When implementing risk control measures, it is important to identify the points and processes of the financial transaction and then relate them according to the type of IT risk management framework used for the Global Risk Assessment (GRA).
One of the most common risk management framework models is the "V" model, which resembles the one used in IT, for the control, development and implementation of projects. It follows a chronological process from the definition of a project to its implementation. Based on this model, and the stratification contemplated therein, considerations are made to implement methods and solutions for risk mitigation.
This model ensures that:
It is divided into four Phases and has a total of seven stages of progression:
PHASE I - RISK MODEL MANAGEMENT POLICIES AND GOVERNANCE FRAMEWORK:
Understand the reasons behind creating a model and expectations about how its outcome will be used.
The model is logical, is developed in a robust and appropriate manner for its intended purpose and is consistent with global standards.
(FLOD) First Line of Defense) control to ensure that the model is conceptually correct, that the data used are adequate, and that the results fulfill the intended purpose.
PHASE II- VALIDATION OF THE MODEL AND INDEPENDENT REVIEW OF STANDARDS
Second Line of Defense (SLOD) control where key models are subjected to independent review to provide a reliable test and additional assurance to management, helping to identify limitations prior to model use.
PHASE III- DEVELOPMENT OF THE MODEL AND IMPLEMENTATION OF STANDARDS
The model has already received appropriate approval from the relevant authority or responsible individual(s) before being used or implemented
PHASE IV- MODEL DEFINITION, IDENTIFICATION AND INVENTORY
The model has already been implemented according to its original design and purpose after appropriate tests have been performed
The model is working satisfactorily and is being used according to its original design and purpose. This includes a series of activities, including first line monitoring and validation, as well as independent validation and review.
There are ready-to-use software products that are properly supported so that their implementation is smooth and seamless, allowing to establish or complement the lines of defense against risk at different levels.