Table of contents

Step 1 — Identify & quantify risks

ISO/IEC/IEEE 29119 supports risk-based testing and includes risk considerations as part of test planning. In practice, risks often begin as unstructured concerns or “fears” from managers, engineers, and other stakeholders. These fears may be emotional, vague, or context-specific, but they still signal real uncertainty about what could go wrong.

See Key terminology above for definitions of defect, failure, and risk. In Step 1, capture risks as “what could fail” and “what it would cost,” not as a list of suspected defects.

The purpose of Step 1 is to achieve both emotional and economic alignment: we surface fears, convert them into explicit risk statements, and estimate impact, so stakeholders share a clear view of what matters most and why specific testing investments are justified.

How to identify risks

Gather fears from stakeholders

Start by collecting concerns from all relevant stakeholders, then translate them into risk statements in the next step:

Methods for gathering fears:

Common pitfalls:

Convert fears into explicit risk statements

Fears are often vague (“I’m worried about performance”), or emotional (“This feels risky”). To make them actionable, convert each fear into an explicit risk statement using this structure:

Risk statement template:

“If [condition/event], then [negative consequence] may occur, resulting in [impact on quality characteristic/business objective].”

Examples:

Fear Explicit Risk Statement
“I’m worried the system will be slow” “If the system experiences peak load during checkout, then response times may exceed 2 seconds, resulting in customer abandonment and lost revenue (performance efficiency risk).”
“What if we break something in production?” “If a regression defect is introduced in the payment module, then transactions may fail silently, resulting in lost revenue and customer trust (reliability risk).”
“I don’t trust this third-party integration” “If the third-party API changes its contract without notice, then our integration may fail, resulting in service disruption (compatibility/interoperability risk).”
“Security keeps me up at night” “If user input is not properly sanitized, then SQL injection attacks may occur, resulting in data breach and regulatory penalties (security risk).”

Guidelines for conversion:

Risk statement quality checklist:

Before moving to quantification, verify each risk statement meets these criteria:

A risk statement that passes this checklist is ready for quantification and prioritization. If it fails, refine it before proceeding.

Common pitfalls:

Quantify potential impact

Once risks are explicit, quantify their potential impact so you can prioritize and make investment decisions. Different stakeholders can provide different inputs to quantify impact:

Ask engineers to quantify potential loss of speed/effort:

Examples (using three-point estimation):

Ask managers to quantify potential financial impact:

Examples (using three-point estimation):

Quantification methods:

Use three-point estimation (optimistic, most likely, pessimistic) rather than single-point estimates. This makes uncertainty explicit and improves Step 4 learning when you compare estimates with actual outcomes.

Using three-point estimates:

Common pitfalls:

Output of Step 1

By the end of Step 1, you should have:

Test basis and traceability: ISO/IEC/IEEE 29119 defines the test basis as the body of knowledge used as the foundation for test analysis and design (for example, requirements, designs, and other relevant artifacts). In this framework, explicit risk statements from Step 1 are treated as a first-class input to the test basis. By doing so, each testing activity can be traced back to specific risks (and, where applicable, requirements and quality characteristics), enabling clear justification for testing investments and clearer evidence that prioritised risks are being addressed.

Connection to Step 2: Once risks are identified and quantified, we categorize them by mapping each risk to ISO/IEC 25010 quality characteristics, then prioritize by risk exposure (likelihood × impact). This produces an ordered risk list that drives systematic selection of testing activities in Step 3.