How to Build an Enterprise Risk Management Framework from Scratch
Table of Contents
Your bank partner just asked for your ERM framework documentation. Or your board got a risk question they couldn’t answer. Or your head of compliance said “we need a formal risk program” for the third time. Whatever the trigger — here’s how to actually build it.
Not the theory. The steps.
TL;DR
- An ERM framework is a governance structure, not a document — it defines who owns risk, how much is acceptable, how it’s measured, and how it’s reported
- Six core components: governance, risk appetite, risk taxonomy, RCSA, KRIs, and board reporting
- COSO ERM 2017 is the dominant US framework for regulated institutions; ISO 31000 is lighter and better for smaller companies
- A functional framework for a small to mid-size company takes 90–120 days to build from scratch
- The most common failure: building a framework that lives in a folder instead of shaping actual decisions
Why Most ERM Programs Fail Before They Start
The failure mode isn’t technical — it’s political. An ERM framework requires the board and executive team to actually define what risks they’re willing to take and then be accountable for staying within those bounds. That’s uncomfortable. Risk owners resist having their risk levels documented because documentation creates accountability.
The second failure mode is over-engineering. Teams spend months designing elaborate risk taxonomies and scoring matrices and never get to the point where actual risks are being tracked and reported. The framework becomes the project, not the tool.
Build the minimum viable governance structure first. Get it working. Then add complexity only where operational reality demands it.
The Six Components (And the Right Build Order)
1. Governance Structure
Before you can assess risks, someone has to own them. Governance defines who.
Board-level: Most financial institutions require a board risk committee or a full board that takes on risk oversight responsibility. The risk committee approves the risk appetite statement, receives risk reporting, and provides oversight of the second line. If you’re a regulated bank or a fintech with a bank partner, the OCC’s Corporate Risk Governance handbook describes what board risk oversight should look like.
Management-level: The management risk committee (sometimes called the Risk Management Committee or Enterprise Risk Committee) meets regularly — typically monthly — to review risk profiles, discuss emerging risks, and escalate issues to the board. This is where operational risk decisions actually get made.
Risk ownership by business unit: Every risk category needs an owner. Credit risk lives with lending. Operational risk is shared. Compliance risk lives with the compliance function. Technology risk lives with the CTO or CISO. Document the ownership explicitly — ambiguous ownership is how risks fall through the gaps.
The Three Lines of Defense model:
| Line | Who | What They Do |
|---|---|---|
| First Line | Business units | Own and manage risks in their day-to-day operations |
| Second Line | Risk, Compliance, Legal | Set standards, provide oversight, challenge the first line |
| Third Line | Internal Audit | Independent assessment of the overall framework’s effectiveness |
At a small fintech, one person might wear two hats — that’s fine. Document it explicitly so examiners and board members understand the separation (or lack thereof) of responsibilities.
2. Risk Appetite Statement
The risk appetite statement (RAS) is the most important document in an ERM framework. It’s also the one most companies either skip or write in language so vague it’s useless.
A functional RAS defines risk tolerance in terms that can actually be measured and escalated against. Not “we are conservative with credit risk” — that’s meaningless. Instead: “Credit loss tolerance: Net charge-off ratio not to exceed 2.5% in any rolling 12-month period. Risk appetite trigger at 2.0% for escalation to management risk committee.”
The six risk categories that almost always need appetite statements:
| Risk Category | Example Quantified Threshold |
|---|---|
| Financial / credit risk | Max net charge-off ratio, max single obligor concentration |
| Operational risk | Max acceptable annualized operational loss, max acceptable system downtime |
| Compliance / regulatory risk | Zero tolerance for material regulatory violations; max acceptable examination findings before escalation |
| Reputational risk | Usually qualitative — defined trigger events requiring board notification |
| Strategic risk | Revenue concentration limits, maximum single-customer revenue exposure |
| Technology / cyber risk | Max acceptable RTO/RPO for critical systems, minimum uptime SLA |
The board approves the RAS. The approval isn’t a rubber stamp — the board should understand what they’re approving, including the specific thresholds and what happens when they’re breached. Annual review is standard; more frequent review is triggered by material strategy changes.
3. Risk Taxonomy
A risk taxonomy is a standardized list of risk categories that defines what counts as what kind of risk. It sounds bureaucratic, but it solves a real problem: without a shared taxonomy, different parts of the organization describe the same risk in different terms, and you can’t aggregate your risk profile at the enterprise level.
