Skip to content

Synthetic Users Internal Risk Assessment

Version: 1.0

Assessment Date: 15 February 2026

Prepared by: Artur Ventura, CTO & CISO

Reviewed by: Kwame Ferreira, CEO

Next Review: February 2027


1. Purpose

This document presents the results of Synthetic Users' annual internal risk assessment, identifying threats to the confidentiality, integrity, and availability of company and customer data, evaluating the effectiveness of existing controls, and documenting residual risks and remediation plans.


2. Scope

This assessment covers:

  • SaaS platform infrastructure and operations
  • Corporate systems and employee endpoints
  • Third-party and subprocessor dependencies
  • Data processing and storage
  • Personnel and organizational risks
  • Regulatory and compliance obligations (GDPR, SOC 2)

3. Methodology

The assessment was conducted using the following approach:

  1. Asset identification — Catalogued all technology assets, data stores, and third-party dependencies from the asset inventory and subprocessor registry.
  2. Threat identification — Identified threats across categories: external attacks, insider threats, operational failures, third-party risks, regulatory non-compliance, and natural/environmental events.
  3. Vulnerability analysis — Reviewed penetration test results, vulnerability scans, incident history, and control documentation.
  4. Impact and likelihood scoring — Each risk scored on a 5-point scale for likelihood and impact, producing a risk rating (Low / Medium / High / Critical).
  5. Control evaluation — Assessed effectiveness of existing controls for each risk scenario.
  6. Residual risk determination — Documented remaining risk after controls are applied.

Risk Rating Matrix

Impact: MinimalImpact: LowImpact: ModerateImpact: HighImpact: Critical
Likelihood: Very LikelyMediumMediumHighCriticalCritical
Likelihood: LikelyLowMediumHighHighCritical
Likelihood: PossibleLowMediumMediumHighHigh
Likelihood: UnlikelyLowLowMediumMediumHigh
Likelihood: RareLowLowLowMediumMedium

4. Risk Assessment Results

4.1 External Threats

IDRisk ScenarioLikelihoodImpactExisting ControlsControl EffectivenessResidual RiskOwner
R-01Unauthorized access to production systemsUnlikelyCriticalSSO with MFA (Google Firebase), RBAC, least privilege, no SSH access, Cloudflare WAFStrongMediumCTO
R-02Data breach / exfiltration of customer dataUnlikelyCriticalEncryption at rest (AES-256) and in transit (TLS 1.2+), S3 Object Lock, Google Workspace DLP, GitHub secret scanning, RBACStrongMediumCTO
R-03Ransomware attackUnlikelyHighImmutable backups (S3 compliance mode), endpoint anti-malware (macOS XProtect), no SSH access, containerized infrastructureStrongLowCTO
R-04DDoS attack on platformPossibleModerateCloudflare DDoS protection, WAF, rate limiting, bot managementStrongLowCTO
R-05Phishing / social engineering targeting employeesLikelyModerateSSO+MFA, Google Workspace phishing protection, SPF/DKIM/DMARC, security awareness training, auto-forward disabledAdequateMediumSecurity Lead
R-06Supply chain attack (compromised dependency)UnlikelyHighGitHub secret scanning, Dependabot, automated dependency updates, code review, SDLC security scanningAdequateMediumCTO
R-07API abuse or scrapingPossibleLowCloudflare rate limiting, bot management, API authentication, audit loggingStrongLowCTO

4.2 Insider Threats

IDRisk ScenarioLikelihoodImpactExisting ControlsControl EffectivenessResidual RiskOwner
R-08Unauthorized data access by employeeUnlikelyHighRBAC, least privilege, unique user IDs, semi-annual access reviews, audit loggingStrongLowSecurity Lead
R-09Accidental data exposure (misconfiguration, secret leak)PossibleModerateGitHub secret scanning, code review, infrastructure-as-code, no SSH, Render managed configAdequateMediumCTO
R-10Departing employee retains accessUnlikelyModerate24-hour access revocation on termination, SSO-based access (single revocation point), access review policyStrongLowSecurity Lead

