Skip to content

Project Risks

Project risks represent the concrete risk profile of a specific project scope. They are project-specific instances of your organization taxonomy.

Where in Modulos

Project risks live under Project → Risks. This is where teams:

  • add risks from the organization taxonomy into a project scope
  • select which threat vectors matter in this deployment context
  • quantify risk threats and monitor rollups against limits

For the full operating model, see Operating Model.

Permissions

  • Project Editor can create and update project risks and threat selections.
  • Project Owner can also start quantification runs.
  • Project Reviewer and Auditor can view risks and results for review and audit.
Project Risks list view showing project risk value, status counts, and a table of risks with threat vectors.
Project Risks shows the risk list, threat-vector coverage, and the quantification status rollup in one place. UI shown in light mode.
  1. 1
    Budget guardrail
    Warnings appear when project limits do not add up consistently.
  2. 2
    Project risk value
    See total quantified exposure and how it compares to the project limit.
  3. 3
    Status rollup
    Quantified, in progress, and unquantified threats roll up to the project view.
  4. 4
    Risk list
    Each risk shows its limit, current value, and associated threat vectors.

How it works

Project risk is taxonomy-driven:

  • you add an organization-defined risk into a project
  • you select threat vectors that are relevant in this deployment context
  • Modulos creates risk threats in the project that reference the taxonomy threat vectors
  • you run quantification per threat to produce monetary outputs

The project risk’s total value is the sum of its threat values, and its status is derived from threat quantification status.

Risk threats

A risk threat is a project-level instance of a taxonomy threat vector:

  • it copies the threat vector’s name and description into the project context
  • it is quantified independently
  • it rolls up into the project risk total

Consistency

You can only add a given taxonomy risk once per project. This keeps reporting consistent and avoids duplicate counting.

Selecting threat vectors

When adding a risk, you must select at least one threat vector. The available threat vectors come from the taxonomy risk’s associated threat vectors.

If the right threat vector is missing, update the organization taxonomy first.

How to use it

1

Add risks to the project

Select the relevant taxonomy risks for the system scope

2

Select threat vectors

Pick the concrete pathways that matter in this deployment context

3

Quantify the top threats

Run quantification to produce a monetary value per threat

4

Treat and re-quantify

Invest in mitigations, then re-run as the system changes

Status and rollups

In the platform model:

  • each risk threat gets its status from the latest quantification run: unquantified, in progress, quantified, failed
  • a project risk is unquantified when all its risk threats are unquantified, quantified when all are quantified, and in progress otherwise

Only quantified risk threats contribute monetary value to rollups. This prevents “half-finished” work from being mistaken for a final number.

Quantification is asynchronous. After you start a run, the threat moves to “in progress” and updates to “quantified” once the run finishes.

Important considerations

Limits turn quantification into governance.

At a high level:

  • each project has a total monetary risk limit
  • each category has a share of that limit
  • within a category, individual project risk limits are distributed across risks and can be overridden

If limits do not add up consistently, Modulos blocks quantification until configuration is corrected.

Manual overrides

If you override individual risk limits within a category, treat it as explicit budgeting across that category. The sum of individual risk limits should match the project’s category budget.

Build vs buy and risk ownership

Risk quantification depends on what you can observe and control.

  • If you build the system, you are effectively both provider and deployer. You can quantify and mitigate both model-level and deployment-level threats with high fidelity.
  • If you buy the system, you are the deployer. You often lack access to training data, model internals, and evaluation artifacts. Your strongest quantification leverage is usually in the deployment context: integration, usage patterns, monitoring, and incident response.

For vendor-provided systems, demand enough documentation to make quantification defensible: known failure modes, evaluation artifacts, and operational constraints.