首页龙虾技能列表 › Disaster Risk Assessment

Disaster Risk Assessment

v1.0.0

Use when you need to assess disaster risk for a system or organization, perform structured risk analysis before disaster planning, identify which disasters t...

0· 80·0 当前·0 累计
by @quochungto (Hung Quoc To)·MIT-0
下载技能包
License
MIT-0
最后更新
2026/4/9
安全扫描
VirusTotal
Pending
查看报告
OpenClaw
安全
high confidence
The skill is an instruction-only disaster risk assessment checklist and scoring method; its inputs and steps are consistent with its stated purpose and it does not request extra credentials, installs, or privileged actions.
评估建议
This skill is a reusable, procedural checklist for disaster risk scoring and appears internally consistent. Things to consider before installing: (1) provenance — the skill has no homepage or known owner, so prefer installing only from trusted sources or reviewing content (you already have the full SKILL.md). (2) It requires you to supply sensitive system inventories and site-specific details when used — avoid pasting secrets, credentials, or private configuration into the agent unless you trust...
详细分析 ▾
用途与能力
Name, description, and required artifacts (none) align: this is a guidance/checklist skill for producing a quantitative risk register and does not require external services, binaries, or credentials.
指令范围
SKILL.md contains step-by-step guidance for gathering system inventory, geographic context, scoring P×I, and building a register — all within the declared scope and without instructions to read unrelated files or exfiltrate data.
安装机制
No install spec and no code files (instruction-only) — nothing is downloaded or written to disk, which is appropriate for a procedural guidance skill.
凭证需求
The skill declares no environment variables, credentials, or config paths and the instructions do not request any secrets — credential requests would be unnecessary for the stated purpose.
持久化与权限
always is false and autonomous invocation is not disabled (the platform default). There is no request to persist configuration or modify other skills; privileges are proportional to an instruction-only skill.
安全有层次,运行前请审查代码。

License

MIT-0

可自由使用、修改和再分发,无需署名。

运行时依赖

无特殊依赖

版本

latestv1.0.02026/4/9

- Initial release of the Disaster Risk Assessment skill. - Produces a quantitative, prioritized risk register using a Probability × Impact matrix across 7 disaster types and 3 major themes. - Includes 18+ pre-seeded disaster scenarios covering Environmental, Infrastructure Reliability, and Security risks. - Provides a structured process for gathering input, scoring risks, and reviewing outliers. - Supports use cases such as disaster planning, incident response preparation, and risk monitoring for both global and per-site contexts.

● Pending

安装命令 点击复制

官方npx clawhub@latest install bookforge-disaster-risk-assessment
镜像加速npx clawhub@latest install bookforge-disaster-risk-assessment --registry https://cn.clawhub-mirror.com

技能文档

Produces a scored, prioritized risk register using a quantitative Probability × Impact matrix. Covers 7 disaster types across 3 themes (Environmental, Infrastructure Reliability, Security) with 18+ pre-seeded scenarios. Output drives response plan prioritization, incident response team scoping, and disaster recovery test selection.

When to Use

  • Starting disaster planning for a new or existing system
  • Preparing for a disaster recovery test or tabletop exercise
  • Scoping an incident response team's charter and coverage
  • Evaluating how a change in infrastructure (new datacenter, cloud migration) shifts risk exposure
  • Conducting a per-site risk review for a multi-location organization
  • Revisiting a prior assessment after a significant organizational or threat environment change

Prerequisite: Know your system's architecture and its key dependencies (networking, authentication, storage, third-party services). Risk ratings are only as good as the system inventory behind them.

Context & Input Gathering

Before scoring, establish three inputs:

1. System inventory with criticality classification

Classify every system the risk could affect into one of three tiers. This classification determines how much impact a given disaster actually has on operations.

TierLabelDefinition
1Mission-essentialAbsence causes total operational disruption. Organization cannot function.
2Mission-importantAbsence significantly degrades operations but does not halt them.
3NonessentialAbsence has minimal operational impact. Tolerable downtime.
Ask: which services, if offline for 24 hours, would be catastrophic (Tier 1), serious (Tier 2), or acceptable (Tier 3)?

