Operational Risk

How to Build an Enterprise Risk Management Framework from Scratch

April 27, 2026 Rebecca Leung
Table of Contents

Your bank partner just asked for your ERM framework documentation. Or your board got a risk question they couldn’t answer. Or your head of compliance said “we need a formal risk program” for the third time. Whatever the trigger — here’s how to actually build it.

Not the theory. The steps.

TL;DR

  • An ERM framework is a governance structure, not a document — it defines who owns risk, how much is acceptable, how it’s measured, and how it’s reported
  • Six core components: governance, risk appetite, risk taxonomy, RCSA, KRIs, and board reporting
  • COSO ERM 2017 is the dominant US framework for regulated institutions; ISO 31000 is lighter and better for smaller companies
  • A functional framework for a small to mid-size company takes 90–120 days to build from scratch
  • The most common failure: building a framework that lives in a folder instead of shaping actual decisions

Why Most ERM Programs Fail Before They Start

The failure mode isn’t technical — it’s political. An ERM framework requires the board and executive team to actually define what risks they’re willing to take and then be accountable for staying within those bounds. That’s uncomfortable. Risk owners resist having their risk levels documented because documentation creates accountability.

The second failure mode is over-engineering. Teams spend months designing elaborate risk taxonomies and scoring matrices and never get to the point where actual risks are being tracked and reported. The framework becomes the project, not the tool.

Build the minimum viable governance structure first. Get it working. Then add complexity only where operational reality demands it.

The Six Components (And the Right Build Order)

1. Governance Structure

Before you can assess risks, someone has to own them. Governance defines who.

Board-level: Most financial institutions require a board risk committee or a full board that takes on risk oversight responsibility. The risk committee approves the risk appetite statement, receives risk reporting, and provides oversight of the second line. If you’re a regulated bank or a fintech with a bank partner, the OCC’s Corporate Risk Governance handbook describes what board risk oversight should look like.

Management-level: The management risk committee (sometimes called the Risk Management Committee or Enterprise Risk Committee) meets regularly — typically monthly — to review risk profiles, discuss emerging risks, and escalate issues to the board. This is where operational risk decisions actually get made.

Risk ownership by business unit: Every risk category needs an owner. Credit risk lives with lending. Operational risk is shared. Compliance risk lives with the compliance function. Technology risk lives with the CTO or CISO. Document the ownership explicitly — ambiguous ownership is how risks fall through the gaps.

The Three Lines of Defense model:

LineWhoWhat They Do
First LineBusiness unitsOwn and manage risks in their day-to-day operations
Second LineRisk, Compliance, LegalSet standards, provide oversight, challenge the first line
Third LineInternal AuditIndependent assessment of the overall framework’s effectiveness

At a small fintech, one person might wear two hats — that’s fine. Document it explicitly so examiners and board members understand the separation (or lack thereof) of responsibilities.

2. Risk Appetite Statement

The risk appetite statement (RAS) is the most important document in an ERM framework. It’s also the one most companies either skip or write in language so vague it’s useless.

A functional RAS defines risk tolerance in terms that can actually be measured and escalated against. Not “we are conservative with credit risk” — that’s meaningless. Instead: “Credit loss tolerance: Net charge-off ratio not to exceed 2.5% in any rolling 12-month period. Risk appetite trigger at 2.0% for escalation to management risk committee.”

The six risk categories that almost always need appetite statements:

Risk CategoryExample Quantified Threshold
Financial / credit riskMax net charge-off ratio, max single obligor concentration
Operational riskMax acceptable annualized operational loss, max acceptable system downtime
Compliance / regulatory riskZero tolerance for material regulatory violations; max acceptable examination findings before escalation
Reputational riskUsually qualitative — defined trigger events requiring board notification
Strategic riskRevenue concentration limits, maximum single-customer revenue exposure
Technology / cyber riskMax acceptable RTO/RPO for critical systems, minimum uptime SLA

The board approves the RAS. The approval isn’t a rubber stamp — the board should understand what they’re approving, including the specific thresholds and what happens when they’re breached. Annual review is standard; more frequent review is triggered by material strategy changes.

