FlashGenius Logo FlashGenius
2026 CISSP Study Guide — Domain 1

Avoid · Transfer · Mitigate · Accept

The four risk treatment strategies — with ALE/SLE/ARO formulas, risk matrix, control types, and a 10-question scenario quiz modeled on real CISSP exam items.

🔴 Risk Avoidance 🔵 Risk Transference 🟢 Risk Mitigation 🟣 Risk Acceptance 📐 ALE · SLE · ARO Formulas
🧪 Take the 10-Question Quiz →
Overview

The Four Risk Treatment Strategies

Every CISSP risk scenario maps to one of these four responses. Recognizing the signals is the exam skill.

🔴
Risk Avoidance
Eliminate the activity or system that creates the risk entirely. Used when no control can reduce risk to an acceptable level, or benefit doesn't justify exposure.
Discontinue Shut down Don't implement
🔵
Risk Transference
Shift the financial impact to a third party. The risk still exists — you've just moved who pays for it. Legal accountability always stays with the organization.
Insurance SLA contracts Outsourcing
🟢
Risk Mitigation
Reduce the probability or impact through security controls. The most common risk treatment. Cost-effective when ALE(before) − ALE(after) > cost of control.
Firewall MFA Encryption Training
🟣
Risk Acceptance
Formally acknowledge the risk and choose not to act on it — typically because the cost of controls exceeds potential loss, or risk falls below the organization's threshold.
Documented Below threshold CISO sign-off

⚡ Key Risk Terminology at a Glance

Inherent Risk
⚠️
Before Controls
Raw, unmitigated risk
Residual Risk
🔶
After Controls
What remains post-mitigation
Risk Appetite
🎯
Willingness to Accept
Board-level strategic stance
Risk Threshold
🚨
Action Trigger Point
Level that mandates response
💡
The Risk Equation (conceptual): Risk = Threat × Vulnerability × Asset Value. Reducing any one factor reduces overall risk. Avoidance eliminates the asset/activity. Mitigation reduces threat likelihood or impact. Transference shifts the financial impact. Acceptance acknowledges the risk without action.
How It Works

Inside Each Risk Treatment Strategy

Select a strategy to see when to use it, how it works, and key CISSP exam signals.

🔴 Avoidance
🔵 Transference
🟢 Mitigation
🟣 Acceptance

🔴 Risk Avoidance — Eliminate the Activity

Avoidance is not about adding controls — it's about removing the source of the risk entirely. If the business activity creating the risk is eliminated, the risk goes with it.

✅ Use Avoidance When:
• Risk level is unacceptably high
• No controls can reduce risk sufficiently
• Potential loss far exceeds business benefit
• Regulatory/legal exposure is too great
• Reputational damage could be catastrophic
⚠️ Avoidance Has Costs:
• Missed business opportunity
• Competitive disadvantage
• Sunk investment in discontinued projects
• May shift risk elsewhere in the org
• Not always operationally feasible
🎯
CISSP Exam Signal: "The company decided NOT to launch the new internet-facing service," "discontinued the legacy system," "chose not to adopt the technology," "shut down the third-party data sharing program." Any action that removes the activity entirely = Avoidance.

📊 Risk Matrix — When Avoidance is the Answer

Avoidance is typically applied to risks in the top-right zone (critical/high likelihood + high impact).

← LIKELIHOOD →
Low
Medium
High
High
HIGH
Mitigate/Transfer
CRITICAL
🔴 Avoid/Mitigate
CRITICAL
🔴 Avoid
Med
LOW
Accept/Transfer
MEDIUM
Transfer/Mitigate
HIGH
Mitigate/Transfer
Low
MINIMAL
🟣 Accept
LOW
🟣 Accept
MEDIUM
Transfer/Mitigate
↑ IMPACT ↑

🔵 Risk Transference — Shift the Financial Impact

Transference moves the financial consequence of a risk event to a third party — typically an insurer or service provider. The risk itself is not eliminated; someone else now bears the cost if it materializes.

