Consolidated risk scoring, register management, and NIST RMF reporting
The Risk Assessment & Reporting skill serves as the central aggregation point for all audit findings. It imports structured output from the other five skills, scores risks using the NIST 800-30 5×5 likelihood-impact matrix, maintains a prioritized risk register, and generates consolidated reports with Plans of Action & Milestones (POA&M). This skill implements the NIST Risk Management Framework (RMF) as defined in SP 800-37.
Create a new risk assessment project that will aggregate findings from all audit phases.
python3 risk_report.py init \
--name 'Q1-2026 Enterprise Audit' \
--assessor 'Gaby - Regional IT Director'Import structured JSON output from network scanning and penetration testing skills.
# Import network scan findings
python3 risk_report.py import-findings \
--project Q1-2026 \
--file /reports/network_scan.json
# Import pen-test findings
python3 risk_report.py import-findings \
--project Q1-2026 \
--file /reports/pentest_findings.jsonAdd risks identified from config audit, policy audit, and IR audit that require manual scoring.
python3 risk_report.py add-risk \
--project Q1-2026 \
--title 'Weak Password Policy' \
--source config-audit \
--likelihood 4 --impact 4 \
--control IA-5 \
--treatment mitigateProduce the final risk assessment report with risk register, heat map data, and POA&M.
python3 risk_report.py generate \
--project Q1-2026 \
--output /reports/risk_assessment.mdCreate a new risk assessment project.
python3 risk_report.py init --name 'Enterprise Audit' --assessor 'Gaby'Risk Assessment Project initialized Project: Enterprise Audit Assessor: Gaby Directory: ./risk_projects/enterprise-audit/
# Consolidated Risk Assessment Report
**Project:** Q1-2026 Enterprise Audit
**Assessor:** Gaby — Regional IT Director
**Framework:** NIST SP 800-37 (RMF) / NIST SP 800-30
## Risk Register
| ID | Risk | Severity | Score | Source | NIST Control | Treatment |
|----|------|----------|-------|--------|-------------|-----------|
| RISK-002 | SQL Injection in Login | CRITICAL | 25 | Pen Test | SI-10 | Mitigate |
| RISK-005 | Default Admin Creds | CRITICAL | 25 | Pen Test | IA-5 | Mitigate |
| RISK-001 | VNC Port Exposed | HIGH | 16 | Net Scan | SC-7 | Mitigate |
| RISK-003 | XSS in Search | HIGH | 16 | Pen Test | SI-10 | Mitigate |
## Risk Distribution
- Critical (20-25): 2 risks — Immediate action required
- High (12-19): 7 risks — 30-day mitigation plan
- Medium (6-11): 2 risks — 90-day remediation cycle
- Low (1-5): 0 risks## Plan of Action & Milestones (POA&M)
| Risk ID | Action Item | Responsible | Deadline | Status |
|---------|------------|-------------|----------|--------|
| RISK-002 | Implement parameterized queries | Dev Team | 2026-03-15 | Open |
| RISK-005 | Change default credentials, enable MFA | IT Ops | 2026-03-08 | Open |
| RISK-001 | Restrict VNC via firewall, require VPN | NetOps | 2026-03-22 | Open |Conduct an assessment of risk, including the likelihood and magnitude of harm.
Develop a comprehensive strategy to manage risk to organizational operations and assets.
Develop a plan of action and milestones for the system to document planned remedial actions.
Categorize information and the system in accordance with applicable laws and policies.