How to Use the Risk Register

How to Use the Risk Register

Prerequisites

  • Access to the Risk Register section
  • Understanding of your organization's risk landscape

  • Accessing the Risk Register

    Navigation: Sidebar → Risk Register
  • Click Risk Register in the sidebar.
  • The risk list page loads showing all risks with search, sort, and filter options.

  • Creating a New Risk

  • Click the Add Risk button.
  • Fill in the risk details:
  • Risk Name — descriptive name
  • Description — detailed risk description
  • Assignee — user responsible for this risk
  • Due Date — target resolution date
  • Tags — optional categorization
  • Click Submit to create the risk.

  • Risk Lifecycle (4-Step Workflow)

    Click on a risk to open the Risk Management page with a 4-step stepper:

    Step 1: Risk Initiation

  • Review and confirm risk details (name, description, owner, due date).
  • Add additional context or documentation.
  • Step 2: Risk Scoring

  • Evaluate likelihood and impact.
  • The system calculates a combined risk score.
  • The score determines priority and severity.
  • Step 3: Risk Management

  • Define the treatment strategy (mitigate, accept, transfer, avoid).
  • Upload risk evidence documenting treatment actions.
  • Link related assets or controls.
  • Step 4: Risk Closure

  • Document the resolution summary.
  • Confirm closure to complete the lifecycle.
  • Closed risks are retained for historical reference.

  • Filtering and Searching

    FilterOptions
    SearchFind risks by name
    Treatment StatusPending, Planning, In Progress, On Hold, Resolved, Accepted, Closed
    SortBy date, severity, or status

    Troubleshooting

    IssueSolution
    Cannot create a riskVerify your role has Risk Create permission.
    Cannot proceed to next stepComplete all required fields in the current step.
    Evidence upload failsCheck file format and size limits.
    Risk score not calculatingEnter both likelihood and impact values in the Scoring step.

      • Related Articles

      • How to View Proactive Risk Insights

        Prerequisites At least one integration connected and syncing data Access to the Dashboard and ZIN Copilot How Proactive Insights Work ZIN continuously analyzes: Data Source What ZIN Looks For Integrations New vulnerabilities, configuration changes, ...
      • How to Use the ZIN AI Copilot

        Prerequisites Access to the ZIN Copilot section At least one integration connected (for data-driven responses) Accessing the ZIN Copilot Navigation: Sidebar → ZIN Copilot Click ZIN Copilot in the sidebar. The chat interface opens with a message input ...
      • How to Use One-Click Remediation

        Prerequisites A security finding or vulnerability that needs remediation Access to ZIN Copilot Appropriate access to the target systems (for executing commands) How One-Click Remediation Works ZIN identifies a security issue (from integrations, ...
      • How to View the Posture Dashboard

        Prerequisites Access to the Dashboard section At least one integration connected and syncing Accessing the Posture Dashboard Navigation: Sidebar → Dashboard Click Dashboard in the sidebar. The Posture Dashboard loads with all available widgets and ...
      • Getting Started with Interno

        Prerequisites Before you begin, ensure you have: An active Zeron account with Interno access Admin or Security Analyst role assigned to your profile At least one security tool/integration ready to connect (e.g., Microsoft Defender, CrowdStrike, AWS) ...