Organization
🏢 Your Company
Still retains:
• Legal accountability
• Regulatory compliance
• Residual risk
• Reputational exposure
→→
Third Party
🛡️ Insurer / Provider
Takes on:
• Financial loss coverage
• Incident response costs
• Legal defense costs
• Business interruption

Common Transference Mechanisms

🛡️ Cyber Insurance
Covers breach costs, ransomware payments, notification expenses, legal fees, business interruption
📄 SLA Contracts
Service Level Agreements with financial penalties if vendor fails — shifts financial impact to provider
☁️ Outsourcing
Offloading a function to a third party who assumes operational and financial risk for that function
🚨
Critical CISSP Exam Trap — What Does NOT Transfer: When you transfer risk via insurance or outsourcing, you transfer the financial burden — NOT legal liability, NOT regulatory accountability, and NOT your obligation to protect customer data. If a cloud provider breaches your customer data, YOU are still legally and regulatorily accountable. This is the most-tested point about transference.

🟢 Risk Mitigation — Reduce Through Controls

Mitigation applies security controls to reduce the likelihood a threat materializes, reduce the impact when it does, or both. Controls are only worth implementing if they're cost-effective.

📐 Quantitative Risk Formulas — ALE Calculation

Asset Value
$500,000
×
Exposure Factor (EF)
0.40 (40%)
=
Single Loss Expectancy (SLE)
$200,000
SLE
$200,000
×
Annual Rate of Occurrence (ARO)
0.25 (1 in 4 yrs)
=
Annualized Loss Expectancy (ALE)
$50,000/yr
ALE Before Control
$50,000
ALE After Control
$10,000
Annual Control Cost
$15,000
=
Net Value of Control
$25,000 ✅
If Net Value > 0 → control is cost-effective. If Net Value < 0 → control costs more than the risk it addresses (consider acceptance instead).

Security Control Categories

All security controls fall into one category and one or more functions.

🖥️ Technical / Logical
Firewalls, IDS/IPS, encryption, MFA, access controls, antivirus, DLP, SIEM
📋 Administrative / Managerial
Policies, procedures, security awareness training, background checks, risk assessments, audits
🏢 Physical / Operational
Locks, guards, badge readers, surveillance cameras, mantraps, fences, environmental controls

Control Functions

FunctionPurposeExamples
PreventiveStops the threat before it occursFirewall, encryption, MFA, least privilege
DetectiveIdentifies that a threat has occurredIDS, audit logs, SIEM, security cameras
CorrectiveRestores systems after an incidentBackups, patch management, incident response
DeterrentDiscourages attackersWarning banners, visible cameras, guards
CompensatingAlternative when primary control is infeasibleManual review when MFA not available
DirectiveMandates or directs behaviorPolicies, procedures, employment contracts

🟣 Risk Acceptance — Acknowledge and Document

Acceptance is a deliberate, documented decision to live with a risk. It is appropriate when the cost of controls exceeds the potential loss, or when risk falls below the organization's risk appetite. It is NOT the same as ignoring risk.

✅ Explicit (Formal) Acceptance
• Written and documented
• Signed by appropriate authority (CISO, executive)
• Includes risk details, rationale, and review date
• Part of the formal risk register
This is the CISSP-correct approach
❌ Implicit (Informal) Acceptance
• No documentation
• No formal decision made
• Risk "forgotten" rather than managed
• No review or expiry date
Poor practice — avoid in exam answers

Risk Appetite · Tolerance · Threshold — The Spectrum

Risk Appetite
Tolerance
Threshold
Accept below here
Monitor closely
Mandatory response
Risk Appetite
The amount of risk an organization is strategically willing to accept. Set by the board. A policy-level statement.
Risk Tolerance
Acceptable variation around the risk appetite. The operational wiggle room before concern is triggered.
Risk Threshold
The specific point at which risk becomes unacceptable and mandatory action is triggered. Non-negotiable line.
🎯
When is acceptance correct? When the ALE of the risk is lower than the annual cost of the control that would address it. Example: a risk with ALE of $200/year where the cheapest control costs $2,000/year → accept and document.
Compare

Side-by-Side Comparison

All four risk treatment strategies across every CISSP-relevant dimension.

