to the enterprise portfolio view.
Audit evidence the methodology expects
A defensible 800-30 programme produces a stable evidence set per assessment cycle: the assessment plan per Step 1 with purpose, scope, assumptions, sources, risk model, and analytical approach; the per-event risk records per Step 2; the threat source catalogue with per-source characterisation; the vulnerability catalogue with per-finding validation evidence; the predisposing conditions record sourced from the exception register, the control deviation record, and the operating context; the communication record per Step 3 with the audience-tailored outputs and the interrogation evidence; the maintenance record per Step 4 with the per-cycle refresh triggers, the input deltas, the analyst sign-off, and the decision-maker communication. The same evidence set reads cleanly under RMF, 800-53, ISO 27001 clause 6.1.2, ISO 27005, ISO 31000, COSO ERM, FedRAMP, CMMC, SOC 2, and PCI DSS.
Related features
Orchestrate every security engagement from start to finish
Vulnerability management software that tracks every finding
Compliance tracking without a full GRC platform
Test web apps behind the login
Vulnerability scanning tools that map your attack surface
Find vulnerabilities before they ship
Document management for every security engagement
Every action recorded across the workspace
AI-powered reports in seconds, not days
Collaborate across your entire team
Multi-factor authentication on every workspace
Verify fixes and track reopens on the same finding record
Run a defensible 800-30 programme on one operating record
Hold the assessment plan, the per-event risk records, the threat source catalogue, the vulnerability and predisposing conditions inputs, the audience-tailored communication, and the maintenance record on one workspace so the 800-30 evidence reads cleanly under RMF, ISO 27001, FedRAMP, CMMC, and the parallel framework reads without rebuilding the underlying input set. Start free.
No credit card required. Free plan available forever.