Overview

The risk library is a curated catalog of common information security risks organized by category, framework, and industry. Instead of starting from scratch, you can browse the library and add relevant risks to your registers with pre-populated descriptions, suggested scores, and framework references.

Library vs. Custom Risks

LowerPlane distinguishes between two risk sources:
SourceDescription
LibraryPre-built risks from the LowerPlane risk catalog with industry-standard descriptions and scoring suggestions
CustomRisks created directly in your registers, tailored to your specific environment
Library risks serve as starting points. When you add a library risk to your register, it is copied and can be fully customized — the original library entry is not affected.

Browsing the Library

Navigate to Risk > Risk Library to access the catalog. The library provides:
  • Search — find risks by title, description, or keywords
  • Category filter — filter by risk category (Data Privacy, Endpoint Security, Infrastructure, etc.)
  • Framework filter — filter by applicable compliance framework (50+ frameworks available)
  • Favorites — bookmark frequently used risks for quick access

Risk Template Properties

Each library entry includes:
FieldDescription
TitleConcise name of the risk
DescriptionDetailed explanation of the risk scenario, threat actors, and potential consequences
CategoryRisk category classification
FrameworkApplicable compliance frameworks
IndustryIndustries where this risk is most relevant
LikelihoodSuggested likelihood score (1-5)
ImpactSuggested impact score (1-5)
Risk ScoreCalculated score (likelihood x impact)
CIA CategoryConfidentiality, Integrity, or Availability classification
ControlsSuggested controls for mitigation
MitigationRecommended mitigation strategy
ReferencesExternal references and standards

Adding Library Risks to Your Register

1

Browse and Select

Navigate to the risk library and find the risk you want to add. Use search and filters to narrow the catalog.
2

Click Add to Register

Click the Add to Register button on the risk template.
3

Select Target Register

Choose which risk register should receive the risk. If you have multiple registers, select the most appropriate one.
4

Customize

The risk is added to your register with the library’s suggested values pre-populated. Customize the title, description, scores, treatment, and owner to match your specific environment.
Library risks provide suggested scores based on industry averages. Always review and adjust the likelihood and impact scores to reflect your organization’s specific context, controls, and environment.

Risk Categories in the Library

The library covers risks across all major information security domains:

AI & Machine Learning

Model poisoning, training data leakage, adversarial attacks, bias in decision systems.

Data Privacy

Unauthorized access, consent violations, data subject request failures, cross-border transfer issues.

Data Protection

Encryption failures, backup gaps, data loss, retention policy violations.

Endpoint Security

Malware infections, unpatched systems, stolen devices, unauthorized software.

Identity & Access

Credential compromise, privilege escalation, orphaned accounts, weak authentication.

Infrastructure

Server outages, configuration drift, capacity exhaustion, single points of failure.

Network & Perimeter

DDoS attacks, firewall misconfiguration, unauthorized network access, DNS hijacking.

SDLC & DevOps

Insecure code, supply chain attacks, secrets in repositories, deployment failures.

Vendor Management

Third-party breach, vendor non-compliance, subprocessor risk, contract gaps.

Framework Coverage

Library risks are tagged with the compliance frameworks they relate to:
FrameworkCoverage
ISO 27001Risks mapped to Annex A controls
SOC 2Risks mapped to Trust Services Criteria
HIPAARisks specific to healthcare and PHI protection
GDPRRisks related to data protection and privacy rights
PCI-DSSRisks involving payment card data and cardholder environments

Creating Custom Templates

If the pre-built library does not include a risk specific to your environment, you can create custom risk templates.
1

Navigate to Risk Library

Go to Risk > Risk Library.
2

Click Create Custom Risk

Click the Create Custom button to open the template form.
3

Define the Template

Fill in all template fields: title, description, category, framework mappings, industry tags, suggested scores, CIA category, and mitigation guidance.
4

Save

Save the custom template. It appears in the library alongside the pre-built risks, marked with a “Custom” indicator.

Editing and Deleting Custom Templates

Custom templates can be edited or deleted at any time. Editing a custom template does not affect risks that were previously added to registers from that template — the register copy is independent.
Pre-built library risks cannot be edited or deleted. Only custom templates support modification.

Usage Tracking

The library tracks how many times each risk template has been added to registers across your organization. This usage count helps identify which risks are most commonly relevant and can guide your risk assessment priorities.

Favorites

Mark frequently used risk templates as favorites for quick access. Favorites appear at the top of the library when the favorites filter is enabled.

Importing and Exporting

  • Import — upload risk templates from a CSV file to bulk-populate your custom library
  • Export — download the library (or filtered subset) as a CSV for offline review or sharing with stakeholders

Best Practices

  • Start with the library when building a new risk register — it provides a solid foundation of industry-standard risks
  • Customize every added risk to reflect your specific context — generic descriptions and scores are less useful to auditors
  • Create custom templates for risks unique to your industry, technology stack, or business model
  • Review the library quarterly — LowerPlane may add new risks based on emerging threats
  • Use framework filters when building a framework-specific risk register (e.g., filter by HIPAA when building a healthcare risk register)
  • Favorite your most relevant risks to speed up future risk assessments
  • Track usage counts to understand which risks are most prevalent across your organization