Criteria 🔴 Avoidance 🔵 Transference 🟢 Mitigation 🟣 Acceptance
DefinitionBasics Eliminate the activity, system, or process that generates the risk Shift financial burden to a third party via insurance or contract Reduce likelihood or impact through security controls Formally acknowledge and live with the risk without action
Does Risk Disappear?Basics ✅ Yes — source activity removed ❌ No — risk remains; cost is shifted 🔶 Partially — residual risk remains ❌ No — risk acknowledged, not addressed
Cost ImplicationBasics Opportunity cost of not pursuing the activity Ongoing premium or contract cost Capital + operational cost of controls Lowest upfront cost; highest potential loss
Legal AccountabilityBasics ✅ Eliminated with the activity ❌ Stays with organization 🔶 Reduced but not eliminated ❌ Fully retained by organization
Residual RiskBasics None (if activity fully stopped) Yes — org still exposed to non-financial consequences Yes — controls are never 100% effective All of it — no controls applied
Best Used When…When to Use Risk is critical/uncontrollable; no controls are feasible; liability is too great Risk is real but controls alone can't reduce it enough; insurance is affordable Controls are cost-effective (ALE reduction > control cost); risk is significant ALE < cost of controls; risk falls below risk appetite; low-priority risk
Risk Level TypicalWhen to Use Critical / Extreme Medium / High (affordable to insure) Medium / High (controllable) Low / Minimal (below threshold)
Documentation Required?When to Use ✅ Decision rationale ✅ Policy, contract, coverage details ✅ Control implementation records ✅ Formal risk acceptance statement + authority sign-off
CISSP Exam Signal WordsExam Signals "decided not to," "discontinued," "chose not to implement," "shut down," "air-gapped," "will not proceed" "purchased insurance," "SLA with penalties," "outsourced to," "third-party assumed," "cyber liability policy" "installed," "implemented controls," "deployed," "trained employees," "encrypted," "patched," "MFA" "formally accepted," "CISO signed off," "documented in risk register," "cost exceeds benefit," "below threshold"
Common Exam TrapExam Signals Confusing avoidance with mitigation — avoidance removes the activity, not just the risk Thinking transference eliminates accountability — it never does Implementing controls that cost more than the ALE they reduce → use acceptance instead Confusing informal "ignoring" of risk with formal documented acceptance
Real Examples

Risk Treatment in the Real World

Six scenarios directly modeled on CISSP exam question formats.

🔴 Avoidance — Shutting Down an Unprotectable Legacy System
Scenario: A healthcare organization runs a legacy patient billing system from 2004 that processes credit card data. A security assessment concludes that the system cannot be patched, cannot be encrypted, and cannot be isolated enough to meet PCI DSS requirements. The cost of a data breach, regulatory fines, and reputational damage would run into the tens of millions.

Treatment Applied: Risk Avoidance. The organization migrates to a modern cloud-based billing platform and decommissions the legacy system entirely. By eliminating the system, they eliminate the risk it created — not just reduce it.

Key signal: "The system was decommissioned." No controls applied. Activity removed.

CISSP note: Avoidance is often the correct answer when the question states controls cannot adequately address the risk, or when potential losses are catastrophically high relative to the benefit of the activity.
🔵 Transference — Cyber Insurance + Cloud SLA
Scenario: A retail company processes online orders. A ransomware attack could shut down operations for days and cost $2 million in recovery. The CISO has implemented strong controls (MFA, backups, EDR) but some residual financial risk remains.

Treatment Applied: Risk Transference. The company purchases a $3 million cyber liability insurance policy. The policy covers ransomware recovery costs, business interruption losses, and legal fees. Additionally, the company's cloud hosting contract includes SLAs with financial penalties if the provider's infrastructure causes downtime.

What transferred: The financial burden of the residual risk.
What did NOT transfer: The company's GDPR obligations, customer notification duties, and reputational exposure remain 100% the company's responsibility — even if the breach originated at the cloud provider.

CISSP note: This is the canonical transference example. If the exam mentions "insurance" or "contractual liability" — it's transference. But always remember: accountability never transfers.
🟢 Mitigation — ALE-Based Control Decision
Scenario: A financial firm's servers are valued at $1,000,000. An SQL injection vulnerability has an Exposure Factor of 50% (a successful attack destroys half the data's value). The Annualized Rate of Occurrence is 0.5 (expected once every two years).

