Essex Junction, VT  |  Montebello, NY 802-335-2662  |  dkoran@davidkoran.com
CMMC Level 2 • Domain Reference

The Risk Assessment Domain: the analytical foundation of the compliance program

Three requirements define how risk is assessed, how vulnerabilities are discovered, and how findings are remediated. The domain is small, but its output prioritizes every other control decision and turns the compliance program into a living posture rather than a static document.

3 Controls   •   14 Domains   •   RA.3.11.1 through RA.3.11.3

What the Risk Assessment Domain Is For

The Risk Assessment domain establishes the analytical framework through which the contractor understands what the environment is exposed to and decides what to do about it. Its three requirements move through a logical sequence: assess the risk, scan for vulnerabilities that inform the risk picture, and remediate vulnerabilities based on the risk they represent. The output of the domain is the prioritization that shapes investment, attention, and operational focus across every other domain in the framework.

The practitioner reading of RA is that it converts the compliance program from a static checklist into an adaptive posture. Without RA, every control is equally important and every vulnerability receives equal treatment, which means in practice that the most visible issues receive attention and the rest accumulate. With RA, controls and vulnerabilities are weighted by their actual risk to the organization, and remediation effort flows where it produces the most value. The compliance evidence improves because the program can demonstrate that decisions were made based on understood risk rather than on convenience or availability.

For defense contractors preparing for CMMC Level 2 assessment, the RA domain is also where the SSP connects to operational reality. The GAO identified incomplete System Security Plans as a primary driver of CMMC readiness failures, and a weak RA foundation is the most common reason SSPs fail to reflect the contractor's actual environment. The CMMC Phase 1 Realities white paper examines this relationship in depth, including the connection between risk documentation and SPRS score integrity.

Without Risk Assessment, every control is equally important and every vulnerability receives equal treatment. In practice, this means the most visible issues receive attention and the rest accumulate. The domain converts the compliance program from a checklist into a prioritized operational posture.

The Three Controls

RA.L2-3.11.1Risk Assessments

Risk to organizational operations, organizational assets, and individuals must be periodically assessed, resulting from the operation of organizational systems and the associated processing, storage, or transmission of CUI. The control has three assessable components. The first is the scope of the assessment, which must cover the systems and processes that handle CUI. The second is the methodology, which must be documented and repeatable rather than ad hoc. The third is the cadence, which must be periodic rather than one-time, with defined triggers that call for reassessment when the environment changes materially. Risk assessment findings feed directly into the SSP and into the prioritization of remediation work under 3.11.3. An assessment document from two years ago that does not reflect the current environment does not satisfy the periodic obligation.

View the RA.3.11.1 reference card →

RA.L2-3.11.2Vulnerability Scan

Vulnerabilities in organizational systems and applications must be scanned for periodically and when new vulnerabilities affecting those systems and applications are identified. The control requires both scheduled scanning on a defined cadence and event-driven scanning when new threats emerge. The scan scope must cover the systems in the CMMC assessment boundary, including endpoints, servers, network infrastructure, and applications. Authenticated scans produce substantially more accurate results than unauthenticated scans because they can verify the patch and configuration state from inside the system, and the assessable evidence increasingly expects authenticated scanning where it is technically feasible. Findings from scanning feed directly into the remediation work under 3.11.3.

View the RA.3.11.2 reference card →

RA.L2-3.11.3Vulnerability Remediation

Vulnerabilities must be remediated in accordance with risk assessments. The control requires that remediation is driven by risk, not by CVSS score alone or by remediation convenience. A vulnerability with a high CVSS rating on a system that does not handle CUI and is well-isolated may represent lower organizational risk than a medium-rated vulnerability on a system at the center of CUI flow. The RA.3.11.1 risk assessment provides the context that determines which vulnerabilities matter most, and the 3.11.3 remediation work prioritizes accordingly. The assessable evidence includes documented remediation decisions, the service level commitments that define how quickly vulnerabilities at each risk level must be addressed, and records of actual remediation against those commitments.

View the RA.3.11.3 reference card →

Where Risk Assessment Intersects with Other Domains

Risk Assessment is one of the most referenced domains in the framework because its output informs prioritization across nearly every other control area.

Configuration Management depends on RA for the security impact analysis required under CM.3.4.4. The analysis of each change against its security consequences cannot be separated from the risk picture that RA establishes. A change that would be low-risk against one risk profile may be significant against another, and the distinction originates in RA.

System and Information Integrity consumes RA output directly. Vulnerability scanning under RA.3.11.2 feeds into SI monitoring, and the remediation prioritization under RA.3.11.3 shapes the response to SI findings. The two domains operate as a coordinated cycle where RA identifies what matters and SI watches for changes in the environment that affect the picture.