2. Geographic and infrastructure context

Risk ratings are location-dependent. A site in Los Angeles warrants a higher earthquake probability than one in Hamburg. A site in the southeastern US warrants higher hurricane probability. A single-ISP facility warrants higher internet connectivity loss probability than one with redundant circuits. Collect:

  • Physical datacenter location(s)
  • Existing fault-tolerance controls (redundant power, redundant ISP, UPS, generators)
  • Known historical incidents at this site or in this region

3. Scope boundary

Decide whether you are assessing at the organizational level (global) or per site. Large organizations should do both — a site that hosts only Tier 3 systems warrants a different response plan than one hosting Tier 1 systems.

Process

Step 1 — Start with the pre-seeded risk taxonomy

The matrix in Appendix A of Building Secure and Reliable Systems groups disaster scenarios into three themes. Use these as your starting point rather than an empty list. Pre-seeded scenarios prevent the common failure mode of omitting non-obvious risks (e.g., emerging zero-day vulnerabilities, insider intellectual property theft).

Environmental theme (natural events that affect physical infrastructure)

  • Earthquake
  • Flood
  • Fire
  • Hurricane / severe storm

Infrastructure Reliability theme (component and service failures)

  • Power outage
  • Loss of internet connectivity
  • Authentication system down
  • High system latency / infrastructure slowdown

Security theme (adversarial and vulnerability-driven events)

  • System compromise (external attacker gaining unauthorized access)
  • Insider theft of intellectual property
  • Distributed denial-of-service (DDoS) / denial-of-service (DoS) attack
  • Misuse of system resources (e.g., cryptocurrency mining)
  • Vandalism / website defacement
  • Phishing attack
  • Software security bug
  • Hardware security bug
  • Emerging serious vulnerability (e.g., Meltdown/Spectre, Heartbleed class)

Add organization-specific scenarios beyond this list. Examples: ransomware targeting backup systems, supply chain compromise of a build pipeline, regulatory action requiring emergency data deletion.

Step 2 — Score each scenario using the P×I scales

For each scenario, assign two values independently, then compute the ranking.

Probability of occurrence within a year (P)

ValueLabel
0.0Almost never
0.2Unlikely
0.4Somewhat unlikely
0.6Likely
0.8Highly likely
1.0Inevitable
Score probability based on your specific location, historical data, and existing controls. A site with a generator and UPS reduces power outage probability; a site on a flood plain increases flood probability.

Impact to organization if risk occurs (I)

ValueLabel
0.0Negligible
0.2Minimal
0.5Moderate
0.8Severe
1.0Critical
Score impact relative to the Tier 1/2/3 systems affected. If a disaster only affects Tier 3 systems, impact is at most Moderate. If it takes down a Tier 1 system with no failover, impact is Severe or Critical.

Ranking = Probability × Impact

A power outage scored P=0.6, I=0.8 produces Ranking=0.48. A hurricane at P=0.2, I=1.0 produces Ranking=0.20. Sort the completed register from highest to lowest ranking.

Step 3 — Populate the risk register

Create one row per scenario. Minimum columns:

ThemeRiskProbability (P)Impact (I)Ranking (P×I)Systems ImpactedTier
EnvironmentalEarthquake
EnvironmentalFlood
EnvironmentalFire
EnvironmentalHurricane
Infrastructure ReliabilityPower outage
Infrastructure ReliabilityLoss of internet connectivity
Infrastructure ReliabilityAuthentication system down
Infrastructure ReliabilityHigh system latency / infrastructure slowdown
SecuritySystem compromise
SecurityInsider theft of intellectual property
SecurityDDoS/DoS attack
SecurityMisuse of system resources
SecurityVandalism / website defacement
SecurityPhishing attack
SecuritySoftware security bug
SecurityHardware security bug
SecurityEmerging serious vulnerability
Fill in scores, sort by Ranking descending.

Step 4 — Review for outliers before finalizing

Sorting by ranking is a starting heuristic, not a final answer. Perform a manual outlier review:

  • Low-probability, high-impact outliers: A scenario ranked 0.10 (P=0.1, I=1.0) may still demand a response plan because the consequence is catastrophic. Flag any scenario with I=1.0 regardless of ranking.
  • Hidden dependencies: A seemingly low-impact risk may become critical if it disables a monitoring or logging system that other incident responses depend on.
  • Correlated risks: An earthquake can simultaneously trigger power outage, connectivity loss, and fire. Assess whether scenarios cluster and whether the combined impact exceeds individual rankings.
  • Expert review: Solicit review from someone outside the team who can identify risks with hidden factors or dependencies. Groupthink tends to underweight unfamiliar scenarios.

