ISO 31010 is a supplementary document to the risk management standard ISO 31000. It was developed to support the risk assessment process in ISO 31000, outlining different risk assessment techniques to broaden the scope of an organization’s risk evaluation methods.
This post offers a comprehensive overview of ISO/IEC 31010, highlighting the standard’s potential to increase the effectiveness of risk management strategies.
Learn how UpGuard streamlines Vendor Risk Management >
ISO 31010 is an international standard for risk assessment techniques. It’s a supporting standard for ISO 31000, developed to help organizations improve the quality of risk management processes when implementing ISO 31000.
Read this post for an overview of ISO 31000 >
ISO 31010 keeps with the customization objectives of ISO 31000, making it applicable to most risk management contexts.
The risk assessment methodologies outlined in ISO 31010 are intended to support decision-making during times of uncertainty when managing risk, such as risk information collected from unreliable sources.
To provide as much value as possible as an ISO 31000 supportive resource, ISO 31010 outlines an implementation guide for incorporating its assessment techniques within the ISO 31000 risk management framework. This implementation guide outlines the pros and cons of each proposed technique to help stakeholders choose the best option for their requirements.
ISO 31010 techniques could be used in risk management processes or as a tool for comparing the efficacy of different risk management options.
ISO 31010’s implementation guide consists of 5 parts:
The techniques presented in ISO 31010 aren’t just applicable in the risk assessment component of ISO 31000. They can support all of the components of the risk management process of ISO 31000.
The graphic below indicates which ISO 31010 techniques are applicable at each process stage of ISO 31000. The list of techniques corresponding to each number is outlined in the subsequent section of this post.

These techniques map to a specific component of the risk management framework process outlined in ISO 31000 (see graphic above), with the majority concentrated in the risk assessment component. These techniques are defined in Annex A and Annex B of ISO 31010, with the majority focusing on the risk assessment component of the process
Because brainstorming doesn’t require reference to the risk register, mitigation, or failure mode databases, it’s a valuable technique when decision-makers identify risks associated with new technologies before any high-risk data is considered.
Brainstorming is most effective for generating ideas. It’s most effective when followed by other insight-gathering techniques.
The Delphi technique involves collaborating with a panel of experts to gather their opinions of risk insights, such as the probability of particular risks occurring, the criticality of specific risks, risk treatment, likely lifecycles of different types of risks, etc.
The process involves providing each expert with questions answered in multiple rounds. SMEs are not in the same room during this process. They receive their questions online and answer them anonymously, preventing other opinions from influencing responses in progress.
After each round, a facilitator summarizes the responses and shares them with the group for collaborative feedback. Each expert then receives input about their suggestions from other panel members and is given an opportunity to refine their response based on feedback. The process continues until a consensus of views is reached.
As indicated in the graphic above, the Delphi Technique can be applied in most of the process lifecycles of ISO 31000 when estimating the probability of events and the effects of uncertainty. This technique is especially useful when expert judgment is required for complex scenarios.
The Delphi Technique is beneficial for systematically gathering expert opinions.
The Nominal Group Technique aims to achieve a consensus about a problem by considering diverse opinions. It’s similar to brainstorming, but each person's opinions are collected privately rather than in a group setting.
Each idea is then shared with the group, which votes on the ones they like best. Ideas can be discussed for further clarification, but they’re not debated or discredited.
The Nominal Group Technique is an excellent choice for involving quieter group members in decision-making.
There are two methods to the interview technique - structured and semi-structured. With the structured approach, questions have a predetermined order to ensure consistency across all interviews. With the semi-structured approach, after completing a set of core questions, the interviewee is asked a set of follow-up questions based on their responses.
Inteviews are very useful for gathering detailed information about context-specific risks.
A very popular data collection method. Surveys based around specific risk management initiatives are sent to SMEs. Surveys can also provide helpful expert insights on ideal risk analysis methods and a general understanding of the risks being queried.
Surveys are very effective at collecting large amounts of contextualized risk assessment method information from a large audience.
Checklists offer a structured approach to risk identification by outlining a list of uncertainties that need to be addressed during a risk audit. Checklists provide the groundwork for more complex risk analysis, such as scenario analysis, hazard analysis, and root cause analysis.
By providing foundational risk index data, checklist outputs offer the initial supportive steps toward alignment against the risk identification standards of ISO 9001 Clause 6.1.
Checklists should be based on SME expertise and model information that supports the identification of risks and controls.
Learn how to create a vendor risk assessment matrix >
FMEA (Failure Modes and Effects Analysis) and its variant FMECA (Failure Modes, Effects, and Criticality Analysis) are systematic methods for identifying potential failure modes within processes.
These methodologies aim to offer insights about how a particular process could fail and the impacts of this failure. Based on these insights, critical failure modes can be prioritized in mitigation measures.
There are four primary components of failure mode analysis methodology:
Failure mode analysis can be applied across organization domains to improve process reliability and safety.
Hazard and Operability Studies offer a systematic approach to identifying risks and operational issues against risk criteria.
Though HAZOP is a systematic approach to identifying hazard and operability issues, it can be resource-intensive and require expertise to execute well.
A range of techniques for determining plausible outcomes through predictive models. Scenario analysis involves exploring the associated risks associated with potential scenario outcomes.
Scenario analysis is a structured approach to exploring risks associated with future outcomes.
SWIFT is a high-level risk identification method employing structured brainstorming (see technique 1.1). This technique combines predetermined guide words (such as timing and amount) with phrases such as “what if?” and “how could” to identify risks at a system or subsystem level.
SWIFT could be used in conjunction with bottom-up methods, like FMEA and HAZOP.
The Cindynic Approach (translated as the science of danger) explores divergent opinions between stakeholders (dissonances) and identifies ambiguities between risk sources and drivers (deficits).
Ishikawa (fishbone) analysis is a team effort of understanding possible causes of desirable and undesirable events. These events are represented in a fishbone-like diagram, where potential factors are organized into broad categories of causes - human, technical, organizational, etc.
Root cause analysis (RCA) aims to identify the cause of risks stemming from several potential sources, including design process techniques and organizational characteristics, human error, and external events from third-party vendors.
A risk matrix could assist in validating potential causes mapping from third-party vendors.

