DemandFlow Support Centre

ISORISK: Compliance Risk

ReferenceEntity Reference16/04/2026Updated 16/04/2026
An organisation-level risk register entry for ISO 27001 information security risks and ISO 9001 quality risks, with threat/vulnerability analysis, treatment planning, and residual risk tracking.

ISORISK: Compliance Risk

An organisation-level risk register entry for ISO 27001 information security risks and ISO 9001 quality risks, with threat/vulnerability analysis, treatment planning, and residual risk tracking.

Default definition. This article describes the default ISORISK definition shipped with DemandFlow. Administrators can add, remove, rename, or re-type fields, change which ones are required, and alter the layout from the Definitions screen in Settings. Your tenant's current schema may differ from what is shown here. To read the current definition at any time, GET the DEFINITION object whose id matches ISORISK.

Entity properties

PropertyValue
Entity codeISORISK
Display nameCompliance Risk
PluralCompliance Risks
Level90070

Use cases

ISORISK is the organisation-level risk register required by ISO 27001 clause 6.1.2 (Information security risk assessment) and ISO 9001 clause 6.1 (Actions to address risks and opportunities). Unlike RISK (which is project-scoped via SUB|PJ), ISORISK lives at SUB level for enterprise-wide compliance risk management. The risk assessment follows ISO 27005 methodology: identify assets, threats, and vulnerabilities; assess likelihood and consequence; determine risk level; select treatment option; track residual risk.

Fields

Risk Identification

FieldTypeRequiredNotes
nametextYesRisk Title.
riskReftextRisk Reference.
categoryenumYesValid ids: informationSecurity (Information Security), dataProtection (Data Protection / Privacy), compliance (Compliance / Regulatory), operational (Operational), technical (Technical), thirdParty (Third-Party / Supply Chain), quality (Quality), reputational (Reputational), financial (Financial), legal (Legal / Contractual).
statusenumYesValid ids: identified (Identified), assessing (Under Assessment), treating (Treatment In Progress), accepted (Accepted), monitoring (Monitoring), closed (Closed).
descriptiontext (multi-line)YesRisk Description.

Threat & Vulnerability

FieldTypeRequiredNotes
threattext (multi-line)What threat could exploit the vulnerability?
vulnerabilitytext (multi-line)What weakness could be exploited?
affectedAssetstext (multi-line)What information assets or processes are at risk?
isoClauseReftextISO Clause / Control Reference.

Inherent Risk Assessment

FieldTypeRequiredNotes
likelihoodenumYesValid ids: rare (1 - Rare), unlikely (2 - Unlikely), possible (3 - Possible), likely (4 - Likely), almostCertain (5 - Almost Certain).
consequenceenumYesValid ids: insignificant (1 - Insignificant), minor (2 - Minor), moderate (3 - Moderate), major (4 - Major), catastrophic (5 - Catastrophic).
riskLevelenumYesBased on likelihood x consequence matrix Valid ids: low (Low), medium (Medium), high (High), critical (Critical).
riskOwnerreference → userYesRisk Owner.
identifiedDatedateDate Identified.
nextReviewDatedateNext Review Date.

Treatment (ISO 27001 6.1.3)

FieldTypeRequiredNotes
treatmentOptionenumYesISO 27001 clause 6.1.3 risk treatment options Valid ids: mitigate (Mitigate / Reduce), accept (Accept), transfer (Transfer), avoid (Avoid).
treatmentPlantext (multi-line)How will this risk be treated?
relatedControlstext (multi-line)ISO 27001 Annex A controls that address this risk

Residual Risk

FieldTypeRequiredNotes
residualLikelihoodenumValid ids: rare (1 - Rare), unlikely (2 - Unlikely), possible (3 - Possible), likely (4 - Likely), almostCertain (5 - Almost Certain).
residualConsequenceenumValid ids: insignificant (1 - Insignificant), minor (2 - Minor), moderate (3 - Moderate), major (4 - Major), catastrophic (5 - Catastrophic).
residualRiskLevelenumValid ids: low (Low), medium (Medium), high (High), critical (Critical).
riskAcceptedByreference → userWho formally accepted the residual risk? (ISO 27001 6.1.3(f))
riskAcceptedDatedateRisk Acceptance Date.

Cost & Impact

FieldTypeRequiredNotes
costImpactnumberPotential Cost Impact.
treatmentCostnumberEstimated cost of implementing the treatment plan
treatmentNotestext (multi-line)Treatment Notes.

Additional panels

  • Activity timeline panel attached.

Relationships

  • Lookups: riskOwner points at a user; riskAcceptedBy points at a user.
  • Related lists: AUDITACTION (format SUB|ISORISK).

Creating a Compliance Risk via the API

POST /v1/objects
Authorization: Bearer <your-pat>
Content-Type: application/json

{
  "entity":   "ISORISK",
  "level":    90070,
  "comboKey": "SUB:<your-sub-id>|ENT:",
  "name": "Example",
  "category": "informationSecurity",
  "status": "identified",
  "description": "..."
}

Listing Compliance Risks

# All records in your tenant
GET /v1/entities/ISORISK/SUB:<your-sub-id>

See also

isoriskcomplianceriskriskscompliancerisks

Was this article helpful?

← Back to Knowledge Base