GV.RM-02 requires organizations to risk appetite and risk tolerance statements are determined, communicated and used to guide operational cybersecurity decisions. This NIST CSF 2.0 control falls under the Govern (GV) function and the Risk Management Strategy category. Use this checklist to verify implementation and prepare evidence for auditors.
Control Details
- Control ID
- GV.RM-02
- Title
- Risk Appetite Statements
- Function
- Govern (GV)
- Category
- Risk Management Strategy
- Framework
- NIST CSF 2.0
Risk appetite and risk tolerance statements are determined, communicated and used to guide operational cybersecurity decisions.
Risk appetite and risk tolerance statements are determined, communicated and used to guide operational cybersecurity decisions. These statements set boundaries for acceptable risk levels across the organization.
Why This Matters
Ambiguous risk appetite leads to inconsistent decisions about which vulnerabilities to remediate and which controls to implement. Teams need clear guardrails to make autonomous risk decisions.
Implementation Checklist
Use this checklist to verify your organization meets the requirements of GV.RM-02.
Evidence an Auditor Expects
Prepare the following documentation and artifacts to demonstrate compliance with GV.RM-02 during an audit.
- Published risk appetite statements per business unit
- Vendor risk assessment templates referencing organizational risk appetite
- Decision logs showing risk appetite was consulted during risk acceptance
- Change records showing updates to risk appetite after incidents
Common Gaps We Find
Based on our penetration testing and risk assessment engagements, these are the gaps organizations most frequently have with GV.RM-02.
- Risk appetite statements are generic and not actionable for day-to-day decisions
- Vendor and procurement teams operate without reference to risk tolerance
- Risk appetite is documented once and never revisited
FAQ
What does GV.RM-02 require?
How do I prove compliance with GV.RM-02?
Need Help Meeting NIST CSF 2.0 Requirements?
Our penetration testing and risk assessments map directly to NIST CSF 2.0 controls. Sherlock Forensics identifies gaps in your compliance posture and provides actionable remediation guidance.
Get a Compliance Assessment