← Back to Risk Assessment
About this sample: This document represents the output of the thinking. The value is in the conversations that produced it — the site walk, the stakeholder interviews, the engineering judgements made along the way. What you are reading is the record. The work that matters happened before the first page was written.
Assessment Parameters
Client
[REDACTED]
Site
[REDACTED]
Sector
[REDACTED]
Assessment Date
[REDACTED]
Lead Engineer
[REDACTED]
Framework
IEC 62443-3-2 / NIST SP 800-30
Risk Landscape Overview

This assessment identified [N] risk scenarios across the assessed environment. Of these, [N] are rated High or Critical requiring prioritised treatment. The primary risk drivers are inadequate network segmentation, uncontrolled vendor remote access, and the absence of OT-specific incident response capability.

The overall residual risk posture is assessed as HIGH against the agreed target of MEDIUM within 12 months. A structured treatment plan is included in Section 04.

Impact-Weighted Scoring
Safety & Personnel
High
Production & Availability
High
Environmental Impact
Medium
Regulatory & Compliance
Medium
Reputational
Medium
Note: Scores above are illustrative sample values from a representative engagement. Your actual scores will reflect your specific environment, threat profile, and existing controls.
Identified Risk Scenarios

The following is an extract from the full risk register. Each scenario is documented with likelihood rating, consequence analysis, and treatment options.

Risk IDScenarioLikelihoodConsequenceRating
RA-001Ransomware via IT/OT lateral movement — encrypts historian and engineering workstations, halting production visibilityHighProduction shutdown — estimated [X] hrsCritical
RA-004Vendor remote access compromise — attacker gains authenticated session to SCADA via shared VPN credentialHighProcess manipulation possibleHigh
RA-007PLC firmware modification by insider — authorised user alters setpoints outside safety limitsMediumSafety system activation riskHigh
RA-011Supply chain compromise via software update — malicious code introduced through legitimate vendor update channelLowPersistent access, difficult to detectMedium
RA-015Data exfiltration from historian — competitive intelligence extracted via unsecured historian web interfaceMediumIP loss, regulatory notificationMedium
Priority Actions
PhaseTimeframeActionsRisk IDs
Immediate0–30 daysRemove shared VPN credential. Implement individual vendor accounts with session recording.RA-004
Phase 130–90 daysImplement IT/OT boundary firewall. Deploy historian network isolation. Develop OT incident response plan.RA-001, RA-015
Phase 290–180 daysDeploy passive OT monitoring. Implement insider threat controls on PLC access. Software update verification process.RA-007, RA-011
On ownership: Every action in the full treatment plan is assigned to a named role, not a team. "The IT department" does not act — a named individual with authority does. Where accountability is diffuse, remediation stalls. NEXUS treatment plans are written to be assigned, not filed.
What this enables: The full Risk Assessment Report includes all identified scenarios (typically 15–40), a complete impact-weighted risk register, treatment plan with effort and cost estimates, and an executive risk dashboard suitable for board reporting.