GH GambleHub

Risk register and assessment methodology

1) Why and what is included in the register

Purpose: unified system of description, assessment, prioritization and monitoring of risks affecting money (GGR/CF), licenses, players, data and reputation.
Coverage: Product/Engineering (SDLC/Incidents), Finance and Payments (PSP/Findings), KYC/AML/Sanctions, Privacy (GDPR), TPRM/Vendors, Marketing/SDK, Data (DWH/BI), Infrastructure/Clouds/DR, Support Operations, and VIP.


2) Risk taxonomy (example)

Information security and privacy: PII/KYC leaks, unauthorized access, logging failure, DSAR files.
Regulatory/compliance: violations of license terms, AML/KYC/sanctions, advertising bans.
Operating/technological: downtime PSP/KYC, release defect, latency degradation, DR incidents.
Fraud/abuse: fraud deposits, bonus abuse, payment attacking patterns.
Financial: partner liquidity, chargeback shocks, concentration on one PSP.
Vendor/supply chain: vulnerable SDKs, sub-processors with low TOMs.
Reputational/customer: spike in complaints, NPS drop, RG violations.
Strategic/geopolitical: sanctions, tax/law changes, traffic blockages.


3) Risk card (required fields)

ID/Risk Name

Category (from taxonomy)

Event description (what may happen) and cause

Assets/processes/jurisdictions under the influence of

Risk Owner and Sponsor

Available controls (preventive/detective/corrective)

Probability (P) and Impact (I) before controls (inherent)

Residual risk after controls

Treatment plan: reduce/avoid/accept/transfer

Escalation Threshold/Threat Level (Low/Medium/High/Critical)

KRIs and triggers, metrics and data sources

Next Review Status and Due Date Associated CAPAs/Tickets

Linkage to Control Registry (Control IDs) and Policies

Auditor/Committee Comments (Latest Resolutions)


4) Rating scales (default 5 × 5)

4. 1 Probability (P)

1 - Rare (<1/5 years)

2 - Low (1/2-5 years)

3 - Average (annually)

4 - High (Quarter)

5 - Very high (month/more often)

4. 2 Impact (I) - select maximum from branches

Finance: 1: <€10k· 2: €10-100k· 3: €100k-1m· 4: €1-5m· 5:> €5m

Privacy/Data: 1: <1k records·...· 5:> 1M records/special categories

Regulator/Licenses: 1: Warning· 3: Penalty/Review· 5: License Suspension

Availability (SLO/SLA): 1: <15 min·...· 5:> 8 h for critical areas

Final score: 'R = P × I' → levels: 1-5 Low, 6-10 Medium, 12-16 High, 20-25 Critical.

(Thresholds can be adapted to the company.)


5) Heat map matrix and risk appetite

Risk Appetite: a document with tolerances by domain (for example, PII leaks - zero tolerance; downtime P95 - ≤ X min/month; chargeback rate — ≤ Y%).
Heatmap: visualization of R at 5 × 5; above appetite - require CAPA plan and timeline.
Risk Budget: quotas for "accepted" risks with justification (economic feasibility).


6) Valuation methodologies

6. 1 Quality (fast start)

Expert evaluations on P/I scales + justification, reconciliation with incident history and KRIs data.

6. 2 Quantitative (priority for Top-10)

FAIR approach (simplified): frequency of events × probabilistic distribution of damage (P10/P50/P90); useful for comparing reduction options.
Monte Carlo (1000-10k runs): variability of damage and frequency → Loss Exceedance Curve (probability of loss> X).
TRA (Targeted Risk Analysis): point analysis for selecting monitoring/control frequencies (relevant for PCI/vendors).


7) KRIs and sources

Examples for domains:
  • Availability/Operations: MTTR, 5xx errors, P95 latency, P1/P2 incidents,% autoscale, cluster capacity.
  • Security/privacy:% MFA coverage, credential stuffing attempts, unusual exports, DSAR SLA, anti-alvar flags.
  • Payments: auth rate by PSP, chargeback rate, bank failure, share of manual cashouts.
  • KYC/AML: TAT, false positive rate, sanctions hits, escalation share.
  • Vendors: SLA compliance, latency drift, frequency of incidents, relevance of certificates.

KRIs associate with risks and trigger escalations when they go beyond thresholds.


8) Risk life cycle (workflow)

1. Identification → registration of the card.
2. Inherent → Control Mapping → Residual.
3. Treatment decision and CAPA plan (dates/owners).
4. KRIs/incident monitoring, card update.
5. Quarterly Risk Committee: Top-N revision, appetite re-labeling.
6. Close/consolidate or watchlist.


9) Communication with controls and audit

Each risk should reference specific controls (see Internal Controls and Their Audits):
  • Proactive: RBAC/ABAC, SoD, limits, encryption, WebAuthn, segmentation.
  • Detective: SIEM/alerts, reconciliations, WORM logs, UEBA.
  • Corrective: rollbacks, payout locks, key revocation, urgent patches.
  • The DE/OE audit verifies that controls reduce risk to appetite and work stably.

