Virtus Group logo

Cloud Risk Assessment (CRA) — Template

GCDO-aligned • v1.1
Contents: Document control • Service Overview • Data & Residency • Threat Model • Controls Mapping • Risk Register • Privacy & DPIA • Supplier Due Diligence • Testing & Assurance • Residual Risk & Approvals • Appendices

Document control

Project / ServiceVersion / datev1.1 / 25 Sep 2025
Prepared byReviewed by
Stakeholders
DistributionClient/ProjectConfidentialityInternal/Client

Service Overview

Describe the service, business purpose, data types, data volumes, key user groups, and links to architecture diagrams.

Provider / Product
Business purpose
Data typese.g., contact info, logs, telemetry; mark if any sensitive/PII/PDF.
Users / roles
ArchitectureLink to diagram / reference architecture

Data & Residency

Residency / hosting regionse.g., NZ/AU/EU/US — specify services/regions
Backups & immutabilityControls, frequency, retention; restore test cadence
EncryptionIn transit / at rest (algorithms if known), key management
Access controlsMFA, RBAC/least privilege, break‑glass, audit
Logging & monitoringWhat’s logged, retention, SIEM/XDR integration
Retention & disposalPolicy period, disposal workflow and evidence

Threat Model (summary)

Identity compromise (phish/OAuth) Misconfiguration / key leakage Data breach / oversharing Ransomware / destructive change Availability / DDoS Insider misuse Supplier failure

Customise per service. Include OT/edge considerations where relevant.

Controls Mapping

DomainKey controlsEvidence / references
Identity & AccessMFA; Conditional Access; Just‑in‑Time; least privilegeEntra CA policy IDs; break‑glass runbook
Data ProtectionEncryption; DLP/labels; data minimisationRetention schedule; DLP policy IDs
Logging & MonitoringCentralised logs; alerting; time syncSIEM rules; retention config
Backup & DRImmutability; restore tests; RTO/RPOTest reports; DR plan link
Change & ConfigIaC/guardrails; change approvals; golden configsCAB records; config baselines
PrivacyDSR workflow; breach thresholds; cross‑border assessmentPrivacy Op. Summary; OPC cues

Risk Register

Score each risk using Impact × Likelihood (5×5). Add treatments and owners; determine residual risk.

IDRiskThreat/ExploitImpactLikelihoodRatingTreatment / MitigationsOwnerTarget dateStatus
R‑0011–51–5Open
Rating guide: 1=Low … 5=Critical. High (≥15) requires executive review and tracked treatment.

Privacy & DPIA

DPIA required?Yes/No — triggers: high‑risk processing, cross‑border, special categories, large‑scale monitoring
DSR handlingPoint to DSR process; identity verification steps
Breach thresholds“Likely to cause serious harm” → notify OPC / individuals as appropriate

Supplier Due Diligence

Security postureCertifications/attestations; audits; breach history
Contractual termsConfidentiality; incident notice SLAs; sub‑processor flow‑downs; right to audit
Location & transfersRegions; transfer mechanisms; supplementary measures

Testing & Assurance

Penetration / security testsDates and scope; summary results
Restore testsDates, scope, RTO/RPO achieved
Control validationsSampled evidence; log retention checks

Residual Risk & Approvals

Residual risk summaryLow/Medium/High with rationale
ApprovalsProject Owner • Security • Privacy • Executive

Appendices