A practical starting taxonomy for fintech and financial services:
| Top-Level Category | Sub-Categories |
|---|---|
| Credit Risk | Counterparty, concentration, portfolio quality |
| Market Risk | Interest rate, liquidity, FX (if applicable) |
| Operational Risk | Process failures, technology/system failures, people/talent, fraud |
| Compliance / Regulatory Risk | Consumer protection, AML/BSA, licensing, regulatory exam findings |
| Technology / Cyber Risk | Cybersecurity incidents, data breaches, system outages, model/AI risk |
| Strategic Risk | Business concentration, competitive/market disruption, M&A integration |
| Third-Party Risk | Vendor failure, concentration in critical vendors, fourth-party risk |
| Reputational Risk | Media/social, customer complaint trends, regulatory public enforcement |
Taxonomy depth should match operational complexity. A 50-person fintech doesn’t need 200 sub-categories — they need 20–30 that reflect the risks they’re actually managing. Expand the taxonomy as the business grows and as risk types become material enough to warrant distinct tracking.
4. Risk Identification and Assessment (RCSA)
The Risk and Control Self-Assessment (RCSA) is the operational engine of the ERM framework. It’s how you identify what risks exist, how severe they are, and whether controls are actually reducing them.
The core RCSA methodology:
- Inherent risk: How bad would this risk be if no controls existed? Score on a 5x5 matrix (likelihood 1–5 × impact 1–5 = inherent risk score 1–25).
- Control assessment: What controls exist? How effective are they? Score control effectiveness 1–5 (1 = controls absent or ineffective; 5 = controls strong and consistently operating).
- Residual risk: After controls, what’s the remaining risk level? Residual = Inherent risk adjusted downward by control effectiveness.
- Risk response: Is residual risk within appetite? If yes, document and monitor. If no, escalate for treatment — additional controls, risk transfer, risk avoidance, or explicit acceptance with board approval.
Facilitation approach:
- For a first RCSA: use structured workshops with business unit leaders. Don’t survey — conversations surface context that surveys miss.
- Frequency: annual full RCSA, plus triggered re-assessment when new products launch, significant process changes occur, or incidents happen.
- Owner: the risk function facilitates; business unit leaders own the risk ratings in their domains.
Watch for gaming. The most common RCSA problem is that business units underrate their own risks to avoid scrutiny. Second-line challenge is critical: when a business unit rates a risk as “low” and you have data suggesting otherwise (complaints, incidents, regulatory findings), challenge it with evidence.
5. Key Risk Indicators (KRIs)
Key risk indicators are metrics that signal whether a risk is moving toward or beyond appetite. They’re your early warning system.
KRI design rules:
- Each KRI must tie to a specific risk category
- Must have a defined threshold: green (within appetite), amber (approaching limit, escalate to management), red (at or beyond limit, escalate to board)
- Must have a defined owner responsible for reporting
- Should be collected from existing operational data, not created for KRI purposes
Examples by risk category:
| Risk Category | KRI | Green | Amber | Red |
|---|---|---|---|---|
| Operational Risk | Operational loss events (count) | ≤5/quarter | 6–10/quarter | >10/quarter |
| Technology Risk | Critical system unplanned downtime | <4 hrs/month | 4–8 hrs/month | >8 hrs/month |
| Compliance Risk | Open regulatory findings (count) | 0 | 1–2 | ≥3 |
| Third-Party Risk | Critical vendors with overdue assessments | 0 | 1 | ≥2 |
| Cyber Risk | Days to patch critical vulnerabilities | ≤14 days | 15–30 days | >30 days |
| Reputational Risk | Customer complaint volume increase (MoM) | <10% | 10–20% | >20% |
A reasonable starting library is 15–25 KRIs. More than that is noise at the beginning. Focus on the KRIs that represent your highest-scoring residual risks from the RCSA and your known regulatory hot buttons.
6. Risk Reporting
Risk reporting is what makes the framework visible to the people who need to act on it. Without good reporting, the ERM framework exists only on paper.
The reporting stack:
Monthly (management risk committee):
- KRI dashboard with color-coded status
- New risk events and escalations since last period
- Open action items and aging
- Risk appetite metrics: current vs. threshold
Quarterly (board risk committee):
- Executive summary: top 5 risks and movement vs. prior quarter
- Risk appetite metrics with year-over-year trend
- RCSA summary: highest residual risks and control ratings
- Regulatory and audit findings update (count, status, aging)
- Emerging risks on the horizon
Annual (full board):
- Risk appetite statement review and re-approval
- Annual RCSA results and changes to the risk profile
- ERM program effectiveness assessment
- External environment: regulatory changes, industry incidents
What makes board reporting actually useful:
- Lead with the risks, not the process. Boards don’t want a report on “how the ERM program is running” — they want to know what risks are elevated and why.