Calculation:
• SLE = $1,000,000 × 0.50 = $500,000
• ALE (before) = $500,000 × 0.50 = $250,000/year

A Web Application Firewall (WAF) costs $30,000/year and reduces the ARO to 0.05:
• ALE (after) = $500,000 × 0.05 = $25,000/year
• Net value = $250,000 − $25,000 − $30,000 = $195,000 ✅ Cost-effective

Treatment Applied: Risk Mitigation. The WAF is implemented. Residual risk of $25,000/year is formally accepted.

CISSP note: If the question gives ALE values and asks whether to implement a control — calculate the net value. If positive, mitigate. If negative, accept (or re-evaluate the control).
🟣 Acceptance — When Controls Cost More Than the Risk
Scenario: A law firm allows employees to use personal smartphones for work email. An IT assessment finds the risk of data exposure via personal devices has an ALE of $300/year (low probability, low-value data). Implementing a full Mobile Device Management (MDM) solution would cost $8,000/year in licensing and administration.

Calculation: Net value of MDM = $300 − $0 − $8,000 = −$7,700 ❌ Not cost-effective

Treatment Applied: Risk Acceptance. The CISO documents the risk, its ALE, and the cost-benefit analysis. A formal risk acceptance statement is signed by the Managing Partner and recorded in the risk register with an annual review date.

What makes this correct acceptance (not negligence): It is formal, documented, reviewed, and approved by appropriate authority. It will be re-evaluated if circumstances change (e.g., firm starts handling highly sensitive M&A data).

CISSP note: Risk acceptance must ALWAYS be explicit and documented. "We just don't worry about that" is not risk acceptance — it's negligence.
🟢 Mitigation — NIST Risk Management Framework (RMF)
The NIST RMF provides a structured process for managing risk in federal information systems (also widely adopted in private sector).

The seven steps (memorize the order):

1. Prepare — Establish context, roles, and risk management strategy
2. Categorize — Classify the system and data based on impact (FIPS 199)
3. Select — Choose appropriate security controls (NIST SP 800-53)
4. Implement — Apply and document the selected controls
5. Assess — Test controls for effectiveness
6. Authorize — Senior official grants Authority to Operate (ATO) based on residual risk
7. Monitor — Continuously track controls and risk posture

CISSP note: The "Authorize" step is critical — an ATO means a senior official has formally accepted the residual risk. This is the intersection of mitigation (steps 1-5) and acceptance (the ATO decision in step 6).
🔵 Transference vs Avoidance — The Outsourcing Decision
Scenario: A hospital is considering two options for its payroll system: (A) outsource to a SaaS payroll provider who will process all employee data, or (B) shut down payroll processing entirely and use a staffing agency instead.

Option A → Risk Transference. The hospital still runs payroll; the SaaS provider bears operational and financial risk for the system. The hospital retains accountability for employee data under labor laws.

Option B → Risk Avoidance. The hospital exits the payroll processing business entirely. The risk of running a payroll system disappears because the hospital no longer runs one.

Common confusion: Students sometimes call outsourcing "avoidance." It is NOT. Outsourcing transfers risk — the activity still happens, just by someone else. Avoidance eliminates the activity altogether.

CISSP note: "Outsourcing" = Transference. "Discontinuing/not doing" = Avoidance. This distinction is tested directly.
Practice Quiz

10 CISSP-Style Risk Management Questions

Scenario-based items modeled on real exam format. Reasoning required — not memorization.

Question 1 of 10
QUESTION 1
Score: 0/0
0
/ 10
Decision Tool

Which Risk Treatment Strategy?

Answer 3 questions to identify the right approach for any CISSP risk scenario.

Is the risk critically high AND can the activity, system, or process causing it be completely eliminated?
Think: Can you stop doing the thing that creates the risk entirely? Or is this a core business activity that must continue in some form?
🔴
Yes — we can eliminate the activity entirely
Shut down the system, exit the market, discontinue the service
➡️
No — the activity must continue
The business process or system cannot be removed
Can the financial impact be transferred to a third party — and is that sufficient to bring risk to an acceptable level?
Think: Is insurance affordable and adequate? Is a contractual SLA appropriate? Would the residual financial risk be acceptable after transfer?
🔵
Yes — insurance or contract can cover the financial exposure
Cyber insurance, SLA with penalties, outsourcing arrangement
➡️
No — financial transfer isn't enough or isn't applicable
Need to actively reduce the risk, or the risk level doesn't justify controls
Would security controls reduce the risk to an acceptable level at a cost-effective price (ALE reduction > cost of controls)?
Think: Is the net value of implementing controls positive? Or is the risk already below the organization's risk appetite and not worth the control cost?
🟢
Yes — controls are cost-effective and adequate
ALE(before) − ALE(after) > annual cost of control
🟣
No — cost of controls exceeds potential loss, or risk is below appetite
Formally document and accept the risk with appropriate sign-off
Memory Hooks

