The figure shows the risk assessment workflow. It starts with experts receive a request for risk assessment, following with two parallel processes: vulnerability and exposure assessment. They assess the risk and create a report combining vulnerability and exposure results and CH data. Following their notification either the site or project manager starts with the analysis of the report, updates the CH data in the database and asks for mitigation process.
The risk assessment matrix for the risk estimation step is shown in the matrix below.