Overview
The/arckit.risk command creates a comprehensive risk register following the HM Treasury Orange Book 2023 risk management framework.
When to Use
- Phase: Phase 3 - Risk Assessment
- Timing: AFTER stakeholders, BEFORE business case
- Purpose: Identify, assess, and manage project risks using Orange Book methodology
Command Usage
Examples
Orange Book Framework
The Orange Book is HM Treasury’s guidance on risk management in government. The 2023 update provides:- 5 Risk Management Principles: Governance, Integration, Collaboration, Risk Processes, Continual Improvement
- Risk Control Framework: 4-pillar “house” structure
- 4Ts Risk Response: Tolerate, Treat, Transfer, Terminate
- Risk Assessment: Likelihood × Impact for Inherent and Residual risk
- Risk Appetite: Amount of risk organization is prepared to accept
Risk Categories
Risks identified across 6 Orange Book categories:STRATEGIC Risks
- Risks to strategic objectives and organizational goals
- Competitive position, market changes, policy changes
- Stakeholder drivers under threat
OPERATIONAL Risks
- Risks to operations, service delivery, business continuity
- Resource availability, skills gaps, dependencies
- Process failures, quality issues
FINANCIAL Risks
- Budget overruns, funding shortfalls, ROI not achieved
- Cost escalation, currency fluctuations
- Economic downturn impact
COMPLIANCE/REGULATORY Risks
- Non-compliance with laws, regulations, policies
- Audit findings, regulatory penalties
- Data protection (GDPR, DPA 2018), procurement rules
REPUTATIONAL Risks
- Damage to reputation, stakeholder confidence, public perception
- Media scrutiny, parliamentary questions (UK Gov)
- Service failures visible to public
TECHNOLOGY Risks
- Technical failure, cyber security, legacy system issues
- Vendor lock-in, technology obsolescence
- Integration challenges, scalability limitations
Risk Assessment Methodology
Inherent Risk (BEFORE Controls)
Inherent Likelihood (1-5 scale):- 1 - Rare: < 5% probability, highly unlikely
- 2 - Unlikely: 5-25% probability, could happen but probably won’t
- 3 - Possible: 25-50% probability, reasonable chance
- 4 - Likely: 50-75% probability, more likely to happen than not
- 5 - Almost Certain: > 75% probability, expected to occur
- 1 - Negligible: Minimal impact, easily absorbed, < 5% variance
- 2 - Minor: Minor impact, manageable within reserves, 5-10% variance
- 3 - Moderate: Significant impact, requires management effort, 10-20% variance
- 4 - Major: Severe impact, threatens objectives, 20-40% variance
- 5 - Catastrophic: Existential threat, project failure, > 40% variance
- 1-5: Low (Green)
- 6-12: Medium (Yellow)
- 13-19: High (Orange)
- 20-25: Critical (Red)
Current Controls
- Existing Controls: What controls are already in place?
- Control Effectiveness: Weak | Adequate | Strong
- Control Owners: Who maintains these controls?
- Evidence of Effectiveness: How do we know controls work?
Residual Risk (AFTER Controls)
Residual Likelihood (1-5): Likelihood after controls appliedResidual Impact (1-5): Impact after controls applied
Residual Risk Score: Likelihood × Impact (after controls)
4Ts Risk Response Framework
Select ONE primary response for each risk:TOLERATE
When to use: Low residual risk score (1-5), within appetiteExample: “Minor UI inconsistency - aesthetic only, no functional impact”
Accept the risk because cost of mitigation exceeds benefit
TREAT
When to use: Medium/High risk, can be reduced through actionsExample: “Implement automated testing to reduce defect risk”
Mitigate or reduce the risk through additional controls
TRANSFER
When to use: Low likelihood/high impact, can be insured or contracted outExample: “Purchase cyber insurance for breach liability”
Transfer risk to 3rd party through insurance, outsourcing, or contracts
TERMINATE
When to use: High likelihood/high impact, exceeds appetite, cannot be mitigatedExample: “Cancel high-risk vendor contract, source alternative”
Stop the activity creating the risk
What It Creates
A. Executive Summary
- Total risks identified (by category)
- Risk profile distribution (Critical/High/Medium/Low)
- Risks exceeding organizational appetite
- Overall risk profile: Acceptable | Concerning | Unacceptable
- Key risks requiring immediate attention (top 3-5)
- Recommended actions and decisions needed
B. Risk Matrices (Inherent & Residual)
Two 5×5 matrices showing Likelihood (rows) × Impact (columns): Inherent Risk Matrix (before controls):C. Top 10 Risks (by residual score)
Ranked table with:- Rank | ID | Title | Category | Residual Score | Owner | Status | Response
D. Detailed Risk Register
For each risk (R-001, R-002, etc.): Risk Identification:- Risk ID, Category, Title
- Risk Description (2-3 sentences)
- Root Cause
- Trigger Events
- Consequences if Realized
- Affected Stakeholders (linked to STKE)
- Related Objectives
- Inherent L/I/Score
- Current Controls & Effectiveness
- Residual L/I/Score
- 4Ts Response (Tolerate/Treat/Transfer/Terminate)
- Risk Owner (from RACI matrix)
- Action Owner
- Escalation Path
- Additional Mitigations Needed
- Specific Actions with owners
- Target Date
- Target Residual Risk
- Success Criteria
- Open | In Progress | Monitoring | Closed | Accepted
E. Risk by Category Analysis
For each category:- Number of risks
