Illustration of a risk register document showing columns for Risk ID, Description, Likelihood, Impact, and Mitigation, with icons representing risk identification and mitigation planning

What Is a Risk Register? Definition, Elements, and How to Create One

Updated on 13 Mar 2026 | 24 min read

Quick Answer

A risk register is a structured document used to identify, record, analyse, and manage risks throughout a project or business process. It typically includes the risk description, category, likelihood, potential impact, a calculated risk score, the assigned owner, and the mitigation plan. Risk registers are created at the start of a project and updated continuously throughout its lifecycle to ensure proactive management.

Introduction

Every project faces uncertainty. Deadlines can slip, budgets can overrun, team members can leave, and external factors can change without warning. A risk register is the tool that helps project managers, business analysts, and teams get ahead of these uncertainties before they become problems.

This guide covers what a risk register is, what it should include, how to create one step by step, and how it differs from similar tools like a risk log and a risk assessment. You will also find a practical example of what a risk register looks like in use on a real business analysis project.

In This Article

What Is a Risk Register? Definition and Purpose

A risk register is a living document that records all identified risks for a project or organisation, along with information about each risk’s likelihood, potential impact, and the actions being taken to manage it. It is sometimes called a risk log, a risk tracker, or a risk repository.

The primary purpose of a risk register is to give the project team and stakeholders a single, up-to-date view of all known risks. Rather than responding to problems after they occur, a risk register enables proactive risk management — identifying threats early and putting mitigation plans in place before they can affect the project.

Purpose of a Risk RegisterWho Uses It
Create a central record of all known project risksProject managers — to oversee and report on risks
Assess and prioritise risks by likelihood and impactBusiness analysts — to identify requirements-related risks
Assign ownership so each risk has a responsible personRisk managers — to manage organisational risk exposure
Track mitigation actions and their progressSponsors and stakeholders — to understand project risk status
Provide an audit trail of risk management decisionsOperations teams — for ongoing business risk monitoring

What Does a Risk Register Look Like?

A risk register is typically presented as a table — either in a spreadsheet (Excel, Google Sheets), a project management tool (Jira, Microsoft Project, Smartsheet), or a document format. Each row represents one identified risk, and each column captures a specific piece of information about that risk.

Here is what a typical risk register looks like:

Risk IDRisk DescriptionCategoryLikelihoodImpactRisk ScoreOwnerStatusMitigation Plan
R-001Key developer leaves mid-projectResourceMediumHigh6PMOpenCross-train team member as backup
R-002Requirements change after sign-offScopeHighHigh9BAOpenChange control process in place
R-003Third-party API unavailable at launchTechnicalLowHigh3Tech LeadOpenIdentify alternative API provider
R-004Budget increase required for testing phaseFinancialMediumMedium4PMMitigatedReserve budget allocated in plan
R-005Regulatory approval delayedComplianceLowHigh3SponsorMonitoringEarly engagement with regulator
NOTE: Risk Score is typically calculated as Likelihood x Impact using a numerical scale (e.g., Low=1, Medium=2, High=3). A score of 9 (High x High) signals a critical risk that needs immediate attention. A score of 1-3 indicates a low-priority risk to be monitored.

Elements of a Risk Register

A complete risk register should capture the following information for each identified risk. Not all projects need every field — simpler projects may use a shorter format, but the core fields should always be present.

FieldDescriptionRequired?
Risk IDA unique identifier for each risk (e.g., R-001, R-002). Allows easy reference in meetings and reports.Required
Risk DescriptionA clear, concise statement of what could go wrong. Should describe the risk event, not the consequence.Required
Risk CategoryThe type of risk — common categories include Technical, Resource, Schedule, Financial, Compliance, and External.Required
LikelihoodHow probable is it that this risk will occur? Rated as Low, Medium, or High (or numerically 1-5 on larger projects).Required
ImpactHow serious would the consequences be if this risk occurs? Rated as Low, Medium, or High. Consider impact on cost, schedule, quality, and scope.Required
Risk ScoreA calculated score based on Likelihood x Impact. Allows risks to be ranked by priority so the team focuses on the highest-scoring risks first.Required
Risk OwnerThe person responsible for monitoring this risk and implementing the mitigation plan. Every risk must have a named owner.Required
Mitigation PlanThe action(s) being taken to reduce the likelihood or impact of the risk. Should be specific and actionable, not vague.Required
Risk StatusThe current state of the risk — typically Open, Monitoring, Mitigated, or Closed. Updated at each review cycle.Required
Date IdentifiedWhen the risk was first raised. Useful for audit trails and trend analysis.
Contingency PlanWhat the team will do if the risk actually occurs (the mitigation plan has failed). Separate from the mitigation plan.
Review DateWhen this risk will next be formally reviewed. Ensures the register stays up to date throughout the project.

How to Create a Risk Register: Step-by-Step Guide

Circular process diagram showing six steps to create a risk register: identify risks, categorise risks, assess likelihood and impact, calculate risk score, plan mitigation, and monitor and update
Risk Register Process

Creating a risk register does not require specialist software. A spreadsheet is sufficient for most projects. What matters is following a consistent process so that risks are identified systematically and managed proactively throughout the project lifecycle.

Step 1: Identify Risks

Bring together key project stakeholders — the project manager, business analyst, technical lead, and subject matter experts — for a risk identification session. Use techniques such as brainstorming, reviewing similar past projects, interviewing team members, and analysing the project plan for dependencies and assumptions. Every potential risk should be captured at this stage, even if it seems unlikely. Do not filter or dismiss risks during identification.

Step 2: Categorise Each Risk

Group each identified risk into a category. Common categories include Technical (e.g., system integration failures), Resource (e.g., staff availability), Schedule (e.g., dependency delays), Financial (e.g., budget overruns), Compliance (e.g., regulatory requirements), and External (e.g., third-party supplier risks). Categorising risks helps the team see patterns and assign appropriate owners.

Step 3: Assess Likelihood and Impact

For each risk, the team assesses two dimensions: how likely is it to occur, and how serious would the impact be if it did? Use a consistent scale — Low, Medium, High is the most common. For larger or more complex projects, a numerical scale (1-5 for both likelihood and impact) gives more granularity. Assess each risk independently and avoid letting one person’s opinion dominate the assessment.

Step 4: Calculate the Risk Score

Multiply the likelihood rating by the impact rating to produce a risk score. For a Low-Medium-High scale, assign values of 1, 2, and 3. A High Likelihood (3) x High Impact (3) risk scores 9 — the maximum and a signal for immediate action. A Low Likelihood (1) x Low Impact (1) scores 1 — the minimum, to be monitored but not prioritised. Sort the register by risk score to focus attention on the highest-priority items first.

Step 5: Assign Risk Owners

Every risk must have a named owner — a specific person, not a team or role. The risk owner is responsible for monitoring the risk, implementing the mitigation plan, and escalating if the risk changes status. On most projects, the project manager owns high-priority risks, while the BA owns requirements-related risks and the technical lead owns technical risks.

Step 6: Define Mitigation and Contingency Plans

For each risk, document the mitigation plan (what will be done to reduce the likelihood or impact before the risk occurs) and the contingency plan (what will be done if the risk occurs despite the mitigation). Mitigation actions should be specific and assigned to a person with a target date. Vague plans like “monitor closely” or “escalate if needed” are not sufficient — they provide no real protection.

Step 7: Monitor and Update Regularly

A risk register is a living document. It should be reviewed at every project status meeting — typically weekly or fortnightly depending on project pace. At each review, update the status of existing risks (has anything changed?), close risks that have passed, add newly identified risks, and re-assess scores if the project context has changed. A risk register that is created once and never updated provides no real value.

Risk Register in Project Management

In project management, the risk register is one of the core project documents alongside the project plan, RACI matrix, and requirements specification. It is typically created during the planning phase of a project and maintained throughout the execution and monitoring phases.

Different project management methodologies approach risk registers slightly differently:

MethodologyHow Risk Registers Are Used
Waterfall / Traditional PMRisk register created during planning phase. Formal review process at each phase gate. Updated by the project manager with input from the BA and technical team.
Agile / ScrumRisks are often managed as a backlog of impediments or maintained as a risk register in Confluence or Jira. Reviewed at sprint retrospectives and backlog grooming sessions. Less formal but equally important.
PRINCE2Risk register is a mandatory PRINCE2 document, formally defined in the methodology. Includes specific fields for risk appetite, risk tolerance, and proximity (how soon the risk might occur).
Business Analysis (BABOK)Business analysts are responsible for identifying requirements-related risks. The BA contributes to the risk register by surfacing risks around scope, stakeholder alignment, requirements quality, and solution feasibility.

Risk Register vs Risk Log: What Is the Difference?

The terms risk register and risk log are often used interchangeably, but in formal project management practice they can have slightly different meanings depending on the methodology being used.

Risk RegisterRisk Log
DefinitionA comprehensive document recording all identified risks with full detail — likelihood, impact, owner, mitigation, and contingency.A simpler list or diary-style record of risks as they are raised, often without full likelihood/impact assessment.
FormalityMore formal. Required in methodologies like PRINCE2 and PMBOK.Less formal. Often used interchangeably with “risk register” in practice.
ContentIncludes risk scores, mitigation plans, contingency plans, and current status. Updated regularly.May contain only the risk description, date raised, and who raised it. Less analytical.
Common usageLarger, more complex projects. Corporate risk management. Regulated industries.Smaller projects. Internal teams. Informal Agile environments.
Bottom line: In most practical contexts, risk register and risk log mean the same thing.

Risk Register vs Risk Assessment: Key Differences

A risk register and a risk assessment are related but different things. This is one of the most common points of confusion for people new to project management and business analysis.

Risk AssessmentRisk Register
What it isA process or activity — the act of identifying and evaluating risks.A document or tool — the output of the risk assessment process.
PurposeTo evaluate the nature and severity of risks at a point in time.To record, track, and manage risks on an ongoing basis.
TimingCan be a one-time exercise (e.g., before a project starts).Created during planning and maintained throughout the entire project.
FormatOften a report or analysis document. Can include risk matrices, heat maps, and narrative.Always a structured table or database of individual risk records.
RelationshipThe risk assessment feeds INTO the risk register.The risk register is the ongoing management tool created as a result of the risk assessment.

Want to develop business analysis and risk management skills for your career? Techcanvass’s ECBA training for business analysts covers requirement analysis, risk identification, stakeholder management, and the business analysis fundamentals you need to work confidently on complex projects.

Conclusion

A risk register is not just a compliance document — it is a practical tool that helps project teams stay in control of uncertainty. When created early, maintained consistently, and reviewed regularly, a risk register transforms risk management from a reactive scramble into a proactive, structured process.

For business analysts, understanding how to contribute to and maintain a risk register is a core professional skill. Whether you are working on your first project or preparing for ECBA or CBAP certification, risk management is an area that will come up repeatedly throughout your BA career.

Frequently Asked Questions: Risk Register

A risk register is a structured document used to identify, record, and manage risks on a project or in a business. It captures each risk’s description, category, likelihood, impact, risk score, owner, and mitigation plan. The register is created during project planning and updated throughout the project lifecycle to give the team a current view of all known risks.
A risk register should include the risk ID, risk description, risk category, likelihood rating, impact rating, calculated risk score, the name of the risk owner, the mitigation plan, and the current risk status. For more complex projects, you should also include a contingency plan, the date the risk was identified, and the next scheduled review date.
In most practical contexts, risk register and risk log mean the same thing — a document used to record and track project risks. In formal methodologies like PRINCE2, a risk register is more comprehensive (with full assessment and mitigation details) while a risk log may be a simpler diary-style list. Both serve the purpose of keeping track of identified risks.
A risk assessment is the process of identifying and evaluating risks. A risk register is the document that records the output of that process. Think of the risk assessment as the activity and the risk register as the result. The risk register is then maintained and updated throughout the project, whereas a risk assessment may be a one-time exercise.
The project manager is typically responsible for maintaining the risk register and ensuring it is kept up to date. However, every risk has an individual owner who is responsible for monitoring their specific risk and implementing the mitigation plan. Business analysts contribute by identifying risks related to requirements and stakeholder alignment. On larger projects, a risk manager may own the process.
The risk score is calculated by multiplying the likelihood rating by the impact rating. Using a scale where Low=1, Medium=2, and High=3, a risk with High Likelihood and High Impact scores 3×3=9 (maximum priority). A risk with Low Likelihood and Low Impact scores 1×1=1 (minimum priority). Sort your risk register by score descending to focus on the most critical risks first.
A risk register should be created during the planning phase of a project, before execution begins. This gives the team time to put mitigation plans in place before risks can occur. It should then be reviewed and updated at every project status meeting — typically weekly or fortnightly. New risks can be added at any time as they are identified during the project.
Yes. While risk registers are most commonly associated with project management, they are also used in business operations, financial management, IT governance, healthcare, construction, and compliance functions. Any organisation that wants to proactively manage uncertainty — rather than react to problems after they occur — can benefit from maintaining a risk register.

 

Techcanvass Academy

About Techcanvass Academy

Techcanvass, established in 2011, is an IT certifications training organization specializing in Business Analysis, Data Analytics, and domain-specific training programs. We offer internationally recognized certifications like CBAP and CCBA, helping professionals become certified Business Analysts. Additionally, we provide training modules for various domains like Banking, Insurance, and Healthcare, alongside specialized certifications in Agile Analysis, Business Data Analytics, Tableau, and Power BI.

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed

Menu