APO12: Managed Risk
APO12: Managed Risk requires you to run a repeatable, owned, and evidenced risk management process for enterprise IT, so leadership can make informed decisions and you can prove risk is identified, assessed, treated, monitored, and reported. Operationalize it by assigning accountable owners, defining a standard risk workflow, and retaining a consistent evidence bundle each cycle.
Key takeaways:
- You need a governed risk process with clear ownership, cadence triggers, and decision rights tied to business objectives.
- Evidence matters as much as activity: keep risk registers, treatment decisions, approvals, and monitoring outputs in an auditable trail.
- Build for “show me” moments: auditors and customers will test consistency, completeness, and closure on risk actions.
The apo12: managed risk requirement is about making IT risk management operational, not aspirational. COBIT expects risk to be managed as a formal management practice: defined, assigned, repeatable, measurable, and integrated with how the enterprise prioritizes work and accepts residual risk. Your job as a Compliance Officer, CCO, or GRC lead is to turn this into a process that produces decisions and proof.
In practice, APO12 is where many programs fail quietly. Teams run one-off risk assessments, keep risks in slide decks, or treat remediation as “best effort.” Then an audit, a major incident, or a customer due diligence request asks for risk acceptance approvals, treatment status, or evidence of monitoring. The gap is rarely “we didn’t know our risks.” The gap is “we can’t show who owns the workflow, what the standard is, and what artifacts prove it ran.”
This page gives requirement-level implementation guidance you can execute quickly: who it applies to, what to do step-by-step, which artifacts to retain, common audit hangups, and a practical execution plan. Sources for the COBIT framing are the ISACA COBIT overview and publicly available COBIT mapping references. 1
Regulatory text
Framework excerpt (provided): “COBIT 2019 objective APO12 implementation expectation.” 1
Operator interpretation: APO12 expects an enterprise to manage risk as a defined management objective, with governance, standard methods, and evidence that risk is continuously identified, analyzed, responded to, monitored, and communicated. You should be able to demonstrate:
- Ownership: named accountable roles for risk decisions and risk operations.
- Consistency: a standard risk taxonomy and workflow used across teams.
- Traceability: risk decisions link to assets/services, controls, and treatment plans.
- Monitoring and reporting: risk status changes over time and is reported to the right forums.
2
Plain-English interpretation (what the requirement means day to day)
You must run a living IT risk program where:
- new risks enter through defined triggers (changes, incidents, third-party onboarding, audits),
- risks are evaluated using a consistent method,
- each risk gets a treatment decision (fix, mitigate, transfer, accept, avoid),
- accepted risk has explicit approval and rationale,
- remediation is tracked to validated closure,
- leadership sees a current view of material risks.
The fastest way to make this real is to implement three concrete mechanisms:
- a requirement control card (a runbook with owners, triggers, steps, and exceptions),
- a minimum evidence bundle per operating cycle,
- control health checks with remediation tracking to closure.
2
Who it applies to
Entities: Any enterprise IT organization using COBIT as its governance framework, including regulated organizations using COBIT to structure IT governance, security governance, and assurance responses. 2
Operational contexts where APO12 gets tested:
- Audit and assurance: internal audit testing of risk governance and evidence of operation.
- Security governance: security risk acceptance, control exceptions, and compensating controls.
- Change and release: major changes requiring risk assessment and sign-off.
- Third-party risk: risks introduced by critical third parties (cloud providers, software, MSPs).
- Incident management: translating incident learnings into risk register updates and treatment plans.
If you own GRC, you are typically accountable for the risk framework and evidence, while engineering/IT/security leaders own remediation execution. The CFO/CEO/board committees often own ultimate risk appetite decisions, depending on governance.
What you actually need to do (step-by-step)
Step 1: Write the “Managed Risk” control card (your operating runbook)
Create a single-page control card for apo12: managed risk requirement with:
- Objective: “Maintain an accurate view of IT risk; drive treatment decisions; track to closure.”
- Scope: systems, applications, infrastructure, cloud, and third-party dependencies.
- Owner: a named role (e.g., Head of GRC or Enterprise Risk Manager) plus alternates.
- RACI: who assesses, who approves acceptance, who remediates, who monitors.
- Trigger events: new product/service, material change, security exception, incident, audit finding, new critical third party.
- Operating cadence: define the recurring cycle your org will follow (monthly/quarterly or event-driven; pick one and document it as “standard”).
- Exception rules: what can be handled as “low risk” and fast-tracked; what requires leadership sign-off. 2
Step 2: Standardize your risk method so assessments are comparable
Define and publish:
- Risk taxonomy: categories (confidentiality, availability, integrity, regulatory, third-party, operational).