10) Sample cards (YAML, fragments)

10. 1 PII leak via vendor SDK (Tier-1)

yaml id: R-PRIV-001 title: "Утечка PII через SDK маркетинга"
category: privacy/vendor assets: [pii_profiles, sdk_mobile]
owner: privacy_lead inherent:
likelihood: 3 impact: 5  # >1M записей / регуляторные штрафы controls:
preventive: [cmp_enforced, data_minimization, sdk_allowlist, tokenization]
detective: [worm_logs, export_signing, siem_anomaly_exports]
corrective: [sdk_kill_switch, key_rotation, incident_comm_plan]
residual:
likelihood: 2 impact: 4 treatment: reduce kri:
- name: "Anomalous export volume"
threshold: ">P99 baseline"
- name: "SDK version drift"
threshold: "N-1 only"
status: active next_review: 2026-01-15

10. 2 PSP Degradation: Payment Authorization Failure

yaml id: R-PAY-007 title: "Падение конверсии авторизации у PSP#1"
category: payments/availability owner: head_of_payments inherent: {likelihood: 4, impact: 4}
controls:
preventive: [multi_psp_routing, rate_limits, timeout_policies]
detective: [auth_rate_dashboard, p95_latency_alerts]
corrective: [failover_to_psp2, traffic_shaping, incident_swar_rm]
residual: {likelihood: 2, impact: 3}
kri:
- name: "Auth rate PSP1"
threshold: "< baseline-3σ for 15m"
escalation: "Incident P1 if <X% for 30m"

11) Aggregation and Portfolio Management

Top-N (Risk Register View): sorted by residual R and "above appetite."

Topics (Risk Themes): clusters (vendors, privacy, PSP) → topic owners.
Dependency maps: riski↔kontroli↔vendory↔protsessy.
Scenarios and stress tests: What if "PSP # 1 and KYC # 1 are not available for 2 hours?" - cumulative damage assessment and action plan.
LEC (Loss Exceedance Curve): Annual loss profile for the council/board.


12) Escalation thresholds and signals

Operational: SLO/SLA violation → Incident P1/P2.
Compliance/Privacy: exceeding retention, DSAR failure, export without 'purpose' → immediate DPO/Legal escalation.
Vendor: repeated SLA failures → CAPA at the supplier, contract revision.
Financial: exit chargeback> threshold → manual checks, adjustment of limits/bonuses.


13) RACI (enlarged)

ActivityBoard/CEORisk CommitteeRisk OwnerSecurity/PrivacyDomain OwnersData/BIInternal Audit
Risk appetiteARCCCII
Taxonomy/ScalesIA/RCRCCI
Maintenance of the registerICA/RRRRI
Assessment/UpdatesICA/RRRRI
ExcalationsIA/RRRRII
Audits/inspectionsICCCCCA/R

14) Metrics (KPI/KRI) of the risk management system

Coverage: 100% of critical processes have registered risks and owners.
Review On-time: ≥ 95% of cards are revised on time.
Above Appetite: ↓ QoQ, the proportion of risks is higher than appetite.
CAPA Closure (High/Critical): ≥ 95% on time.
Detection Lag: median time from KRI deviation to escalation (tends to ↓).
Incident Recurrence: repeated incidents for one reason - 0.


15) Checklists

15. 1 Creating a card

  • Event/Cause Category and Description
  • Assets/processes/jurisdictions marked
  • Estimated P/I (inherent) and residual with justification
  • Control Mapping (ID), KRIs, and Data Sources
  • CAPA Plan/Dates/Owners
  • Escalation Threshold and Threat Level

15. 2 Quarterly Committee

  • Top 10 for residual and above appetite
  • New/emergent risks, changes in laws/vendors
  • CAPA and Delinquency Status
  • Decisions: accept/reduce/transfer/avoid; update appetite/thresholds

16) Implementation Roadmap (4-6 weeks)

Weeks 1-2: approve taxonomy, scales, appetite; Select a tool (table/BI/IRM). Create 10-15 starting cards for critical processes.
Weeks 3-4: associate risks with controls and KRIs; build a heat map/dashboards; launch a risk committee.
Weeks 5-6: implement quantification for Top-5 (FAIR/Monte Carlo light), automate KRIs collection, formalize escalations and board reporting.


17) Related wiki sections

Internal controls and their audits, ISO 27001/27701, SOC 2, PCI DSS, IGA/RBAC/Least Privilege, TPRM and SLA, Incidents and Leaks, DR/BCP, Log Policy and WORM - for the full cycle "risk → control → metric → evidence."


TL; DR

Working risk register = clear taxonomy + standardized scales + appetite/thresholds → cards with owners, controls and KRIs → heat map and committees → priority quantification for Top risks and CAPAs on time. This makes the risks manageable, comparable and provable for the board and regulators.

Contact

Get in Touch

Reach out with any questions or support needs.We are always ready to help!

Start Integration

Email is required. Telegram or WhatsApp — optional.

Your Name optional
Email optional
Subject optional
Message optional
Telegram optional
@
If you include Telegram — we will reply there as well, in addition to Email.
WhatsApp optional
Format: +country code and number (e.g., +380XXXXXXXXX).

By clicking this button, you agree to data processing.