4.3 Operational & Infrastructure Risks

IDRisk ScenarioLikelihoodImpactExisting ControlsControl EffectivenessResidual RiskOwner
R-11Primary hosting provider (Render) outageUnlikelyHighPre-configured AWS failover (RTO: 4h), data stored on AWS not Render, DRP documented and testedStrongLowCTO
R-12AI provider (OpenAI) outagePossibleModerateMulti-model failover (Anthropic, Google, Meta, Mistral), RTO: 2hStrongLowCTO
R-13AWS regional outageRareCriticalMulti-AZ replication, regional data storage, immutable backupsAdequateMediumCTO
R-14Data loss or corruptionRareCriticalContinuous backups (RPO: 15min), S3 Object Lock compliance mode, versioning, annual restore testingStrongLowCTO
R-15Authentication provider (Google Firebase) outageUnlikelyHighDocumented SSO configuration for rapid provider switch, cached sessions for short-term continuityAdequateMediumCTO

4.4 Third-Party & Subprocessor Risks

IDRisk ScenarioLikelihoodImpactExisting ControlsControl EffectivenessResidual RiskOwner
R-16Subprocessor data breachUnlikelyHighThird-party risk management policy, DPA requirements, SOC 2/ISO 27001 verification, annual vendor reviewsAdequateMediumSecurity Lead
R-17Subprocessor non-compliance with data protectionUnlikelyModerateDPA contractual obligations, subprocessor disclosure, advance notice of changes, right to objectAdequateLowSecurity Lead
R-18Open-source dependency vulnerabilityLikelyModerateDependabot automated scanning, SDLC dependency management, vulnerability SLAs (Critical: 24h remediation)AdequateMediumCTO

4.5 Regulatory & Compliance Risks

IDRisk ScenarioLikelihoodImpactExisting ControlsControl EffectivenessResidual RiskOwner
R-19GDPR non-compliance (breach notification failure)UnlikelyCriticalIncident response plan with 72-hour notification, DPA obligations, privacy policy, data deletion proceduresStrongLowCEO
R-20SOC 2 control failureUnlikelyHighSprinto continuous monitoring, annual SOC 2 Type II audit, documented policies, evidence retentionStrongLowSecurity Lead
R-21Failure to meet client contractual SLAsUnlikelyModerateBCP with RTO/RPO/MTD, DRP, annual DR testing, multi-provider redundancyStrongLowCTO

4.6 Personnel Risks

IDRisk ScenarioLikelihoodImpactExisting ControlsControl EffectivenessResidual RiskOwner
R-22Loss of key personnel (key-person risk)PossibleModerateCross-training, documented procedures, infrastructure-as-code, BCP personnel sectionAdequateMediumCEO
R-23Insufficient security awarenessUnlikelyModerateAnnual security awareness training, monthly security focus topics, quarterly interactive sessions, phishing simulationsAdequateLowSecurity Lead

5. Risk Summary

Residual Risk LevelCountRisk IDs
Critical0
High0
Medium9R-01, R-02, R-05, R-06, R-09, R-13, R-15, R-16, R-18, R-22
Low14R-03, R-04, R-07, R-08, R-10, R-11, R-12, R-14, R-17, R-19, R-20, R-21, R-23

No critical or high residual risks identified. Medium residual risks are accepted with existing controls and monitored through ongoing review.


6. Remediation and Action Items

IDRiskActionPriorityOwnerTarget Date
R-05Phishing / social engineeringIncrease phishing simulation frequency from annual to quarterlyMediumSecurity LeadQ2 2026
R-06Supply chain attackImplement Software Bill of Materials (SBOM) generation for production buildsMediumCTOQ3 2026
R-09Accidental data exposureImplement pre-commit hooks for additional secret detection patternsLowCTOQ2 2026
R-13AWS regional outageDocument and test cross-region failover procedureMediumCTOQ3 2026
R-15Google Firebase outageDocument alternative authentication failover procedureMediumCTOQ2 2026
R-22Key-person riskExpand cross-training program and document runbooks for all critical operationsMediumCEOQ2 2026

7. Assessment Participants

NameRoleContribution
Artur VenturaCTO & CISOLead assessor, technical risk evaluation, control effectiveness review
Kwame FerreiraCEOBusiness impact evaluation, risk acceptance decisions
Zumbi FerreiraCFOFinancial impact assessment, insurance coverage review

8. References


9. Approval

This risk assessment has been reviewed and approved by the executive team. Residual risks are accepted within the organization's risk appetite. Remediation items will be tracked to completion and verified at the next assessment cycle.

NameRoleDate
Artur VenturaCTO & CISO15 February 2026
Kwame FerreiraCEO15 February 2026

Released under the MIT License.