- Average inherent score
- Average residual score
- Effectiveness of controls (% reduction)
- Key themes
F. Risk Ownership Matrix
Which stakeholder owns which risks (from RACI):| Stakeholder | Owned Risks | Critical/High Risks | Notes |
|---|---|---|---|
| CFO | R-003, R-007, R-012 | 1 Critical, 2 High | Heavy concentration of financial risks |
| CTO | R-001, R-004, R-009 | 2 Critical | Technology risk owner |
G. 4Ts Response Summary
| Response | Count | % | Key Examples |
|---|---|---|---|
| Tolerate | 5 risks | 25% | R-006, R-010… |
| Treat | 12 risks | 60% | R-001, R-002… |
| Transfer | 2 risks | 10% | R-005 (insurance) |
| Terminate | 1 risk | 5% | R-008 (cancel activity) |
H. Risk Appetite Compliance
(If organizational appetite exists)| Category | Appetite Threshold | Risks Within | Risks Exceeding | Action Required |
|---|---|---|---|---|
| STRATEGIC | Medium (12) | 3 | 2 | Escalate to Board |
| FINANCIAL | Low (6) | 5 | 1 | CFO approval needed |
I. Action Plan
Prioritized list of risk mitigation actions:| Priority | Action | Risk(s) Addressed | Owner | Due Date | Status |
|---|---|---|---|---|---|
| 1 | Implement automated backups | R-001 (Critical) | CTO | 2025-11-15 | In Progress |
| 2 | Obtain cyber insurance | R-005 (High) | CFO | 2025-12-01 | Not Started |
J. Monitoring and Review Framework
- Review Frequency: Monthly for Critical/High risks, Quarterly for Medium/Low
- Escalation Criteria: Any risk increasing by 5+ points, any new Critical risk
- Reporting Requirements:
- Weekly: Critical risks to Steering Committee
- Monthly: All risks to Project Board
- Quarterly: Risk appetite compliance to Audit Committee
- Next Review Date: [Date]
- Risk Register Owner: [Name from stakeholder RACI]
K. Integration with SOBC
Note which sections of SOBC use this risk register:- Strategic Case: Strategic risks inform “Why Now?” and urgency
- Economic Case: Risk-adjusted costs use financial risks + optimism bias
- Management Case Part E: Full risk register feeds into risk management section
- Recommendation: High risks may influence option selection
Traceability to Stakeholders
Every risk must link back to stakeholder analysis:UK Government Specific Risks
For UK Government/public sector projects: STRATEGIC:- Policy/ministerial direction change mid-project
- Manifesto commitment not delivered
- Machinery of government changes
- Spending controls (HMT approval delays)
- NAO audit findings
- PAC scrutiny and recommendations
- FOI requests reveal sensitive information
- Judicial review of procurement
- Parliamentary questions and media scrutiny
- Citizen complaints and service failures
- Social media backlash
- Select Committee inquiry
- GDS Service Assessment failure
- CDDO digital spend control rejection
- Civil service headcount restrictions
- Security clearance delays
Output File
Creates:projects/{project}/ARC-{PROJECT_ID}-RISK-v1.0.md
Prerequisites
MANDATORY (command will warn if missing):- STKE (Stakeholder Analysis) - Every risk MUST have owner from RACI matrix
- DO NOT proceed with risk register
- Tell user: “Risk register requires stakeholder analysis to identify risk owners and affected parties. Please run
/arckit.stakeholdersfirst.”
- PRIN (Architecture Principles) - Non-compliance creates risks
projects/000-global/risk-appetite.md- Risk appetite thresholds- REQ (Requirements) - Complex requirements create risks, NFRs mitigate risks
Quality Checks
Ensures Orange Book compliance:- ✅ Governance and Leadership: Risk owners assigned from senior stakeholders
- ✅ Integration: Risks linked to objectives, stakeholders, and business case
- ✅ Collaboration: Risks sourced from stakeholder concerns and expert judgment
- ✅ Risk Processes: Systematic identification, assessment, response, monitoring
- ✅ Continual Improvement: Review framework and action plan for ongoing management
Common Risk Patterns
Pattern 1: Technology Modernization
- TECHNOLOGY: Legacy system failure during migration (High)
- OPERATIONAL: Skills gap in new technology (Medium)
- FINANCIAL: Cloud costs exceed estimates (Medium)
- REPUTATIONAL: Service outage during cutover (High)
Pattern 2: New Digital Service
- STRATEGIC: User adoption below target (High)
- TECHNOLOGY: Scalability limitations at peak (High)
- COMPLIANCE: GDPR/Accessibility non-compliance (Critical)
- OPERATIONAL: Support team not ready for go-live (Medium)
Pattern 3: Vendor Procurement
- FINANCIAL: Vendor pricing increases post-contract (Medium)
- OPERATIONAL: Vendor delivery delays (Medium)
- TECHNOLOGY: Vendor lock-in limits future options (High)
- REPUTATIONAL: Vendor security breach affects reputation (High)
Next Steps
After creating risk register:- Review with risk owners to validate assessment
- Escalate critical/high risks to Steering Committee
- Run
/arckit.sobcand use risk register for Management Case Part E - Implement priority actions from Action Plan
- Schedule monthly risk review meeting
Related Commands
Stakeholders
MANDATORY prerequisite for risk owners
Business Case
SOBC uses risk register in Management Case
Requirements
Risk-driven requirements and mitigations
Secure by Design
Validate security controls against risks
Example Outputs
NHS Appointment Booking (v7)
NHS Appointment Booking (v7)
Cabinet Office GenAI (v9)
Cabinet Office GenAI (v9)