- Scoring model: qualitative scales (e.g., low/medium/high) or a numeric scale if you already use one; keep it stable.
- Risk statement format: “If [threat/event], then [impact], because [control gap].”
- Materiality criteria: what must be escalated to exec/board reporting. This is where teams often overcomplicate. Your goal is comparability and repeatability.
Step 3: Build a single system of record (risk register) with required fields
Use a GRC tool, ticketing system, or even a controlled spreadsheet initially, but enforce required fields:
- unique risk ID
- owner (person/role)
- affected service/asset
- inherent risk rating and rationale
- existing controls and control gaps
- treatment decision (mitigate/accept/transfer/avoid) and rationale
- target residual risk rating
- remediation plan, milestones, due dates, and assignees
- acceptance approver and date (if accepted)
- review date, status, and evidence links
Step 4: Define the treatment workflow and approval gates
You need documented gates that align to decision rights:
- Mitigate: remediation tickets created, prioritized, and tracked; closure requires validation evidence.
- Accept: documented rationale, time bound review date, and correct approver (don’t let engineers accept enterprise risk by default).
- Transfer: insurance/contract terms documented; confirm third-party obligations and monitoring.
- Avoid: decision record that the activity/system is stopped or redesigned.
Tie risk acceptance to a forum: Security Steering Committee, Architecture Review Board, or an ERM committee. Document the forum and where minutes/decisions live.
Step 5: Monitoring and reporting that an auditor can replay
Operationalize two reporting loops:
- Working loop (operators): top risks, overdue treatments, exceptions, and aging risks.
- Leadership loop (governance): material risks, trend themes, and acceptance decisions.
Make reporting consistent: same fields, same categories, same source-of-truth links. If reporting is hand-built each time, it will drift.
Step 6: Run control health checks and close gaps with proof
Schedule recurring health checks that answer:
- Are risks reviewed on schedule?
- Are acceptance approvals present and valid?
- Are remediation items closing with validation evidence?
- Are risk ratings updated when conditions change (incidents, changes, third-party issues)? Track gaps as remediation items with owners and due dates, then validate closure. 2
Required evidence and artifacts to retain (minimum evidence bundle)
Retain artifacts in a named repository with access control and retention rules. Your evidence bundle should include:
| Evidence item | What it proves | Common format |
|---|---|---|
| APO12 control card / runbook | Defined process, ownership, triggers, exceptions | Controlled doc |
| Risk methodology (taxonomy + scoring) | Consistency across assessments | Policy/standard |
| Risk register export + change history | Complete inventory and lifecycle | GRC export / spreadsheet version history |
| Risk treatment plans + linked tickets | Actionability and tracking | Jira/ServiceNow links |
| Risk acceptance records | Proper decision rights and rationale | Approval workflow, e-sign, minutes excerpt |
| Governance forum minutes | Oversight and escalation | Minutes, agenda, deck |
| Health check results | Ongoing operation | Checklist + remediation log |
| Closure validation | Fix was implemented and verified | Test results, config snapshots, control evidence |
A practical rule: every risk record should have at least one link to supporting evidence (assessment notes, scan results, architecture review, incident postmortem, third-party assessment).
Common exam/audit questions and hangups
Auditors and customer assessors typically probe these areas:
- “Show me your top risks and the evidence they were reviewed recently.”
- “Who can accept risk, and where is that documented?”
- “Pick one accepted risk. Show the rationale, expiry/review date, and re-approval if still open.”
- “Pick one mitigated risk. Show the remediation tickets and evidence of validation, not just ‘done’ status.”
- “How do risks enter the register? Is it only annual assessments, or do incidents/changes feed it?”
- “How do you ensure third-party risks are tracked like internal risks?”
Hangups you can prevent:
- Risks with no owners.
- Acceptance approvals done in chat with no retention.
- Remediation closed without validation evidence.
- Multiple inconsistent risk registers across teams.
Frequent implementation mistakes (and how to avoid them)
-
Policy-only risk management.
Fix: create the control card plus a repeatable workflow and evidence bundle. 2 -
Risk acceptance becomes a loophole.
Fix: enforce approver levels, require rationale, require a review date, and report all acceptances in governance meetings. -
No linkage between risks and work.
Fix: every mitigation decision generates tracked work items; “plan to address” is not a plan without owners and dates. -
Stale register.
Fix: define triggers (incidents, major changes, third-party changes) that require risk review and update, and test it in health checks. -
Teams invent their own scoring.
