Risk assessment made simple
Follow the ENISA methodology to evaluate breach severity. Select the data type, choose scores, and capture your reasoning. Then download a polished PDF report. See the ENISA report for full guidance.
Data Processing Context (DPC)
DPC represents the type of data involved in the breach.
| Score | Description |
|---|
Ease of Identification (EI)
How easily an individual can be identified from the breached data.
| Score | Description |
|---|
Loss of Confidentiality
This evaluates the extent of data disclosure.
| Score | Description |
|---|
Loss of Integrity
This measures if and how the data has been altered.
| Score | Description |
|---|
Loss of Availability
This examines whether data can be accessed when needed.
| Score | Description |
|---|
Malicious Intent
This evaluates whether the breach was accidental or intentional.
| Score | Description |
|---|
Risk Summary
| Criterion | Score | Description | Comment |
|---|