
Risk Assessment for Visitor Access & Escort Coverage
N.B. If ABC outputs are not available, use last period allocations or defend your proxy assumptions clearly. Ensure all comparisons reconcile to [FinanceSystem] totals within ±[ReconciliationTolerance]%.
📄 Prompt Template
Produce a formal risk assessment for visitor access and escort procedures covering [VisitorCategories] across [Zones] protecting [AssetsAtRisk]. Evaluate threats (tailgating, badge misuse, social engineering), vulnerabilities (sightlines, choke points), and current controls. Calibrate to [RiskAppetite] and determine residual risk for the next [AssessmentPeriod] in [Region]. Output format: (1) Context & scope statement (≤100 words). (2) 5×5 likelihood/impact matrix with risk ratings and color keys. (3) Risk Register table (Threat, Vulnerability, Scenario, Existing Controls, Inherent Risk, Proposed Controls, Residual Risk, Control Owner, Due Date). (4) Escort Coverage Analysis table (Zone, Visitor Type, Required Escort Level, Ratio, Monitoring Method). (5) Residual risk heatmap narrative and prioritized mitigation roadmap (90-day, 180-day). Include validation methods (spot checks, CCTV analytics, VMS sampling) and acceptance criteria for each mitigation.