- Use visuals. A heat map showing risk position relative to appetite communicates more in 5 seconds than a table of risk scores.
- Tell them what changed and why. Year-over-year comparisons are more useful than point-in-time snapshots.
- Connect risks to strategy. “Concentration in our top three customers represents 60% of revenue — if any one churns, that’s a strategic risk in the amber range” lands better than “strategic risk: amber.”
Choosing a Framework: COSO ERM vs. ISO 31000
Both COSO ERM 2017 and ISO 31000 are credible frameworks. The choice should be based on your regulatory environment and organizational complexity.
| COSO ERM 2017 | ISO 31000 | |
|---|---|---|
| Best for | US regulated institutions, public companies, SOX fintechs | Smaller companies, international organizations, simpler governance structures |
| Structure | 5 components, 20 principles | Principles, framework, process |
| Governance focus | High — deep integration with strategy and board oversight | Moderate — leadership commitment without prescriptive governance structures |
| Regulatory recognition | Widely cited by OCC, Fed, FDIC | Less recognized by US banking regulators |
| Implementation complexity | Higher | Lower |
For most US financial services companies — banks, credit unions, fintechs with bank partners — COSO ERM 2017 is the right choice. It’s what regulators expect to see referenced. The OCC’s examination handbooks, the Fed’s guidance, and most bank sponsor oversight frameworks are written with COSO in mind.
ISO 31000 is a reasonable choice for smaller companies that don’t have regulatory pressure and want to build good risk habits without the governance overhead. Many companies use ISO 31000 for the risk process (how risks are identified, assessed, treated, and monitored) while using COSO ERM for the governance structure — that’s a workable hybrid.
The 90-120 Day Build Roadmap
Days 1–30: Design and Governance
- Identify ERM champion and executive sponsor
- Draft governance structure: board risk committee charter, management risk committee charter, risk ownership matrix
- Select framework (COSO ERM 2017 vs. ISO 31000)
- Conduct discovery interviews with business unit leaders to understand current risk state
- Draft risk taxonomy (15–25 categories) for executive review
Deliverables: Governance documents, risk taxonomy, stakeholder mapping
Days 30–60: Risk Appetite and First RCSA
- Draft risk appetite statement with input from executive team
- Board risk committee reviews and approves RAS
- Facilitate first RCSA workshops with each business unit
- Compile RCSA results into enterprise risk register
- Identify top 10 risks by residual risk score
Deliverables: Board-approved risk appetite statement, initial enterprise risk register
Days 60–90: KRIs, Monitoring, and Reporting
- Define 15–25 KRIs tied to highest residual risks
- Identify data sources for each KRI (who pulls the data, when, from where)
- Build initial KRI dashboard (even a well-formatted Excel file works)
- Draft first management risk committee report
- Run first management risk committee meeting
Deliverables: KRI library, KRI dashboard, first risk committee meeting packet
Days 90–120: Board Presentation and Program Launch
- Present risk framework and initial results to board risk committee
- Board approves risk appetite statement (if not already done in Day 60)
- Establish ongoing calendar: monthly MRC, quarterly board risk committee, annual full RCSA
- Document ERM policy and program charter
- Identify gaps and year-1 enhancement roadmap
Deliverables: Board presentation, ERM policy, ongoing governance calendar
Common Implementation Mistakes
Mistake 1: Risk appetite with no quantification. “We have a low appetite for compliance risk” means nothing. “Zero tolerance for material regulatory violations; management escalation triggered by any consent order or MRA” is measurable and actionable.
Mistake 2: Risk registers that don’t get updated. A risk register that’s updated annually and sits in a SharePoint folder isn’t a risk management tool — it’s a compliance artifact. The register needs to be a living document, updated whenever new risks emerge or the risk environment changes.
Mistake 3: Treating RCSA as a one-time exercise. The RCSA is a process, not a project. Build it into the annual calendar with triggered reassessments for new products, major system changes, and post-incident reviews.
Mistake 4: KRIs that require new data collection. If your KRI requires someone to manually pull data from three different systems every month, it won’t get done. Start with KRIs sourced from data that already flows through normal operations — your ticketing system, your compliance tracking tool, your incident log.
Mistake 5: Building for the regulator instead of the business. The most dysfunctional ERM programs are the ones built to satisfy an examiner rather than to inform decisions. Regulators can tell the difference. Build a framework that your executive team actually uses to make decisions, and the regulatory satisfaction follows automatically.
So What: Where to Start Today
The biggest mistake is treating ERM as a future initiative. If your bank partner is asking for documentation, if your board has been asking about risk governance, if you’ve had a close call with an operational failure or regulatory inquiry — those are signals that the framework is overdue.