Step 5 — Document scope, assumptions, and review cadence

Record alongside the register:

  • Date of assessment
  • Location(s) assessed
  • Existing controls assumed (e.g., "assumes redundant ISP, UPS, and diesel generator")
  • Owner responsible for next review
  • Planned review cadence (minimum: annually; recommended: after any major infrastructure change or post-incident)

Key Principles

Quantification counters groupthink. Intuitive risk assessment tends to weight salient scenarios (recent news events, memorable near-misses) over statistically more likely ones. A scored matrix forces explicit probability and impact estimates, making invisible assumptions visible and debatable.

Probability is infrastructure-dependent, not universal. A cloud-hosted system with multi-region failover has a different authentication system downtime probability than a single on-premises deployment. Score after accounting for existing controls — but also model what happens if a control fails.

Ratings must evolve with the system. Risk posture changes when the organization adds redundant internet circuits, migrates to a different cloud region, or discovers a new vulnerability class. Schedule reviews; do not treat the register as a one-time artifact.

Low probability does not mean no plan. Scenarios with I=0.8 or I=1.0 warrant response plans even if their ranking is low. The ranking guides where to invest preparation effort first, not which risks to ignore entirely.

Assess dependencies alongside primary systems. Key operational functions include their underlying dependencies — networking, authentication, application-layer components. A mission-essential service that depends on a Tier 3 authentication system effectively elevates that dependency to Tier 1 during an incident.

Multi-location organizations need per-site assessments. Global rankings mask site-specific exposure. A site in earthquake country has different environmental risk than headquarters. Run the matrix per site and aggregate.

Examples

Example: SaaS company, single US West Coast datacenter, no redundant power

ThemeRiskPIRankingSystems Impacted
SecuritySystem compromise0.61.00.60Auth service (T1), API (T1)
InfrastructurePower outage0.60.80.48All systems
SecuritySoftware security bug0.60.80.48API (T1)
SecurityPhishing attack0.80.50.40Email (T2), SSO (T1)
InfrastructureLoss of internet connectivity0.41.00.40All externally facing (T1)
SecurityDDoS/DoS attack0.40.80.32API (T1)
EnvironmentalEarthquake0.40.80.32All systems
SecurityEmerging serious vulnerability0.21.00.20All systems
EnvironmentalFlood0.20.50.10On-prem equipment (T2)
Outlier flag: Emerging serious vulnerability ranks 0.20 but Impact=1.0. Flag for mandatory response plan despite low ranking. Earthquake and internet connectivity loss are correlated — their combined impact may be higher than either alone.

Example: Adjusting for existing controls

After adding a backup ISP: Loss of internet connectivity drops from P=0.4 to P=0.2, Ranking drops from 0.40 to 0.20. After adding UPS and generator: Power outage drops from P=0.6 to P=0.2, Ranking drops from 0.48 to 0.16. Re-run the matrix when controls change to confirm prioritization remains valid.

References

  • Building Secure and Reliable Systems (Blank, Oprea et al., Google/O'Reilly, 2020)
- Chapter 16 "Disaster Planning" — pp. 363–382: disaster type taxonomy (pp. 364), disaster risk analysis methodology (pp. 366), system criticality classification (pp. 366), dynamic response strategy phases (pp. 365) - Appendix A "A Disaster Risk Assessment Matrix" — pp. 499–500: Table A-1 with full probability scale, impact scale, pre-seeded scenario taxonomy, and Ranking = P×I formula
  • Next steps after completing the register: incident response team setup (Chapter 16, pp. 367–375), response plan development (pp. 371–373), disaster recovery test planning (pp. 376–382)

License

This skill is licensed under CC-BY-SA-4.0. Source: BookForge — Building Secure And Reliable Systems by Unknown.

Related BookForge Skills

This skill is standalone. Browse more BookForge skills: bookforge-skills

数据来源:ClawHub ↗ · 中文优化:龙虾技能库
OpenClaw 技能定制 / 插件定制 / 私有工作流定制

免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制

了解定制服务