10.1. Risk Matrix
Risk ID
Risk Description
Likelihood (1-5)
Impact (1-5)
Mitigation Strategy
R-01
UBI Network Network API Downtime: External service is unavailable.
3 (Moderate)
5 (Critical)
Implement retry logic with exponential backoff. Use a fallback cache to display benefit listings if the search API is down.
R-02
Data Security Breach: Sensitive PII is exposed.
2 (Low)
5 (Critical)
Enforce data encryption at rest and in transit. Conduct regular security audits and penetration testing. Follow a strict RBAC policy.
R-03
Low User Adoption: Beneficiaries do not use the app.
4 (High)
4 (High)
A comprehensive marketing and outreach strategy. In-app tutorials and a simplified user experience.
R-04
Integration Failures: The VC verification SDK fails.
3 (Moderate)
4 (High)
Implement robust error handling and logging. Create a manual override for providers to process applications if the SDK is unavailable.
R-05
Scope Creep: Project scope expands beyond initial plan.
3 (Moderate)
3 (Medium)
A formal change request process must be followed for any new features. All changes must be approved by the project sponsor.
Last updated