3. Risk Taxonomy

A risk taxonomy is a standardized list of risk categories that defines what counts as what kind of risk. It sounds bureaucratic, but it solves a real problem: without a shared taxonomy, different parts of the organization describe the same risk in different terms, and you can’t aggregate your risk profile at the enterprise level.

A practical starting taxonomy for fintech and financial services:

Top-Level CategorySub-Categories
Credit RiskCounterparty, concentration, portfolio quality
Market RiskInterest rate, liquidity, FX (if applicable)
Operational RiskProcess failures, technology/system failures, people/talent, fraud
Compliance / Regulatory RiskConsumer protection, AML/BSA, licensing, regulatory exam findings
Technology / Cyber RiskCybersecurity incidents, data breaches, system outages, model/AI risk
Strategic RiskBusiness concentration, competitive/market disruption, M&A integration
Third-Party RiskVendor failure, concentration in critical vendors, fourth-party risk
Reputational RiskMedia/social, customer complaint trends, regulatory public enforcement

Taxonomy depth should match operational complexity. A 50-person fintech doesn’t need 200 sub-categories — they need 20–30 that reflect the risks they’re actually managing. Expand the taxonomy as the business grows and as risk types become material enough to warrant distinct tracking.

4. Risk Identification and Assessment (RCSA)

The Risk and Control Self-Assessment (RCSA) is the operational engine of the ERM framework. It’s how you identify what risks exist, how severe they are, and whether controls are actually reducing them.

The core RCSA methodology:

  1. Inherent risk: How bad would this risk be if no controls existed? Score on a 5x5 matrix (likelihood 1–5 × impact 1–5 = inherent risk score 1–25).
  2. Control assessment: What controls exist? How effective are they? Score control effectiveness 1–5 (1 = controls absent or ineffective; 5 = controls strong and consistently operating).
  3. Residual risk: After controls, what’s the remaining risk level? Residual = Inherent risk adjusted downward by control effectiveness.
  4. Risk response: Is residual risk within appetite? If yes, document and monitor. If no, escalate for treatment — additional controls, risk transfer, risk avoidance, or explicit acceptance with board approval.

Facilitation approach:

  • For a first RCSA: use structured workshops with business unit leaders. Don’t survey — conversations surface context that surveys miss.
  • Frequency: annual full RCSA, plus triggered re-assessment when new products launch, significant process changes occur, or incidents happen.
  • Owner: the risk function facilitates; business unit leaders own the risk ratings in their domains.

Watch for gaming. The most common RCSA problem is that business units underrate their own risks to avoid scrutiny. Second-line challenge is critical: when a business unit rates a risk as “low” and you have data suggesting otherwise (complaints, incidents, regulatory findings), challenge it with evidence.

5. Key Risk Indicators (KRIs)

Key risk indicators are metrics that signal whether a risk is moving toward or beyond appetite. They’re your early warning system.

KRI design rules:

  • Each KRI must tie to a specific risk category
  • Must have a defined threshold: green (within appetite), amber (approaching limit, escalate to management), red (at or beyond limit, escalate to board)
  • Must have a defined owner responsible for reporting
  • Should be collected from existing operational data, not created for KRI purposes

Examples by risk category:

Risk CategoryKRIGreenAmberRed
Operational RiskOperational loss events (count)≤5/quarter6–10/quarter>10/quarter
Technology RiskCritical system unplanned downtime<4 hrs/month4–8 hrs/month>8 hrs/month
Compliance RiskOpen regulatory findings (count)01–2≥3
Third-Party RiskCritical vendors with overdue assessments01≥2
Cyber RiskDays to patch critical vulnerabilities≤14 days15–30 days>30 days
Reputational RiskCustomer complaint volume increase (MoM)<10%10–20%>20%

A reasonable starting library is 15–25 KRIs. More than that is noise at the beginning. Focus on the KRIs that represent your highest-scoring residual risks from the RCSA and your known regulatory hot buttons.

