GH GambleHub

Risk Assessment and Threat Levels

1) Objectives and scope

The goal is to provide a consistent, repeatable, and verifiable approach to identifying, measuring, and managing the risks of iGaming operations, compliance, and reducing overall business vulnerability.
Coverage: AML/KYC/KYB, sanctions and PEP screening, payment and behavioral fraud schemes, data breaches and cyber threats, platform accessibility (SLA/SLO), regulatory changes, partner/provider risks, responsible play (RG).

2) Basic concepts and scales

Risk = probability of event × amount of damage (finance, legal consequences, SLA/player experience, reputation).
Threat - the source of the event (external/internal actor, process, vulnerability).

Threat levels (example):
  • Informational (Info) - signal without immediate impact, monitoring.
  • Low - local incidents, elimination within the shift.
  • Medium - impact on one region/process, requires escalation within 4 hours
  • High - cross-service impact/loss growth, mandatory escalation ≤ 1 h.
  • Critical - significant damage/regulatory risks/mass unavailability; immediate incident-bridge, notice to management and lawyers.
Probability scale (1-5):
  • 1 - extremely rare; 2 - rarely; 3 - possible; 4 - likely; 5 - almost certainly.
Impact scale (1-5):
  • 1 - insignificant; 2 - low; 3 - average; 4 - high; 5 - critical.

3) 5 × 5-matrix and escalation thresholds

Risk score = L × I (1-25).

Zones:
  • 1-5 Green (acceptable): monitoring, prevention.
  • 6-10 Yellow (requires a plan): deadlines and responsible.
  • 11-15 Orange (accelerated decline): Sprint challenges, frequent control.
  • 16-25 Red (unacceptable): immediate escalation, temporary "overlap" and protective measures.
Escalation SLA (example):
  • Yellow: up to 24 hours → risk owner.
  • Orange: up to 4 hours → to the Head of Discipline.
  • Red: ≤ 15 min → incident-bridge, C-level/legal service/PR/compliance.

4) Risk categories for iGaming

1. AML/Sanctions/PEP: false/positive positives, circumvention of restrictions, "mulling," mixing of means.
2. KYC/KYB: fake documents, synthetic identities, fraud of partners/affiliates.
3. Payment fraud: chargebacks, bonus abuse, "washing through cash outs," multi-accounting.
4. Cybersecurity/Data: phishing, ATO (account hacking), PII leaks, DDoS, API vulnerabilities.
5. Operational resilience: SLA degradation, release incidents, payment chain failures.
6. Regulatory and fines: non-compliance with local rules, reporting, advertising.
7. Responsible play (RG): dependency escalations, self-disengagement, limits.
8. Third circuit/Vendors: supplier drop, data processing violations, sanction risks.

5) Evaluation methodology (end-to-end cycle)

1. Identification:

sources: anti-fraud logs, SIEM/SOAR, case management, regulatory reports, player complaints, partner monitoring, pentest reports.

2. Analysis of causes and scenarios:

"what if" through the channels: registration → verification → deposits → bonuses → conclusions → support.

3. Quantification:

SLE/ALE: one-time and annual expected damage;

Ranges: P10/P50/P90 (including seasonality);

Stress tests: a surge in traffic/campaigns/sports events.
4. Control assessment: preventive, detective, corrective measures; efficiency (proportion of locks, FPR/FNR).
5. Processing plan: accept/reduce/transfer (insurance/outsourcing )/eliminate (process change).
6. Monitoring and reporting: KRI/KPI, dashboards, post-incident retrospectives.

6) Key Risk Indicators (KRI) and KPIs

AML/KYC:
  • Share of sanctions/POP alerts for 1k registrations; manual check time;% false positive.
Payments/Fraud:
  • Chargeback Rate; Net Fraud Loss% of GGR;% bonus abuse; conversion of the fraud signal to blocking.
Cyber/Data:
  • ATO rate for 1k logins; time to detection (MTTD) and time to recovery (MTTR); number of critical vulnerabilities.
Operations:
  • SLO uptime; frequency of incidents per release; rollback success.
RG:
  • % self-disconnections; the proportion of players exceeding the limits; support reaction time.

7) Threat levels and action mapping

LevelExamples of triggersActionsSLA
InfoSpike sanctions hits Logging, observation, without case
Low2 × FPR in KYC per day; 10% rise in ATOTicket to control owner, parameters check24 h
MediumChargeback rate> 0. 9% in the region; CVEs highEscalation to manager, setting up rules/patch4 h
HighL×I ≥ 16; Limited PII leakIncident-Bridge, Vendor/Rule Isolation, Report1 h
CriticalMassive DDoS/PII leak/sancts. violationWar-room, disabling functions, notifications to regulators/banks, PR-plan15 min

8) Thresholds (approximate landmarks - adapt to jurisdictions)

Sanctions/POP: Hit-rate> 1. 5% registrations (Medium), 3% (High).
KYC FPR: > 8% (Medium), 12% (High).
Chargeback Rate: > 0. 8% (Medium), 1. 2% (High), 1. 5% (Critical).
ATO: > 0. 3 per 1k logins (Medium), 0. 6 (High).
SLA of payment providers: uptime <99. 5% week (Medium), 99. 0% (High).
Escalation RG: Dependency Complaints> Baseline by 50% (High).

