Part 5.3 of 6

AI Risk Assessment Methodology

📚 2-2.5 hours🎯 Intermediate📅 Updated January 2026

Risk Assessment Process Overview

AI risk assessment is a systematic process to identify, analyze, evaluate, and treat risks associated with AI systems. It forms the core of the NIST AI RMF's Map and Measure functions and supports ISO 42001 requirements.

💡 Continuous Process

AI risk assessment is not a one-time activity. It must be conducted initially during development, updated at deployment, and repeated periodically throughout the AI system lifecycle as the system, data, and context evolve.

Step 1: Risk Identification

1
Identify AI-Related Risks

Systematically identify all potential risks that could arise from the AI system throughout its lifecycle.

Identification Techniques

  • Threat Modeling: Analyze potential attack vectors and misuse scenarios
  • Failure Mode Analysis: Consider how the AI system could fail technically
  • Stakeholder Analysis: Identify impacts on different affected groups
  • Regulatory Mapping: Map compliance requirements to potential violations
  • Historical Analysis: Review incidents from similar AI systems
  • Expert Elicitation: Gather input from domain and technical experts
  • Red Teaming: Adversarial testing to discover vulnerabilities

Documentation Requirements

For each identified risk, document:

  • Risk description and category (technical, operational, legal, etc.)
  • Potential causes and contributing factors
  • Affected stakeholders and assets
  • Current controls or mitigations in place
  • Risk owner (accountable individual)

Step 2: Likelihood Assessment

2
Estimate Probability of Occurrence

Assess the likelihood that each identified risk will materialize.

Likelihood Factors to Consider

  • Technical Maturity: How proven and stable is the AI technology?
  • Data Quality: How reliable and representative is the training data?
  • Deployment Context: How controlled is the operational environment?
  • User Population: How sophisticated and diverse are the users?
  • Threat Landscape: How attractive is the system to malicious actors?
  • Control Effectiveness: How effective are existing safeguards?

Likelihood Scale

LevelDescriptionFrequency
1 - RareExceptional circumstances onlyLess than once per 5 years
2 - UnlikelyCould occur but not expectedOnce every 2-5 years
3 - PossibleMight occur at some timeOnce every 1-2 years
4 - LikelyWill probably occurSeveral times per year
5 - Almost CertainExpected to occur regularlyMonthly or more frequent

Step 3: Impact Assessment

3
Evaluate Potential Consequences

Assess the severity of impact if the risk materializes across multiple dimensions.

Impact Dimensions

  • Human Impact: Physical safety, mental health, autonomy, dignity
  • Rights Impact: Privacy, equality, freedom of expression, due process
  • Financial Impact: Direct costs, fines, lost revenue, remediation
  • Operational Impact: Business disruption, process failures
  • Reputational Impact: Brand damage, stakeholder trust
  • Strategic Impact: Market position, competitive advantage

Impact Scale

LevelDescriptionExample
1 - InsignificantMinimal impact, easily absorbedMinor inconvenience to users
2 - MinorLimited impact, manageableTemporary service degradation
3 - ModerateSignificant impact requiring responseCustomer complaints, minor regulatory attention
4 - MajorSerious impact threatening objectivesRegulatory investigation, significant financial loss
5 - CatastrophicSevere impact threatening viabilityLoss of life, existential business threat

Step 4: Risk Evaluation

4
Determine Risk Rating

Combine likelihood and impact assessments to determine overall risk level and prioritization.

Risk Matrix

Insignificant
Minor
Moderate
Major
Catastrophic
Almost Certain
Medium
High
High
Critical
Critical
Likely
Low
Medium
High
High
Critical
Possible
Low
Medium
Medium
High
High
Unlikely
Low
Low
Medium
Medium
High
Rare
Low
Low
Low
Medium
Medium

Step 5: Risk Treatment

5
Select and Implement Treatment Options

Choose and implement appropriate strategies to address identified risks.

Treatment Options

🚫
Avoid
Eliminate risk by not proceeding with activity
📉
Mitigate
Reduce likelihood or impact through controls
🔁
Transfer
Share risk through insurance or contracts
Accept
Accept residual risk within tolerance

AI-Specific Mitigation Controls

  • Technical: Bias testing, robustness testing, uncertainty quantification, adversarial training
  • Process: Human-in-the-loop, staged rollout, A/B testing, canary deployments
  • Governance: Ethics review, risk committee approval, independent audit
  • Monitoring: Performance tracking, drift detection, feedback loops

📚 Key Takeaways

  • AI risk assessment follows five steps: identification, likelihood, impact, evaluation, and treatment
  • Multiple techniques should be used for risk identification including threat modeling, failure analysis, and red teaming
  • Likelihood assessment considers technical maturity, data quality, deployment context, and threat landscape
  • Impact assessment covers multiple dimensions: human, rights, financial, operational, reputational, strategic
  • Risk matrix combines likelihood and impact to prioritize risks as Low, Medium, High, or Critical
  • Treatment options include avoid, mitigate, transfer, and accept - with AI-specific controls for each