Risk Register

Risk Register #

This page lists the mapping of risks to controls in our software process

  • Environment Breach
  • Description: External attacker running workloads in our system
  • Mitigations:
    • workload_monitoring:
  • Insider Threat
  • Description: Someone inside the company acts against the best intests
  • Mitigations:
    • code_review:
    • deployment_approvals:
    • workload_monitoring:


© Kosli 2023, all rights reserved
CCPA Do not sell my info