Skip to content

Risk Management

Risk management is a critical CTA competency. The review board evaluates whether you can proactively identify risks in a scenario, assess their probability and impact, and propose concrete mitigation strategies. Candidates who only address risks when prompted score lower than those who weave risk awareness throughout their architecture.

Risk Categories

Technical Risks

RiskDescriptionLikelihoodImpact
Governor limit exceedanceAutomation or integration hits platform limitsMediumHigh
Performance degradationSlow queries, page load times with data growthHighHigh
Integration failureExternal system downtime, API changesMediumHigh
Data migration errorsIncomplete, duplicated, or corrupted dataMediumHigh
Security vulnerabilityFLS bypass, sharing model gaps, injectionLowCritical
Technical debt accumulationShortcuts that compound over timeHighMedium
Platform upgrade impactSalesforce releases breaking existing functionalityLowMedium

Organizational Risks

RiskDescriptionLikelihoodImpact
Key person dependencySingle expert with no backupMediumHigh
Stakeholder misalignmentBusiness units with conflicting requirementsMediumHigh
Change resistanceUsers refusing to adopt new systemMediumHigh
Scope creepRequirements expanding beyond original scopeHighMedium
Resource availabilityTeam members pulled to other projectsMediumMedium
Vendor dependencyAppExchange vendor acquired or sunsetLowHigh
Knowledge gapsTeam lacks skills for chosen technologyMediumMedium

Data Risks

RiskDescriptionLikelihoodImpact
Data quality issuesDirty data causing automation failuresHighMedium
Data volume growthUnexpected data growth exceeding storageMediumHigh
Data lossAccidental deletion, failed migrationLowCritical
PII exposureSensitive data visible to unauthorized usersLowCritical
Data silosDuplicate data across systems with no syncMediumMedium

Integration Risks

RiskDescriptionLikelihoodImpact
API version deprecationExternal system deprecates API versionMediumHigh
Message orderingEvents processed out of orderMediumMedium
Data inconsistencySync failures creating divergent dataMediumHigh
Rate limitingExternal system throttles API callsMediumMedium
Authentication expiryTokens, certificates, or credentials expireMediumHigh

Probability x Impact Matrix

Use this matrix to prioritize risks and determine which require active mitigation vs monitoring.

quadrantChart
    title Risk Assessment Matrix
    x-axis Low Impact --> High Impact
    y-axis Low Probability --> High Probability
    quadrant-1 Mitigate Actively
    quadrant-2 Monitor Closely
    quadrant-3 Accept and Monitor
    quadrant-4 Contingency Plan
    Governor Limits: [0.75, 0.50]
    Performance: [0.80, 0.70]
    Integration Failure: [0.75, 0.45]
    Data Migration: [0.70, 0.50]
    Security Vulnerability: [0.90, 0.25]
    Key Person Dependency: [0.65, 0.55]
    Scope Creep: [0.55, 0.75]
    Change Resistance: [0.60, 0.55]
    Data Quality: [0.50, 0.70]
    Vendor Dependency: [0.70, 0.20]

Response Strategies by Quadrant

QuadrantStrategyAction
High Probability, High ImpactMitigate ActivelyInvest in prevention. Design architecture to avoid this risk. Budget time and resources.
Low Probability, High ImpactContingency PlanHave a documented response plan. Do not invest in prevention, but be prepared to respond.
High Probability, Low ImpactMonitor CloselyAccept the risk but track it. Set thresholds for escalation.
Low Probability, Low ImpactAccept and MonitorLog the risk but do not invest resources. Review periodically.

Risk Response Flow

When a risk is identified, it must be assessed, classified, and assigned a response strategy. This flow ensures consistent handling across the project.

flowchart TD
    A([Risk Identified]) --> B[Log in Risk Register]
    B --> C[Assess Probability<br/>& Impact]
    C --> D{Risk Score?}

    D -->|Critical<br/>P x I >= 9| E[Mitigate Actively<br/>Design architecture<br/>to prevent]
    D -->|High<br/>P x I >= 6| F[Contingency Plan<br/>Document response<br/>procedures]
    D -->|Medium<br/>P x I >= 3| G[Monitor Closely<br/>Set alert thresholds<br/>Review each sprint]
    D -->|Low<br/>P x I < 3| H[Accept & Log<br/>Review quarterly]

    E --> I[Assign Owner<br/>Set Review Date]
    F --> I
    G --> I
    H --> I

    I --> J{Risk Status<br/>Check}
    J -->|Materialized| K[Execute Contingency<br/>Escalate to CAB]
    J -->|Probability Changed| C
    J -->|Resolved| L[Close Risk<br/>Document Lessons Learned]
    J -->|Unchanged| M[Continue Monitoring]
    M --> J

    style A fill:#4ecdc4,stroke:#3ab5ad,color:#000
    style E fill:#e76f51,stroke:#c45a3f,color:#fff
    style F fill:#f4a261,stroke:#d4823e,color:#000
    style K fill:#e76f51,stroke:#c45a3f,color:#fff
    style L fill:#2d6a4f,stroke:#1b4332,color:#fff

Risk Register Template

A risk register is the operational tool for tracking risks throughout the project. In a CTA scenario, reference the risk register as part of your governance approach.