A graphical representation of events causes mapping to their respective consequences. Sometimes regarded as a simplified fault tree, a bow tie diagram indicates the controls that impact the likelihood and consequences of events
Watch this video for an overview of a bow tie analysis.
HACCP is useful for ensuring detected risks are addressed with monitoring controls throughout the duration of a process rather than after it’s finished.
Attack surface management could support HACCP efforts as this discipline continuously monitors for real-time security posture disruptions caused by emerging security risks.
Learn how to choose attack surface visibility software >
Watch this video for an overview of UpGuard’s attack surface management features.
LOPA evaluates the impact of security controls on reducing overall risk levels. A security rating solution could be helpful in such an analysis as it quantifies security posture impacts mapping from security risks and remediation efforts.

Learn more about UpGuard’s security ratings >
These techniques uncover deep insights into the impact risks by considering the context of each risk scenario.
The appendix of techniques in this category includes:
These techniques uncover the relationships between events, risks, and their respective controls through mapping methods.
The list of techniques in this category includes:
These techniques measure the broader impact of risk across different systems.
The list of techniques in this category includes:
After the impact of risk has been measured, these techniques help determine how each risk should be managed depending on its severity. These techniques need to be applied through the lens of your defined risk appeite and include the following methods:
The list of techniques in this category includes:
These techniques support decision-making when faced with multiple risk treatment options. These decisions are made in the context of a predefined risk appetite, helping security teams decide which risks can be accepted and which require treatment to compress within tolerance levels.
The list of techniques in this category includes:
These techniques keep the risk index updated and record all risk mitigation efforts. The resulting risk mitigation paper trail allows security teams to track the improvement of their overall risk information tracking and management strategies.
The list of techniques in this category includes:
Stakeholders also need to be kept informed of your risk management program performance. This is most efficiently achieved with cybersecurity reporting.
UpGuard offers a range of editable executive reporting templates to accommodate different risk program communication objectives.

When the board needs to be updated on your risk management program efforts, UpGuard’s board summary report can be instantly exported into editable PowerPoint slides, streamlining the entire board meeting preparation process.