Mnemonics & Exam Memory Tricks

Click each card to flip and reveal the mnemonic. Built for rapid recall under exam pressure.

🔴
Avoidance
Click to reveal
"Don't Play
the Game"
Avoidance = walk away from the table. If the risk is too high, don't do the activity at all. No activity = no risk.
🔵
Transference
Click to reveal
"Pass the Bill —
Not the Blame"
Transfer shifts MONEY, not accountability. Insurance pays the bill. YOU still answer to regulators and customers.
🟢
Mitigation
Click to reveal
"Build the
Wall — Check
the Math"
Mitigation = controls. But always check: ALE(before) − ALE(after) − control cost. If negative, don't bother — accept instead.
🟣
Acceptance
Click to reveal
"Sign It,
File It,
Review It"
Acceptance must be FORMAL: documented, signed by authority, stored in the risk register, with a review date. Never informal.

📐 ALE Formula Cheat Sheet

Four formulas. Memorize the order. AV → EF → SLE → ARO → ALE → control value.

FormulaStands ForWhat It Means
AV × EF = SLEAsset Value × Exposure Factor = Single Loss ExpectancyHow much ONE incident costs. EF is the % of asset lost (0–100%).
SLE × ARO = ALESingle Loss Expectancy × Annualized Rate of OccurrenceExpected annual cost of the risk. ARO = 0.25 means once per 4 years.
ALE(b) − ALE(a) − Cost = ValueALE Before − ALE After − Annual Control CostNet benefit of implementing a control. If positive → implement. If negative → accept.
Total Risk − Controls = Residual RiskConceptual formulaThe risk remaining after all controls are applied. Must be formally accepted.

🎯 The Ultimate Risk Management Exam Cheat Sheet

If the question says…Think…Answer
"decided not to," "shut down," "discontinued," "will not implement," "air-gapped and removed"🔴 Removed the activity entirelyRisk Avoidance
"purchased insurance," "SLA with penalties," "outsourced to provider," "third-party contract"🔵 Shifted the financial burdenRisk Transference
"installed firewall," "deployed MFA," "implemented patch management," "security awareness training"🟢 Applied controls to reduce riskRisk Mitigation
"CISO signed off," "documented in risk register," "cost of control exceeds ALE," "formally accepted"🟣 Acknowledged and filedRisk Acceptance
"outsourced but still accountable" → what is true?🔵 Transfer ≠ accountability transferOrg retains legal liability
"risk remaining after controls" = ?All controls leave some riskResidual Risk
🚨
The Three Most-Failed Risk Management Questions:

1. Outsourcing = Transference, not Avoidance. The activity still happens — someone else does it. Avoidance means the activity stops entirely.

2. Transference does NOT eliminate accountability. You can insure against a breach, but you still answer to regulators, customers, and the law. This is tested constantly.

3. Informal risk acceptance is NOT acceptable. In CISSP, "we just don't worry about it" is negligence, not risk acceptance. Proper acceptance must be documented, signed by an authorized executive, and reviewed periodically.
🎓 CISSP Exam Prep Platform

Ready to Pass the CISSP?
Get Everything You Need in One Place.

These infographics are just the start. FlashGenius gives you a complete CISSP prep toolkit — practice tests, flashcard decks, cheat sheets, and domain quizzes built for how security professionals actually learn.

🎯 Practice Tests
🃏 Flashcard Decks
📄 Cheat Sheets
📊 Domain Quizzes
🧠 Memory Hooks
📚 Study Guides
🚀 Start Free on FlashGenius View All CISSP Resources →
Free to register · No credit card required · Trusted by CISSP candidates