Security Assessment depends on RA as its analytical foundation. The assessment of control effectiveness under CA cannot proceed without understanding the risk each control is meant to address, which is RA output. CA findings feed back into RA, updating the risk picture and triggering reassessment under RA.3.11.1.

Incident Response uses RA output to contextualize incidents. A security event that affects a high-risk asset receives different response than the same event affecting a low-risk asset. The risk weighting comes from RA, and the response prioritization inherits that weighting.

Audit and Accountability supports RA through the data it produces. Audit records identify patterns of activity that inform the risk picture, and the review obligation under AU.3.3.3 naturally feeds updates to RA.3.11.1 when the review surfaces concerns.

Access Control decisions should reflect the risk picture RA establishes. Least privilege, separation of duties, and remote access policies all benefit from risk-informed design rather than from uniform application. The AC domain is often where RA output most visibly translates into operational practice.

Common Implementation Pitfalls

Several patterns come up repeatedly in Risk Assessment readiness work.

Risk assessment as a one-time document that sits on a shelf. The organization produces a risk assessment early in the compliance program and then does not update it. When the assessment is two years old and describes an environment that has since changed significantly, the 3.11.1 periodic obligation is not satisfied and the downstream controls that depend on RA output operate against stale data. The remediation is a scheduled review cycle with defined triggers for interim updates.

Vulnerability scanning without remediation. The scans run on schedule, produce reports, and the reports accumulate. No remediation work follows because the findings volume exceeds the team's capacity or because there is no defined process for acting on the output. The 3.11.3 control requires remediation in accordance with risk, which presumes a functioning workflow from scan result to remediation decision.

Remediation prioritized by CVSS score alone. The vulnerability management program treats CVSS ratings as the sole prioritization input, patching high-severity issues first regardless of whether the affected systems are in scope or handle CUI. The 3.11.3 standard is remediation in accordance with risk, which includes the organizational context that CVSS alone cannot capture. The remediation is a risk-scoring approach that combines CVSS with asset criticality and exposure.

Scan scope that does not cover the full environment. The scanning program covers servers in the data center but not endpoints, or covers traditional systems but not cloud services, or omits specialized assets that do not respond well to standard scanning tools. The 3.11.2 requirement applies to the full CMMC assessment scope, and gaps in scan coverage produce gaps in the risk picture.

Unauthenticated scans treated as sufficient. The scan tool runs against systems from the outside and produces results based on what is visible externally. Authenticated scanning, where the tool logs in and verifies the internal state, produces substantially more accurate results but requires more setup. Unauthenticated scanning misses configuration issues, missing patches that are not externally visible, and vulnerabilities in software that responds differently to authenticated queries.

Remediation service level commitments undefined or unenforced. The organization performs remediation, but the timeline is ad hoc. High-severity vulnerabilities linger for weeks or months because there is no defined expectation for how quickly remediation should occur. Documented SLAs by risk level, and measurement against those SLAs, produce the discipline that 3.11.3 expects.

Risk assessment that does not inform the SSP. The risk assessment exists as a standalone document that is not referenced by the SSP or by any operational planning. The controls described in the SSP do not trace back to the risks the RA identified. The GAO has identified this disconnect as a primary cause of SSP deficiencies that drive CMMC readiness failures.

Where to Start

For an organization new to the RA domain, the first work is the scoping exercise.

The foundational deliverable is a defined scope for risk assessment that matches the CMMC assessment boundary. The risk assessment must cover the systems, processes, and data flows that handle CUI, and it must be bounded clearly enough that coverage gaps can be identified. Without a defined scope, subsequent assessments cannot be compared against one another, and the periodic obligation under 3.11.1 becomes difficult to evidence.

The second deliverable is the vulnerability management workflow. How scans are scheduled, who reviews findings, how findings are prioritized against the risk picture, and how remediation is tracked to completion. The workflow is the operational discipline that 3.11.2 and 3.11.3 together require.

The third deliverable is the integration between risk assessment output and the SSP. The controls described in the SSP should trace to risks the organization has identified, and the risk picture should reflect the assessment evidence that the SSP claims. This integration is the mechanism through which RA output actually shapes the compliance program rather than sitting in a parallel document.

With the scope, vulnerability workflow, and SSP integration in place, the RA domain becomes an ongoing operational cycle rather than a documentation exercise. The controls are few, but the analytical discipline they require is what converts the compliance program from a static snapshot into an adaptive posture.

DWK

David W. Koran

CyberAB Registered Practitioner Advanced

Founder of a CMMC consulting practice serving Defense Industrial Base contractors and the legal counsel who support them, with a focus on readiness, enablement, and implementation. Associate Member of the American Bar Association Section of Public Contract Law. Author of The CMMC Decision, now in its second edition.

dkoran@davidkoran.com  •  (802) 335-2662

Control Reference Quick Index

All 3 Risk Assessment requirements

All 14 CMMC Level 2 Domains

Browse any domain reference page for practitioner commentary and individual control cards