Start with governance and the risk appetite statement. Everything else in the framework can be built progressively, but these two components need board-level commitment before anything else can function. A risk committee without an approved appetite statement is just a meeting.
The Enterprise Risk Management Framework kit gives you the complete documentation structure: risk appetite statement template, Three Lines of Defense model, risk committee charter, board reporting dashboard, and a 33-page implementation guide covering every component — sized for companies from startup to 200+ employees.
Related reading:
- COSO ERM Framework Explained: The 5 Components and 20 Principles
- Vendor Risk Management: The Complete Process from Onboarding to Offboarding
- Incident Response Plan Template: The 6 Phases (and What Most Templates Miss)
FAQ
Q: Does my fintech actually need an ERM framework if we’re not a bank?
If you have a bank sponsor, the sponsor’s examiner will eventually ask for evidence of your risk governance program as part of their third-party oversight responsibilities. OCC Bulletin 2013-29 and the 2023 interagency third-party risk guidance both require bank sponsors to assess the risk management programs of their fintech partners. “We don’t have one yet” is an acceptable answer for a 10-person seed-stage company; it’s not acceptable for a Series B fintech processing meaningful transaction volume.
Q: What’s the minimum viable ERM program for a 25-person company?
For a very small company, the minimum is: (1) documented risk ownership — who is responsible for which risk domains; (2) a basic risk register — your top 10–15 risks with ownership, current status, and any active mitigations; (3) a risk appetite statement, even if it’s one page; (4) a quarterly risk review with the executive team. You don’t need a formal risk committee or elaborate reporting infrastructure at 25 people. You need documented accountability and a regular cadence of discussion.
Q: Should I hire a full-time CRO or use a fractional risk officer to build this?
For companies under $50M in revenue or 100 employees, fractional or part-time risk leadership is often the right choice for the build phase. A fractional CRO with ERM experience can design the framework, facilitate the first RCSA, and stand up the governance structure in 90 days — then hand it off to a compliance/risk generalist to run operationally. Hiring a full-time CRO before the framework exists often results in a very expensive person spending most of their time on documentation that a more cost-effective resource could have built.
Q: How does ERM connect to individual programs like third-party risk management or business continuity?
The ERM framework is the umbrella; individual programs are the execution layer. Third-party risk, business continuity, cyber risk, model risk — these are all risk domains that the ERM framework identifies, assesses, and monitors at the enterprise level. Each domain typically has its own policy, process, and tools that live underneath the ERM umbrella. The ERM risk register and KRI dashboard should surface the highest risks from each domain; the individual programs handle the tactical management. The connection point is risk ownership: the owner of each risk domain feeds their status into the enterprise risk reporting.
Related Template
Enterprise Risk Management Framework (ERMF)
Complete ERM documentation: risk appetite, 3 Lines of Defense, committee charter, and board reporting.
Frequently Asked Questions
What is an enterprise risk management framework?
What are the components of an ERM framework?
How long does it take to build an ERM framework?
What is a risk appetite statement and what should it include?
What is COSO ERM and should I use it?
What does the OCC expect from an ERM framework at a bank or fintech?
Rebecca Leung
Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.
Related Framework
Enterprise Risk Management Framework (ERMF)
Complete ERM documentation: risk appetite, 3 Lines of Defense, committee charter, and board reporting.
Keep Reading
Liquidity Stress Testing Techniques: Modeling Run-Off, Wholesale Withdrawal, and Contingent Draws
Go beyond the scenario labels. How to build defensible run-off rate assumptions, model wholesale funding cliff risk, and quantify contingent draw exposure — with the specific techniques examiners challenge.
May 4, 2026
Operational RiskRisk Matrix Template: 5x5 vs 3x3 vs Heat Map — Which to Use and How to Defend It
A risk matrix is only as good as the calibration behind it. Here's how to choose between 5x5 and 3x3, build defensible scoring criteria, and present the result in a way regulators and boards actually trust.
May 3, 2026
Operational RiskRisk Register Template: A Fintech Edition with 30+ Real Risk Examples and Scoring
Build a fintech risk register that survives examiner scrutiny. 30+ real risks across BaaS, fraud, vendor, AI, and compliance — with scoring, owners, and controls.
May 3, 2026
Immaterial Findings ✉️
Weekly newsletter
Sharp risk & compliance insights practitioners actually read. Enforcement actions, regulatory shifts, and practical frameworks — no fluff, no filler.
Join practitioners from banks, fintechs, and asset managers. Delivered weekly.