GCR-M – Governance & Cyber-Risk Reference Model v1.3

Document type: Core standard (normative)
Edition: 1.3 – Nov 2025
Status: Published
Editor: IGS-C Technical Committee


1. Introduction

GCR-M is a governance and cyber-risk reference model designed to provide a single, precise language for digital risk across governance, technical and architectural levels. It centres analysis on attack paths and kill-chains, distinguishes structural from incidental risk, and supports measurable risk reduction over time.

GCR-M sits on top of existing frameworks (ISO 27001/27005, ISO 31000, NIST CSF, GDPR, DORA, NIS2, AU/Malabo, etc.) and is technology-agnostic (on-prem, cloud, hybrid, outsourced).

2. Model structure

The model is organised into seven domains:

Each element has an identifier (for example, PW.2 – Critical Attack Path Identification) to support mappings and tooling.

3. CX – Context & Scope

CX.1 – Business & mission context

CX.2 – Regulatory and contractual context

CX.3 – Structural environment

4. AS – Assets & Services

AS.1 – Critical services and processes

AS.2 – Information and data assets

AS.3 – Identity, roles and privileges

5. TH – Threats & Actors

TH.1 – Threat categories

TH.2 – Motivations and capabilities

Rate motivations, capabilities and likely attack styles for each relevant actor type, to inform pathway feasibility rather than generic lists.

6. PW – Pathways & Kill-Chains

PW.1 – Pathway modelling

PW.2 – Critical attack paths

PW.3 – Structural vs incidental contributors

7. CT – Controls & Design

CT.1 – Structural controls

CT.2 – Contextual and operational controls

CT.3 – Control patterns and reference architectures

Use patterns (identity, SCIM, remote access, etc.) and justify how they influence pathways.

8. MT – Metrics & Evidence

MT.1 – Structural risk metrics

MT.2 – Operational performance metrics

MT.3 – Evidence quality

Assess data completeness, blind spots, log quality and auditability.

9. OP – Operational Integration

OP.1 – Governance integration

Feed GCR-M outputs into risk committees, internal audit and investment decisions.

OP.2 – ITSM, SOC and DevSecOps integration

Link tickets, changes and incidents to pathways and controls; prioritise changes that close critical paths.

OP.3 – Continuous improvement

Update pathways after incidents, challenge assumptions via red teams, and feed lessons into architecture and investment plans.

10. Criticism and limitations

GCR-M is designed as an overlay, not a replacement for ISO/NIST, and can be applied incrementally. It deliberately forces structural vs incidental distinctions and requires explicit recording of assumptions so that assessments and regulators can challenge them.