Fix: publish one scoring model and require its use in the system of record; treat deviations as exceptions requiring approval.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so you should treat APO12 primarily as a governance and assurance expectation rather than a standalone legal mandate. The practical risk is indirect but real: weak risk governance increases the odds of audit findings, failed customer due diligence, delayed sales cycles, and poor incident outcomes because the organization cannot show informed decision-making or disciplined remediation. 2
Practical 30/60/90-day execution plan
First 30 days (stand up the minimum viable APO12 operating model)
- Assign an APO12 owner and define the RACI for assessment, approval, remediation, and reporting.
- Publish the APO12 control card (runbook) and store it in a controlled repository.
- Choose the system of record for the risk register and lock required fields.
- Define the minimum evidence bundle and where each artifact must be stored.
- Run a pilot: take a small set of known risks and push them through assess → treat → report.
Days 31–60 (make it repeatable and auditable)
- Finalize taxonomy and scoring; train key risk contributors (security, IT ops, product, procurement).
- Implement approval gates for risk acceptance with correct approver levels.
- Establish a governance forum agenda item for risk review and acceptance.
- Integrate triggers: change management, incident postmortems, and third-party onboarding must create or update risk entries.
- Run your first control health check; log gaps and assign remediation owners.
Days 61–90 (stabilize operations and prove ongoing control)
- Produce consistent operator and leadership reporting from the system of record (not manually rebuilt each time).
- Validate closure for a sample of mitigated risks; ensure evidence is attached and reviewable.
- Clean up the risk register: remove duplicates, assign owners, set review dates, and close dead entries with rationale.
- Hold a retrospective on workflow friction; update the control card and evidence bundle based on what auditors would actually request.
- If you use Daydream, map each workflow step to an evidence checklist so every cycle produces the same audit-ready package without chasing screenshots.
Frequently Asked Questions
What is the fastest way to operationalize the apo12: managed risk requirement?
Write the APO12 control card, pick a single system of record for the risk register, and define the minimum evidence bundle you will retain each cycle. Then run a pilot with a small set of risks to prove the workflow end to end.
Do we need a numeric risk scoring model for APO12?
No. You need a consistent method that allows prioritization and comparison across risks. Many teams start with qualitative ratings and add numeric scoring later if decision-making needs more granularity.
Who should be allowed to accept risk?
The approver should match the business impact and decision rights. Document an approval matrix so acceptance is not done ad hoc by individual contributors without authority.
How do third-party risks fit into APO12?
Treat third-party risks as first-class entries in the same risk register, linked to the third party, the dependent service, and contractual controls. The key is traceability from onboarding assessment to treatment decisions and ongoing monitoring.
What evidence do auditors ask for most often?
They typically ask for the risk register, evidence of recent reviews, risk acceptance approvals, remediation tracking to validated closure, and governance reporting artifacts. If you cannot produce these quickly, your process is not yet operational.
We already have an ERM program. Do we still need APO12 artifacts?
Yes, if ERM does not provide IT-specific traceability and evidence of control operation. Align to ERM where possible, but keep the IT risk workflow, register fields, and evidence bundle tight enough to satisfy assurance requests.
Footnotes
Frequently Asked Questions
What is the fastest way to operationalize the apo12: managed risk requirement?
Write the APO12 control card, pick a single system of record for the risk register, and define the minimum evidence bundle you will retain each cycle. Then run a pilot with a small set of risks to prove the workflow end to end.
Do we need a numeric risk scoring model for APO12?
No. You need a consistent method that allows prioritization and comparison across risks. Many teams start with qualitative ratings and add numeric scoring later if decision-making needs more granularity.
Who should be allowed to accept risk?
The approver should match the business impact and decision rights. Document an approval matrix so acceptance is not done ad hoc by individual contributors without authority.
How do third-party risks fit into APO12?
Treat third-party risks as first-class entries in the same risk register, linked to the third party, the dependent service, and contractual controls. The key is traceability from onboarding assessment to treatment decisions and ongoing monitoring.
What evidence do auditors ask for most often?
They typically ask for the risk register, evidence of recent reviews, risk acceptance approvals, remediation tracking to validated closure, and governance reporting artifacts. If you cannot produce these quickly, your process is not yet operational.
We already have an ERM program. Do we still need APO12 artifacts?
Yes, if ERM does not provide IT-specific traceability and evidence of control operation. Align to ERM where possible, but keep the IT risk workflow, register fields, and evidence bundle tight enough to satisfy assurance requests.
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream