
Effective Date: July 25, 2025
Cloudmadeez LLC is committed to protecting the security and privacy of all users of fasttrackscholar.com. We follow industry best practices and regulatory standards to safeguard personal data and maintain platform integrity.
Our services are hosted on Google Cloud Platform (GCP), which provides robust physical and network security. We leverage Google’s built-in infrastructure protections to ensure uptime, data protection, and disaster recovery.
We regularly scan for vulnerabilities and apply security patches promptly. We monitor system logs and use automated tools to detect suspicious activity or attempted breaches.
Our AI-powered tools do not store or expose sensitive user data unnecessarily. All interactions are logged for quality improvement and filtered for inappropriate content. We do not use AI outputs for marketing or resale.
We perform regular backups of critical systems and user data. Disaster recovery plans are tested periodically to ensure business continuity in the event of failure or breach.
Cloudmadeez LLC adheres to SOC 2 Type 1 security principles and is actively working toward full compliance. We follow FERPA and COPPA guidance to protect student data where applicable.
If you believe you have discovered a vulnerability or security concern, please report it to us immediately at:
This Security Policy may be updated periodically to reflect changes in best practices or regulatory requirements. Users will be notified of significant changes through our website.
This policy applies to all information, assets, systems, and processing facilities, including logical and physical access.
Defines rules for provisioning and revoking access within Cloudmadeez LLC.
Ownership lies with ISG and relevant teams handling access.
This policy aims to define the rules for taking data backups and testing the restoration.
The policy covers backups of all types of data and information within the Cloudmadeez LLC (herein referred to as Organization).
The primary ownership of implementing this policy is with the IT and DevOps Team and the ISG.
Below types of data shall be backed up:
Details the planning and operation of business continuity and disaster recovery at Cloudmadeez LLC.
Applies to all employees, contractors, operations, and third parties.
DevOps and IT Team are responsible. Refer to escalation matrix and emergency contact tables.
This policy aims to control the planned and unplanned changes within the environment and infrastructure of Cloudmadeez LLC (herein referred to as the Organization), including the cloud.
This policy applies to Cloudmadeez LLC and covers its employees and operations. It applies to all forms of change that impact production, development, testing, configuration, and administration of shared assets, services, and processes managed by the Organization. This includes IT assets, OS and software installation/configuration, networking, public computing services, storage, databases, application development/support, documentation, and access requests.
The primary responsibility for implementing this policy lies with the department heads. The Information Security Group (ISG) will implement the policy under the guidance of the Leadership Team and in coordination with department heads.
The organization ensures adherence to change management directives, life cycles, access controls, separation of duties, test data sanitization, impact inclusion, managerial signoff, and functional testing documentation.
v1
Created By: Adarsh, July 11, 2025
Published By: Adarsh, July 12, 2025
This policy defines Cloudmadeez LLC’s (herein referred to as "Organization") security control requirements for encryption and key management lifecycle.
This policy applies to all data stored at rest and/or transmitted, including writable media and databases. It applies to the entire organization, employees, contractors, and third parties.
Sensitive Information: Data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.
The IT Head and DevOps Head are responsible for implementing this policy.
Includes, but is not limited to:
Includes, but is not limited to:
This document aims to provide Cloudmadeez LLC (herein referred to as the Organization) with a policy that communicates the need to protect the Confidentiality, Integrity, and Availability of information assets. It ensures that information and information systems are available to intended users, protected against unauthorized access and modification, and compliant with relevant legislative, regulatory, and contractual requirements. It aims to motivate employees to maintain responsibility, ownership, and knowledge about information security to minimize the risk of incidents and ensure continuity of service, even during major security events. The organization also aims to comply with international standards for information security, such as SOC2.
This policy applies to Cloudmadeez LLC, its employees (including contractors), and its operations.
The Information Security Manager is responsible for implementing, maintaining, and enforcing the policy.
This policy defines the rules and guidelines for password management at Cloudmadeez LLC (herein referred to as Organization).
This policy applies to the entire IT assets, employees, and contractors. It applies to all assets.
The ISG and CISO are responsible for implementing this policy under the guidance of top management and the DevOps Team.
Passwords will be managed at the following levels:
All employee- and system-level passwords must conform to this policy. All passwords will be uniquely associated with a user account.
The ISG will implement procedures for creating, changing, resetting, and communicating initial passwords. Users must change temporary passwords at first login. Default vendor passwords must be changed.
Password sharing is prohibited unless approved by ISG. All systems must adhere to this policy.
Users may change passwords using the provided password change option in systems per policy.
Reset requests initiated by IT Head via email or phone. ISG or CISO resets password to default and requires change at next login. Records of resets will be maintained.
All user IDs and passwords for IT employees must be changed. For others, accounts should be disabled and removed. Department head can request ID retention with password change.
This policy ensures that vulnerabilities, weaknesses, or exposures in IT and engineering resources or processes are identified, assessed, and remediated to prevent attacks that may lead to security or business risks. This policy outlines the technology and procedures used by Cloudmadeez LLC (herein referred to as Organization) to detect and remediate vulnerabilities and maintain maximum levels of security.
This policy applies to Cloudmadeez LLC and all of their employees and contractors. It covers the following areas:
The IT Head and DevOps Head are responsible for identifying significant security vulnerabilities and making recommendations about patch installation timelines. The DevOps Head will monitor and track vulnerability alert statuses, including changes and updates, and ensure the CVSS score is updated accordingly.
Security vulnerabilities are identified by:
A vulnerability scanning and assessment provider will sign an agreement, including confidentiality provisions. Upon receiving a report:
Based on CVSS v3.1 severity:
The Engineering Guild will generate annual vulnerability status reports to assess policy effectiveness.
A patch management tool or tracker must be used. Patches are categorized by severity and validated to exclude false positives. All patches must be tested in a test environment before being deployed to production.
This policy defines the requirements for granting, controlling, monitoring, and removing physical access to Cloudmadeez LLC facilities.
This policy applies to all individuals with authorized access to Cloudmadeez LLC facilities.
Version: v1
Created By: Adarsh, July 11, 2025
Approved By: CEO/Management, July 13, 2025
Published By: Adarsh, July 13, 2025
Cloudmadeez L LC Risk Manage ment Procedure PURPOSE Th is d o cum en t de fine s a ctio n s to ad d ress Clo u dm ad e e z LL C (he rein refe rre d to as Org an izat ion ) inf o rma tio n se cu rity risks an d op p o rtu n ities. It a lso d e fine s a p lan fo r a ch ievin g info rma tio n se cu rity and p riva cy objectives. SCOPE A ll Clo u d ma de e zL L C IT system s th at p roce ss, sto re, or tran sm it con fid en tia l, p riva te , or b u sine ss - critica l da ta. Risks th a t co u ld a ffe ct CloudmadeezLLC s me d ium to long - te rm go a ls sh o u ld be co n side red , as well a srisks t h a t will b e e n co un te red in th e d a y - to - day d e live ry o f se rvice s. C l o u d m a d e e z L L C risk m a n a g em en t syste m s an d p roce sses will be ta rge te d to a ch ieve m a xim um be ne fit with ou t increa sing th e bu reau crat ic bu rden a nd u ltim a te ly a ffe ctin g co re se rvice de live ry to t h e o rgan izat ion . C l o u d m a d e e z L L C wi ll, th e refo re, conside r the ma te ria lity of risk in d e ve lo p ing syste m s and p roce sse s t o ma na g e risk. Th is p o licy a nd p roced u re ap p ly to a lle mp loye e s of Clo u dma d ee zL L C an d to a ll e xte rna l p a rtie s, inclu d ing , bu t no t lim ited to, CloudmadeezLLC co n su lta n ts and co n tra cto rs, b u sine ss p a rtn e rs, ve nd o rs, supp lie rs, o u tso u rced se rvice p rovid e rs,a nd o th er th ird - p a rty en titie s with a cce ss to Clo u dma d eez L L C ne two rks an d syste m re so u rce s . DEFINITIONS CIS O: Chie f In fo rm atio n Se cu rity Of fice r CTO: Chie f Te ch no log y O ff icer P II : P e rson a lly I de n tifiab le In fo rma tion L ikeliho o d : Th e p roba b ility t ha t a g iven e ven t will o ccu r Im p a ct: Th e e xte n tto wh ich a risk e ve n t m igh t a ffe ctth e o rgan izat io n A cce p tan ce Crite ria : Accept an ce cr it eria are t he l imit s abov e w hich an organiz at ion w il l not t ol erat e risk. R OL ES AN D RESPONSIBILITIES Th e CIS O is u ltim ate ly resp on sible fo r a ccep tin g a nd /o r tre a tin g an y risks to the o rga n izatio n . Th e CIS O ca n a pp rove t h e a vo ida n ce, rem e d ia tio n , t ran sfe ren ce , o ra cce p ta n ce o f a n y risk cite d in th e Risk Reg iste r. Th e CTO sh a ll id en tify a n d d e ve lop tre a tm en t p lan s fo r a ll in fo rm a tion se cu rity - rela te d risks. Th e se p e rson s sh a ll co mm un icat e risks to top m a na g eme n t a nd a do p t risk tre a tm en ts b y e xe cu tive d ire ction . POLICY Clo u d ma de e zL L C ha s d e ve lo p ed p roce sse sto id en tify th o se risks th a t will re strict a ch ie ving its stra te g ica n d o pe rationa l o b jective s. Clo ud mad e e zL L C will, the refo re , en su re th a t it ha s in p lace th e m e an s to id en tify, a na lyze, con tro l, a nd m on ito r the stra te g ic a nd ope ratio na l risks it fa ce s u sing th is risk m a na ge me n tp o licy b a sed on be st p ra ctice s. CloudmadeezLLC w ill e n su re th e risk m a na ge m en t po licy & p roce du re a re revie wed regu larly and th a t in te rna l a ud it fu n ction s a re re sp on sible for e n su rin g: Th e risk m a na ge me nt p o licy is ap p lie d t o a ll a p p licab le a re a s of Clo u dm ad e e z L L C Th e risk m a na g eme n t p o licy and its o p e ra tion a l ap p lica tion a re regu larly revie wed Non - co m p lian ce is rep o rte d t o a pp rop ria te co m pa n yo ff icersa n d au th o ritie s RIS K CATEGORIES CloudmadeezLLC w ill co n side r a nd a sse ss risks a cross th e o rgan iza tio n . Risk ca teg o rie s th a t sh ou ld b e con side red fo r e va lu a tion in clude : Rep u tatio n a l Con tra ctu a l Reg u lato ry/Co mp lia nce E co n om ic/Fin an cial Fra u d P riva cy Im p a ct o n P eo p le Use of Clo ud S e rvices Op e ratio na l Capa city E a ch risk will be a sse sse d fo r its like liho o d and imp a ct. Bo th imp a ct and like lih o od a re a ssesse d on a sca leo f1 - RIS K CRITERIA Th e crite ria fo r d e te rm in ing risk is the com b ine d like lih oo d a nd im pact of an e ve n t ad ve rsely a ff e ctin g th e co n fide n tia lity, a va ilab ility, int eg rity, o r p riva cyo fo rga n iza tio na l a nd cu stom e r inf o rma tio n , p e rso n a lly id e n tifia b le info rma tion (PI I),o r b u sine ss in fo rm a tio n syste m s. Fo r a ll risk in p u ts, su ch a s risk a sse ssm en ts, vu lne rab ility sca n s,p en e tra tion te sts, b u g b ou n ty p rog ram s, etc. , CloudmadeezLLC m an a ge men t sh a ll rese rve th e righ t to m od ify risk ran king s b a sed on its a sse ssme n to f the n atu rea n d critica lity o f the syste m p roce ssin g an d th e n a tu re, critica lity, a n d e xp loita b ility (o r o th e r re levan t fa cto rsa nd co n sid e ration s) o fthe id en tifie d vu lne rab ility. RIS K RES P ONSE , T REAT ME NT , AND TRACKING Risks will be p rio ritize d a nd m a inta ined in a risk reg iste r, whe re the y will be p rio ritize d and m a pp ed u sing th e a p p ro a ch con ta ine d in th is po licy. Th e fo llo win g re sp o n se s t o risk sh ou ldb e e mp loye d : Reme dia te : Clo ud ma d ee z L L C ma y t a ke actio n s o re mp loy strateg ies to re d u ce th e risk. Acc e pt : Cloudmadeez LLC m a y d e cide to a cce p t and m on ito r the risk at th e p re se nt tim e. Th is m a y be ne ce ssa ry f o r som e risks th a ta rise fro m e xte rna l e ve n ts. T ra ns fe r : Cloudmadeez LLC m a y de cide to p a ss th e risk on to a no th e r pa rty. Fo r e xamp le, co n tra ctu a l te rm s m a y be a g reed u p on to ensu re tha t th e risk is n ot b o rne by Cloudmadeez LLC , or insu ran ce m a yb e ap p rop ria te fo r p rote ctio n a g a in st fina n cial lo ss. Avoi d : Th e risk ma y be su ch th at th e Cloudmadeez LLC co u ld d e cid e to ce a se the a ctivity or ch a ng e it in su ch a way a s t o e nd th e risk. W h e re CloudmadeezLLC ch o o se s a risk resp on se o the r th an or a risk tre a tm e nt p lan sh a ll be d e ve lo p ed . R ISKM AN AGEM EN T PROCEDURE Th e p roce d u re f o rm ana g ing risk will m e e tth e f o llo win g criteria: 1. CloudmadeezLLC w ill m a inta in a Risk Reg iste r and Trea tm e nt Plan. 2. a s critica l, h igh ,m e d ium ,a n d low. 3. Ove rall risk sh a ll b e d ete rm ine d th roug h a com b ina tio n o f like liho o da n d impact. 4. CloudmadeezLLC w ill r e sp on d to risks in a p rio ritize d fa sh ion . Rem ed iat ion p rio rity will co n side r the risk likeliho o d a n d imp a ct, co st,work e ff o rt, a nd a va ilab ility o f resou rces. Mu ltiple rem ed iat ion s ma y be un d e rta ke n sim u lta n eo usly 5. Reg u lar rep o rts will be m a de to th e se n ior lead e rship of CloudmadeezLLC to en su re risks a re be ing m itiga te d a pp rop ria te lya n d b yb u sin e ss p rio ritie sa n d o b je ctive s. APP E NDIX A RIS K ASS E S S ME NT PROCESS Th e fo llo win g is a h igh - leve l o ve rvie w of th e p ro ce ss u se d by CloudmadeezLLC to a sse ss an d m a na ge in fo rm atio n secu rity - rela te d risks. Th e risk a sse ssm en tproce ss is com p rise d o fth e fo llo win g steps: 1. P rep a refo r th e assessment 2. Con d u ct the assessment 3. Comm u n icate th e assessment 4. Ma int a in th e assessment S tep 1 : Pre pa re for the Assessment In th is step , the ob ject ive is to e sta b lish the co n te xt fo r the risk a ssessm e nt. Th is ca n be a cco mp lish ed b yp e rform ing th e fo llo win g : Id e n tify th e p u rpo se o f the a sse ssme n t Det e rm ine th e in fo rma tio n the a sse ssme n t in te nd s to p rod u ce and th e d e cision s th e a sse ssme n t in ten d sto su p po rt. Id e ntify the scop e o f the assessment. Det e rm ine th e a pp lica b le o rgan izat ion a l fu nctio n or p roce ss, th e asso ciat ed tim e fra me , a n d a n ya p p licab lea rchite ctu ralo r te ch n o lo g ica l co n side ration s. Id e ntify an y a ssu mp tion s o r con stra int s a sso ciat e d with t he assessment Det e rm ine a ssu mp tion s in ke y a rea s rele vant to the risk a sse ssm e nt, includ ing : Org a n izat ion a l p rio ritie s B u sine sso b ject ive s Reso u rce a va ila b ility S kills a n d e xpe rtise of th e risk a sse ssm en t te a m Id e n tify so u rceso f info rm a tio n . A rchite ctu ral/te chn o log ical d iag ram s a nd syste m con figu ratio n s L e g a la n d re g u la to ryreq u ire me n ts Th rea t S ou rces Th rea t E ve n ts V u lne rab ilities and influ e n cing co nd ition s P o te ntia l Im p a cts E xisting Co ntro ls S tep 2 : Conduc t the Assessment Th is step a im s to p rodu ce a list of in fo rm a tion se cu rity - rela ted risks th a t ca n be p rio ritize d by risk leve l a nd u se d to in fo rm risk re sp on se d e cisio n s. Th is ca n b e a ccom p lish ed b y p e rfo rm ing t he following: Id e ntify Th rea t Sources Det e rm ine and cha racte rize th rea t so u rces rele va nt to a nd of co n ce rn to Cloudmadeez LLC , in clud ing bu t no t lim ite d to : Hum a n (In ten tio na l or Unin te n tio n a l / In te rna l or E xte rna l) E n viro n me n ta l Nat u ral S yste m o r Equ ipmen t Con side r th e fo llo win g whe n iden tifyin g th rea t so u rces: Cap a b ility Mo tive / In te nt In te n tion a lly t a rg e te d p e op le, p ro ce sse s, and /o r te ch no log ies. Unin te n tio na lly t a rge te d pe o p le , p ro ce sse s,a n d /o r te ch n o lo g ies. Id e ntify Th rea t Events Det e rm ine wha t th reat e ven ts co u ld be p ro du ce d by th e iden tified th rea t so u rces tha t h a ve th e p ote n tia l to im p a ct Clo ud ma d ee z LL C . Con side r th e re leva n ce o fth e e ven tsa n d t h e so u rces th a t co u ld in itia te th e events. Id e ntify Vulnerabilities Det e rm ine th e vu lne ra b ilities a sso ciate d with p e op le, p roce sse s, an d te ch n o lo g ies th a t th e ide n tified th rea t sou rces a nd e ve n ts co u ld e xp lo it. Con side r a n y in flu en cing co nd ition s th a t cou ld a ffe ct a nd a id in su cce ssfu l exploitation. Det e rm ine Likelihood Det e rm ine th e like lihoo d th a t the ide n tifie d threa t so u rces wo u ld initia te th e iden tified th rea te ven ts an d co u ld su cce ssfu lly e xp lo it an y id en tifie d vu lne rab ilities. Th e vu lne rab ilitiesa n d/o r in flu en cing co nd ition s identified Clo u d ma de e zL L C s exp o su re is ba sed on a ny sa fe g ua rds/ cou n te rme a su res p lan n ed or im p lem e nte d to p reve nt o r m itig a te su ch e vents. Det e rm ine Impact a sse ts, in d ivid ua ls, cu sto me rs, an d /o r o the r o rg a n izatio n sb y con siderin g t h e following: B u sine ss / Op e ra tio na l Imp a cts Fin a n cial Dam a ge Rep u tatio n Dama g e L e g a l o r Reg u lato ry Issu e s W h en d e te rm inin g im pa ct, co n side r any sa fe gu a rds/ cou n te rme a su res p lan n ed o r im p lem e nte d b y Clou dm a de e zL L C th a t wo u ld m itiga te o r le ssen the im pa ct. Det e rm ine Risk Det e rm ine th e o ve rall inf o rm a tio n se cu rity - relat e d risks to CloudmadeezLLC by co m b ining th e following: Th e likeliho o d o fth ee ve n t o ccu rring . (L ) Th e im pa ct th a t wo u ld re su lt f ro m th e e ven t. (I) Ris k Sc ore = Lik e li hood x Impact Th e risk to CloudmadeezLLC is p rop o rtio na l to th e like lih oo d an d im pa ct of an event. Hig h e r Risk E ve n t: Th is is m o re likely t o o ccu r, resu lting in g re a te r im p a ct. L o wer Risk E ve n t: Th is is less like ly to o ccu r, a nd th e resu lting imp act will be m inim a l, if any. S tep 3 : Communic a te a nd S ha re the Risk Ass e ss me nt Results Th is ste p e n su res th at d e cisio n - ma ke rs a cross th e CloudmadeezLLC and e xe cu tive lea d e rsh ip h a ve th e a p p rop ria te risk - rela te d in fo rm a tion ne ed ed t o in fo rm an d g u ide risk d e cisio n s. Com m un icat e t he Resu lts Com mu n icate th e risk a sse ssm e nt resu lts t o Clo u d ma de e zL L C de cisio n ma ke r an d e xe cu tive le ad e rship to h e lp d rive risk - b a se d d e cisio n s a nd o b ta in the ne ce ssa ry su p po rt fo r the risk re sp o n se . S h a re th e risk a sse ssm e nt and risk - rela te d inf o rma tion with the app rop ria te pe rson ne l at Clo u d ma de e zL L C to he lp sup p o rtth e risk re sp o n se e ffo rts. S tep 4 : Ma intai n the Assessment In t h is ste p, the ob ject ive is t o ke ep cu rre n t with t he spe cific kn o wledg e re late d to th e risks th a t Clo u d ma de e zL L C incu rs. Th e resu lts of the a sse ssme n ts info rm and d rive risk - b a se d d e cision s and g u ide o ng o ing risk re sp o n se e ffo rts. Mo n ito r Risk Fa cto rs Con d u ct o ng o ing m on ito rin g o f th e risk f a cto rs th a t co ntrib u te t o ch a ng e s in risk to Clo u d ma de e zL L C bu sine ss o b ject ive s, o pe ratio n s, a sse ts, in d ivid u a ls, cu stome rs, a n d /o r o th e r organizations. Ma int a ina n d Up d ate th e Assessment Upd a te e xisting risk asse ssm en ts u sing the re su lts fro m o ng o ing mo n ito rin g of risk fa cto rs an d b y con du cting ad d itiona l a sse ssme n ts, a tm inim um an n ua lly. OOD OD APP E NDIX B Ris k Asse s s me nt Matrix a nd Des c ription Key RISK= LIKELIH * IMPACT LIKELIHOOD IMPACT Very unlikely: 1 Unlikely: 2 Somewhat li k e ly : 3 Lik e ly : 4 V e ry lik ely : 5 Very high impa c t: 5 5 10 15 20 25 High impa c t: 4 4 8 12 16 20 Medium impa c t: 3 3 6 9 12 15 Low impa c t: 2 2 4 6 8 10 V e ry low impa c t: 1 1 2 3 4 5 RISK LEVEL RIS K DESCRIPTION Low (1 - 7) A th rea t e ven t cou ld be e xp e cte d to h a ve a limite d a d ve rse e ffe ct on o rga n izatio na l o pe ration s, m ission cap ab ilities, a sse ts, ind ividu a ls, cu stom e rs,o r o the r o rg a n izatio n s. Medium (7 - 14) A th rea t e ven t cou ld be e xp e cte d to h a ve a serio u s a d ve rse e ff e ct o n o rga n izatio na l o pe ration s, m ission cap ab ilities, a sse ts, ind ividu a ls, cu stom e rs,o r o the r o rg a n izatio n s High (15 - 25) A th rea t e ven t cou ld be e xp e cte d to h a ve a seve re a d ve rse e ffe ct o n o rga n izatio na l o pe ration s, m ission cap ab ilities, a sse ts, ind ividu a ls, cu stom e rs,o r o the r o rg a n izatio n s. LIKELIHO LEVEL LIKELIHOOD DESCRIPTION RATING (NUME RICAL) Very unlikely (1) A th re a te ve nt is so u n like ly tha t it ca n be a ssum ed tha t its o ccu rre n ce ma y no t b e e xp e rie n ce d . A t h rea t sou rce is n o tm o tiva ted o r has no ca pa b ility, o r co n tro ls a re in p lace to p reve n to r sign ifican tly im pe d e th e vu lne rab ility fro m b e ing exploited. 1 Unlikely (2) A t h rea t e ve n t is u n like ly, bu t th e re is a sligh tp o ssibility th a t its o ccu rren ce m a yb e experienced. A t h rea t sou rce lacks su ff icie nt m o tivatio n o r ca p ab ility, o r co n tro ls a re in p lace to p reve n to r im p ed e th e vu lne rab ility f rom b e ing e xp loite d . 2 Somewhat li k e ly (3 ) A t h rea t e ve n t is like ly, and it ca n be a ssu me d th at its o ccu rre n ce ma y be experienced. A t h rea t sou rce is m o tivate d o r po se s th e ca p ab ility, b ut co n tro ls a re in p lace th a tm a y sign ifican tly red u ce o r im pe d e t h e successful e xp loitatio n of th e vulnerability. 3 Lik e ly (4) A t h rea t e ve n t is like ly, and it ca n be a ssu me d th at its o ccu rre n ce will be experienced. 4 A th reat sou rce is h igh lym o tivate d o r p o se s su ff icie nt ca p ab ility a n d reso u rces, b u t so m e con tro ls a re in p lace th a t ma y red u ce o r imp e de th e su cce ssfu l e xp loitatio n o f th e vulnerability. Very likely (5) A t h rea t e ve n t is h igh ly like ly, an d it ca n be a ssu me d th a t its o ccu rren ce will be e xpe rie n ced . 5 A t h rea t sou rce is h igh lym o tivate d o r p o se s su ff icie nt ca p ab ility o r reso u rces, b u t n o co n tro ls a re in p lace ,o r co ntro ls th a t a re in p lace a re ine ff e ctive an d d o n o tp reve nt o r im p ed e th e successful e xp loitatio n of th e vulnerability. IMPACT LEVEL IMPACT DESCRIPTION RATING (NUMERICAL) V e ry low impa c t (1) A t h rea t e ve n t co u ld be e xpe cted to h a ve a lm o stn o a d ve rsee ffe ct on o rgan izat iona l o pe ration s,m issio n ca p ab ilities, a ssets, ind ivid u a ls, cu stom e rs,or d e g rad a tion of m issio n ca p a b ility, yet p rim a ry fu n ction s ca n st ill be p e rfo rme d ,m ino rd am a ge ,m ino rfin a n cial loss, o r a ra n ge o f e ffects sign ifican td e g rad atio n of m issio n ca p ab ility ye tp rim a ry fun ction s can still b e p e rfo rme d at a red u ced ca p a city; m ino r da ma g e ; m ino r 1 fin a n cial loss; o r a rang e o fe ff e cts, a nd impede - se ve rely a ffe ct or organizations Low impa c t (2) A t h rea t e ve n t co u ld be e xpe cted to h a ve a lim ite d a d ve rsee ffe ct, m ea n ing : de g rada tion o f m issio n ca p ab ility ye t p rim a ry fu n ction s ca n st ill b e p erfo rm e d; m ino r d am ag e ; m ino r fin a n cial loss; or rang e of e ffe cts is lim ite d to som e cyb er re so u rces bu tn o critica l resources. 2 Medium impa c t (3) A t h rea t e ve n t co u ld be e xpe cted to h a ve a se rio u s a d ve rsee ffe ct, m ea n ing : sign ifica n td e g ra d atio n of m issio n ca p ab ility ye tp rim a ry fun ction s can still b e p e rfo rme d at a red u ced ca p a city; m ino r da ma g e ; m ino r fin a n cial lo ss; o r ran g e o f eff e cts is sig n ifican t t o som e cyb e r re so u rce s an d so m e critica l reso u rces. 3 High impa c t (4) A th rea t e ven t cou ld be e xp e cte d to h a ve a seve re o r ca ta strop h ic ad ve rseeff e ct, me a n ing : se ve re d e g rad a tion o r lo ss o fm issio n ca p ab ility a nd o n e o r m o rep rim a ry fu n ctio n s ca n no tb e p e rfo rm e d;m a jor d a ma ge ;m a jor fin a n cia l loss; o r ran g e o fe ffects is e xte n sive t o mo st cyber re so u rces an d m o st critica l resources. 4 V e ry high impa c t (5) A t h rea t e ve n t co u ld be e xpe cted to h a ve m ultiple se ve re or ca ta strop h ic a d ve rse e ffe cts on o rga n izat ion a l o p e ratio n s,a sse ts, ind ividu a ls,o th e ro rgan izatio n s,o r th e Natio n . Th e Ra n ge o f eff e cts is swe ep ing , in vo lvin g a lm o st a ll cybe r re so u rce s. 5 Risk Ma nageme nt Procedure Version v1 Cre a t ed By Adarsh , J uly 1 1 , 2025 Appro v ed By C EO , Ju ly 12 , 2025 P ublis hed By Adarsh, Ju ly 12 , 2025