FieldDescriptionExample
Risk IDUnique identifierRISK-001
CategoryTechnical, Organizational, Data, IntegrationTechnical
DescriptionWhat could go wrong”SOQL queries on Account may degrade with 10M+ records”
ProbabilityHigh, Medium, LowHigh
ImpactCritical, High, Medium, LowHigh
Risk ScoreProbability x Impact (numeric)9 (3 x 3)
Mitigation StrategyWhat you will do to reduce probability or impact”Implement skinny tables, selective indexes, archive records >5 years”
Contingency PlanWhat you will do if the risk materializes”Implement async processing, increase timeout, add caching layer”
OwnerWho is responsible for monitoring this riskTechnical Architect
StatusOpen, Mitigating, Closed, MaterializedMitigating
Review DateWhen to next review this riskEvery sprint retrospective

Common CTA Scenario Risks and Mitigations

Scenario: Large Data Volume Implementation

RiskMitigationContingency
Query performance degradationSkinny tables, custom indexes, selective filtersImplement caching, async processing
Storage limit exceedanceData archival strategy, Big ObjectsPurchase additional storage, aggressive archival
Data migration timeoutBatch processing, parallel loads, off-hoursPhased migration over multiple weekends
Report performanceSummary reporting objects, async reportsCRM Analytics for complex reporting

Scenario: Multi-Cloud Implementation

RiskMitigationContingency
Cross-cloud data inconsistencyEvent-driven sync, conflict resolution rulesManual reconciliation process, data steward role
License cost overrunLicense optimization analysis, feature mappingRenegotiate license mix, consolidate users
Integration complexityMiddleware layer, standardized patternsSimplify to point-to-point for critical paths
User adoption challengesRole-specific training, change championsPhased rollout, parallel running

Scenario: AppExchange-Heavy Architecture

RiskMitigationContingency
Vendor acquisition/sunsetExit strategy for each package, data portabilityBuild replacement with custom code
Governor limit conflictsLimit budget allocation per package, monitoringRemove lowest-value package, optimize custom code
Upgrade breaking changesRegression test suite, staging validationVersion lock, coordinate with vendor
Total cost escalationTCO model with annual review triggersRenegotiate or replace with custom build

Scenario: Global/Multi-Org Rollout

RiskMitigationContingency
Regulatory non-compliancePer-region compliance mapping, Shield encryptionRegion-specific org isolation
Data residency violationHyperforce region selection, data maskingSeparate orgs per jurisdiction
Timezone/language issuesLocale-aware development, i18n testingRegion-specific customization layer
Coordinated deployment complexityRelease train model, feature flagsStaggered regional releases

Risk Communication

How to Present Risks to the Review Board

The CTA review board expects you to present risks as a structured, proactive analysis — not as an afterthought.

Structure your risk discussion as:

  1. Identify the top 3-5 risks specific to the scenario (not generic risks)
  2. For each risk, state:
    • What the risk is and why it exists in this specific scenario
    • How likely it is and how severe the impact would be
    • What you are doing architecturally to prevent it
    • What the fallback plan is if prevention fails
  3. Connect risks to architecture decisions: “I chose middleware over point-to-point integration partly because it reduces the integration failure risk by providing retry logic and monitoring.”

CTA Risk Presentation Pattern

“The top risk I see in this scenario is [risk]. It’s likely because [reason specific to scenario]. If it materializes, the impact is [consequence]. My architecture mitigates this by [architectural decision]. As a contingency, [fallback plan].”

Risk Reporting

AudienceDetail LevelFormatFrequency
Steering CommitteeHigh-level, top 5 risksDashboard, RAG statusMonthly
Project TeamDetailed, all active risksRisk registerSprint review
Technical TeamTechnical risks with actionsTechnical risk logWeekly standup
CABDeployment-specific risksChange request formPer deployment

Risk Monitoring

Early Warning Indicators

Risk AreaWhat to MonitorAlert Threshold
Governor limitsApex CPU time, SOQL count per transaction>70% of limit
PerformancePage load time, query execution time>3 second page load
StorageData storage usage, file storage usage>80% capacity
IntegrationError rate, response time, queue depth>5% error rate
API limitsDaily API call consumption>70% of daily limit
User adoptionLogin frequency, feature usage<50% expected adoption

Sources