9) Control measures and architectural patterns

Preventive: sanction/PEP screening on-boarding and before payment; behavioral biometrics; device-fingerprinting; deposit/withdrawal limits; 2FA/WebAuthn; network segmentation; PII encryption; "two-eye" in verifications.
Detective: real-time anti-fraud rules; SIEM correlations; anomaly alerts by KRIs; honeypot accounts.
Corrective: time blocks of functions (bonuses/payouts), increased levels of AML checks, release cutscripts, key/secret rotation, hot fixes.
Processes: RACI for incidents, mandatory post-mortems (with 5 Whys), change control (CAB), regular tabletop exercises.

10) Risk register (field template)

ID, Category, Scenario, Causes/Vulnerabilities, Owners (Business/Tech), L, I, Score, Zone, Controls (Current/Plan), KRIs Threshold, Status, Deadlines, Revision Date.

Example entry

ID: AML-003Category: Sanction risk
Scenario: Positive match for PEP/sanctions at high-roller before payment.
L/I: 3 × 4 = 12 (Orange)
Controls: Secondary review via alternative provider, manual case review, deferred T + 1 payout.
Threshold: Hit-rate> 2% of the day → Medium;> 3% → High.
Plan: Integration of the second source of lists + team training.
Term: 14 days.

11) Scenario analysis and stress tests

Bonus bonus during a major tournament: a surge in beginners, a sharp increase in deposits for one card/device → tighten velocity rules, limits on promotions, manual checks.
Refusal of the KYC vendor: turn on the backup provider, narrow the corridor of permissible limits, if necessary - temporarily prohibit quick conclusions.
DDoS/uptime degradation: WAF/Rate-Limit activation, geo-cutoff, traffic routing, release freezing.

12) Reporting and Communications

Dashboards: KRIs by domain, "traffic light" zones, current High/Critical cases.
Cadence: Daily Operator Reports, Weekly Trend Bridges, Monthly Risk Committee (Register Update, Downgrade Plans).
Mandatory notifications: regulator/bank/payment partners in case of AML violations/leaks/mass incidents - according to local requirements.
Dock trail: decision log, post-mortem artifacts, CAPA (Corrective and Preventive Actions) control.

13) Roles and Responsibilities (RACI, aggregated)

Business/Compliance: L/I score, mitigation plan, reporting.
Security/FRM: detection, anti-fraud rules, SOAR playbooks.
Data/ML: scoring models, threshold calibration, A/B rules.
Ops/SRE: stability, SLO, autocat/feature flags.
Legal/PR: communications with regulators/banks/public.
Support/VIP: initial reaction to player cases.

14) Implementation (road map)

1. Week 1-2: risk inventory, approval of scales, launch of the basic 5 × 5 matrix and register.
2. Week 3-4: KRIs onboarding, alert integration, RACI and post-mortem patterns.
3. Month 2: reserve providers (CCP/sanctions), SOAR playbooks, backtest rules.
4. Month 3 +: scenario stress test, performance audit, revision of thresholds and risk appetite.

15) Appendices

A. Scoring scale (example):
  • Probability: {1: ≤1/god, 2: quarterly, 3: monthly, 4: weekly, 5: daily}
  • Impact (finance): {1: <€5k, 2: €5-25k, 3: €25-100k, 4: €100-500k, 5:> €500k}
  • Impact (Regulatory): {1: None, 2: Inquiry, 3: Prescription, 4: Penalty Risk, 5: High Risk of Recall/Large Fine}
B. Control map:
  • AML/KYC ↔ Sanctions/PEP ↔ RG ↔ DLP/PII ↔ SRE/Releases ↔ Payments/FRM.
C. Maturity checklist:
  • Scales/matrix are consistent; KRIs flow count; thresholds are fixed; SOAR playbooks tested; backup providers are connected; monthly risk committee is active; CAPA tracker is underway.

Short TL; DR

Single 5 × 5-matrix + clear KRIs and thresholds → automatic alerts and clear playbooks' and → rapid level escalations (Info→Critical) → regular post-mortems and risk reassessment. This reduces losses, speeds up reactions and strengthens the compliance position in iGaming.

Contact

Get in Touch

Reach out with any questions or support needs.We are always ready to help!

Telegram
@Gamble_GC
Start Integration

Email is required. Telegram or WhatsApp — optional.

Your Name optional
Email optional
Subject optional
Message optional
Telegram optional
@
If you include Telegram — we will reply there as well, in addition to Email.
WhatsApp optional
Format: +country code and number (e.g., +380XXXXXXXXX).

By clicking this button, you agree to data processing.