6. Risk Reporting

Risk reporting is what makes the framework visible to the people who need to act on it. Without good reporting, the ERM framework exists only on paper.

The reporting stack:

Monthly (management risk committee):

  • KRI dashboard with color-coded status
  • New risk events and escalations since last period
  • Open action items and aging
  • Risk appetite metrics: current vs. threshold

Quarterly (board risk committee):

  • Executive summary: top 5 risks and movement vs. prior quarter
  • Risk appetite metrics with year-over-year trend
  • RCSA summary: highest residual risks and control ratings
  • Regulatory and audit findings update (count, status, aging)
  • Emerging risks on the horizon

Annual (full board):

  • Risk appetite statement review and re-approval
  • Annual RCSA results and changes to the risk profile
  • ERM program effectiveness assessment
  • External environment: regulatory changes, industry incidents

What makes board reporting actually useful:

  • Lead with the risks, not the process. Boards don’t want a report on “how the ERM program is running” — they want to know what risks are elevated and why.
  • Use visuals. A heat map showing risk position relative to appetite communicates more in 5 seconds than a table of risk scores.
  • Tell them what changed and why. Year-over-year comparisons are more useful than point-in-time snapshots.
  • Connect risks to strategy. “Concentration in our top three customers represents 60% of revenue — if any one churns, that’s a strategic risk in the amber range” lands better than “strategic risk: amber.”

Choosing a Framework: COSO ERM vs. ISO 31000

Both COSO ERM 2017 and ISO 31000 are credible frameworks. The choice should be based on your regulatory environment and organizational complexity.

COSO ERM 2017ISO 31000
Best forUS regulated institutions, public companies, SOX fintechsSmaller companies, international organizations, simpler governance structures
Structure5 components, 20 principlesPrinciples, framework, process
Governance focusHigh — deep integration with strategy and board oversightModerate — leadership commitment without prescriptive governance structures
Regulatory recognitionWidely cited by OCC, Fed, FDICLess recognized by US banking regulators
Implementation complexityHigherLower

For most US financial services companies — banks, credit unions, fintechs with bank partners — COSO ERM 2017 is the right choice. It’s what regulators expect to see referenced. The OCC’s examination handbooks, the Fed’s guidance, and most bank sponsor oversight frameworks are written with COSO in mind.

ISO 31000 is a reasonable choice for smaller companies that don’t have regulatory pressure and want to build good risk habits without the governance overhead. Many companies use ISO 31000 for the risk process (how risks are identified, assessed, treated, and monitored) while using COSO ERM for the governance structure — that’s a workable hybrid.

The 90-120 Day Build Roadmap

Days 1–30: Design and Governance

  • Identify ERM champion and executive sponsor
  • Draft governance structure: board risk committee charter, management risk committee charter, risk ownership matrix
  • Select framework (COSO ERM 2017 vs. ISO 31000)
  • Conduct discovery interviews with business unit leaders to understand current risk state
  • Draft risk taxonomy (15–25 categories) for executive review

Deliverables: Governance documents, risk taxonomy, stakeholder mapping

Days 30–60: Risk Appetite and First RCSA

  • Draft risk appetite statement with input from executive team
  • Board risk committee reviews and approves RAS
  • Facilitate first RCSA workshops with each business unit
  • Compile RCSA results into enterprise risk register
  • Identify top 10 risks by residual risk score

Deliverables: Board-approved risk appetite statement, initial enterprise risk register

Days 60–90: KRIs, Monitoring, and Reporting

  • Define 15–25 KRIs tied to highest residual risks
  • Identify data sources for each KRI (who pulls the data, when, from where)
  • Build initial KRI dashboard (even a well-formatted Excel file works)
  • Draft first management risk committee report
  • Run first management risk committee meeting

Deliverables: KRI library, KRI dashboard, first risk committee meeting packet

Days 90–120: Board Presentation and Program Launch

  • Present risk framework and initial results to board risk committee
  • Board approves risk appetite statement (if not already done in Day 60)
  • Establish ongoing calendar: monthly MRC, quarterly board risk committee, annual full RCSA
  • Document ERM policy and program charter
  • Identify gaps and year-1 enhancement roadmap

Deliverables: Board presentation, ERM policy, ongoing governance calendar

Common Implementation Mistakes

Mistake 1: Risk appetite with no quantification. “We have a low appetite for compliance risk” means nothing. “Zero tolerance for material regulatory violations; management escalation triggered by any consent order or MRA” is measurable and actionable.

Mistake 2: Risk registers that don’t get updated. A risk register that’s updated annually and sits in a SharePoint folder isn’t a risk management tool — it’s a compliance artifact. The register needs to be a living document, updated whenever new risks emerge or the risk environment changes.

Mistake 3: Treating RCSA as a one-time exercise. The RCSA is a process, not a project. Build it into the annual calendar with triggered reassessments for new products, major system changes, and post-incident reviews.

Mistake 4: KRIs that require new data collection. If your KRI requires someone to manually pull data from three different systems every month, it won’t get done. Start with KRIs sourced from data that already flows through normal operations — your ticketing system, your compliance tracking tool, your incident log.

Mistake 5: Building for the regulator instead of the business. The most dysfunctional ERM programs are the ones built to satisfy an examiner rather than to inform decisions. Regulators can tell the difference. Build a framework that your executive team actually uses to make decisions, and the regulatory satisfaction follows automatically.

So What: Where to Start Today

The biggest mistake is treating ERM as a future initiative. If your bank partner is asking for documentation, if your board has been asking about risk governance, if you’ve had a close call with an operational failure or regulatory inquiry — those are signals that the framework is overdue.

Start with governance and the risk appetite statement. Everything else in the framework can be built progressively, but these two components need board-level commitment before anything else can function. A risk committee without an approved appetite statement is just a meeting.

The Enterprise Risk Management Framework kit gives you the complete documentation structure: risk appetite statement template, Three Lines of Defense model, risk committee charter, board reporting dashboard, and a 33-page implementation guide covering every component — sized for companies from startup to 200+ employees.


Related reading:


FAQ

Q: Does my fintech actually need an ERM framework if we’re not a bank?

If you have a bank sponsor, the sponsor’s examiner will eventually ask for evidence of your risk governance program as part of their third-party oversight responsibilities. OCC Bulletin 2013-29 and the 2023 interagency third-party risk guidance both require bank sponsors to assess the risk management programs of their fintech partners. “We don’t have one yet” is an acceptable answer for a 10-person seed-stage company; it’s not acceptable for a Series B fintech processing meaningful transaction volume.

Q: What’s the minimum viable ERM program for a 25-person company?

For a very small company, the minimum is: (1) documented risk ownership — who is responsible for which risk domains; (2) a basic risk register — your top 10–15 risks with ownership, current status, and any active mitigations; (3) a risk appetite statement, even if it’s one page; (4) a quarterly risk review with the executive team. You don’t need a formal risk committee or elaborate reporting infrastructure at 25 people. You need documented accountability and a regular cadence of discussion.

Q: Should I hire a full-time CRO or use a fractional risk officer to build this?

For companies under $50M in revenue or 100 employees, fractional or part-time risk leadership is often the right choice for the build phase. A fractional CRO with ERM experience can design the framework, facilitate the first RCSA, and stand up the governance structure in 90 days — then hand it off to a compliance/risk generalist to run operationally. Hiring a full-time CRO before the framework exists often results in a very expensive person spending most of their time on documentation that a more cost-effective resource could have built.

Q: How does ERM connect to individual programs like third-party risk management or business continuity?

The ERM framework is the umbrella; individual programs are the execution layer. Third-party risk, business continuity, cyber risk, model risk — these are all risk domains that the ERM framework identifies, assesses, and monitors at the enterprise level. Each domain typically has its own policy, process, and tools that live underneath the ERM umbrella. The ERM risk register and KRI dashboard should surface the highest risks from each domain; the individual programs handle the tactical management. The connection point is risk ownership: the owner of each risk domain feeds their status into the enterprise risk reporting.

Frequently Asked Questions

What is an enterprise risk management framework?
An enterprise risk management (ERM) framework is the documented structure that defines how an organization identifies, assesses, prioritizes, responds to, and monitors risks across the entire enterprise. It includes governance (who owns risk decisions), risk appetite (how much risk is acceptable), assessment methodology (how risks are measured), and reporting (how risk information reaches the board and senior management). COSO ERM 2017 and ISO 31000 are the two most widely used frameworks in US financial services.
What are the components of an ERM framework?
A functional ERM framework has six core components: (1) Governance structure — board risk committee, management risk committee, risk ownership by business unit; (2) Risk appetite statement — quantified thresholds by risk category approved by the board; (3) Risk taxonomy — standardized categories that define what counts as what kind of risk; (4) Risk identification and assessment — RCSA process with inherent/residual risk scoring; (5) Risk monitoring — key risk indicators (KRIs) with threshold triggers; (6) Risk reporting — regular dashboards to management and board. Everything else hangs off these six.
How long does it take to build an ERM framework?
A functional ERM framework for a small to mid-size company takes 90 to 120 days to build if you're starting from scratch. The first 30 days focus on governance and design decisions. Days 30–60 cover risk appetite, taxonomy, and the first RCSA. Days 60–90 establish KRI monitoring and reporting cadence. Days 90–120 involve presenting to the board and running the first formal risk committee meeting. Larger organizations with more complex structures may take 6 to 9 months, primarily due to stakeholder alignment and governance approval processes.
What is a risk appetite statement and what should it include?
A risk appetite statement (RAS) is a board-approved document defining how much risk the organization is willing to accept in pursuit of its objectives. It should include: quantified thresholds for each major risk category (financial loss tolerance, regulatory penalty tolerance, reputational impact tolerance, operational disruption tolerance), qualitative statements for categories that are harder to quantify, a connection to strategic objectives, and escalation triggers. The board approves the RAS; management operates within it; the RAS is reviewed annually or when strategy changes materially.
What is COSO ERM and should I use it?
COSO ERM 2017 (Enterprise Risk Management — Integrating with Strategy and Performance) is the dominant ERM framework for US public companies, financial institutions, and SOX-regulated organizations. It has 5 components and 20 principles that organize risk management around strategy and performance, not just risk avoidance. It's the right choice if you're a regulated financial institution, a public company, or a company whose bank partner or regulator expects to see a formal governance structure. ISO 31000 is a lighter-weight alternative better suited to smaller organizations or those outside the US financial services regulatory environment.
What does the OCC expect from an ERM framework at a bank or fintech?
The OCC expects regulated institutions to have board-level risk oversight (a risk committee or equivalent), a documented risk appetite approved by the board, clear lines of accountability (the Three Lines of Defense model), a process for identifying and assessing risks across the enterprise, and regular risk reporting to senior management and the board. The OCC's Corporate Risk Governance handbook and Safety and Soundness standards are the primary references. For fintechs working with bank sponsors, the sponsor's examiner will often ask to see evidence of the fintech's ERM structure as part of oversight.
Rebecca Leung

Rebecca Leung

Rebecca Leung has 8+ years of risk and compliance experience across first and second line roles at commercial banks, asset managers, and fintechs. Former management consultant advising financial institutions on risk strategy. Founder of RiskTemplates.

Related Framework

Enterprise Risk Management Framework (ERMF)

Complete ERM documentation: risk appetite, 3 Lines of Defense, committee charter, and board reporting.

Immaterial Findings ✉️

Weekly newsletter

Sharp risk & compliance insights practitioners actually read. Enforcement actions, regulatory shifts, and practical frameworks — no fluff, no filler.

Join practitioners from banks, fintechs, and asset managers. Delivered weekly.