Select Page

Gopal Dommety

|
originally published on Feb 17, 2026
Share

Risk assessment is noisy because risk is contextual

Most organizations have plenty of risk data—CVE lists, CSPM alerts, control checklists, incident timelines, SLO reports. Yet prioritization is still painful because risk is not a property of a finding alone. Risk depends on context:

  • Where is the issue running (prod vs dev)?
  • Is it exposed or reachable?
  • What business function and data does it touch?
  • Who owns it and how fast can it be fixed?
  • Are there compensating controls or approved exceptions?
  • What is the blast radius across dependencies?

Without this, “risk assessment” becomes a queue of alerts rather than a decision system.

What is a context graph for risk assessment?

A context graph is a living model of your software and AI delivery environment that combines:

  1. Entities: repos, services, builds, images, clusters, policies, findings, incidents, teams
  2. Relationships: “produces,” “deployed to,” “depends on,” “owned by,” “violates,” “approved by”
  3. Decision traces: policy evaluations, approvals, exceptions, expirations, compensating controls

This transforms “findings” into “risk in context.”

Why context graphs matter for security risk assessment

Security risk is rarely equal to severity. A CVSS score doesn’t tell you:

  • whether the vulnerability is deployed in production,
  • whether it’s reachable (internet exposure, privilege paths),
  • whether it’s near regulated data,
  • whether compensating controls reduce exploitability.

A context graph enables high-signal questions:

  • Which exploitable vulnerabilities exist in running, internet-facing services?
  • Which vulnerable components have the largest dependency blast radius?
  • Which high-privilege services are one hop away from crown-jewel systems?

Why context graphs matter for compliance risk assessment

Compliance risk is about scope + controls + evidence.

A context graph makes compliance tractable by modeling:

  • systems in scope (prod systems, regulated data paths),
  • control evaluations and policy decisions,
  • evidence lineage (code → build → deploy → runtime),
  • exceptions with expiry and compensating controls.

It answers:

  • Which controls are failing for systems handling PCI/PII data?
  • Where is evidence missing for releases in the last 90 days?
  • Which exceptions are expired or missing compensating controls?

Why context graphs matter for operational risk assessment

Operational risk is often change-driven:

  • risky deploys,
  • config and feature flag changes,
  • infra drift,
  • brittle shared dependencies.

A context graph links:

  • incident timeline ↔ deploy/config events ↔ dependency graph ↔ ownership/runbooks ↔ precedent fixes

It helps you:

  • identify services with the highest risk-adjusted change failure rate,
  • predict blast radius for shared dependency failures,
  • prioritize reliability work using evidence, not intuition.

How OpsMx makes context-based risk assessment practical

OpsMx provides a platform where you choose your SDLC and runtime data sources and start with a minimum set. OpsMx also provides an Enterprise Delegate that runs inside your environment to simplify:

  • Discovery: find the repos, clusters, accounts, and projects to onboard
  • Ingestion: securely pull events and snapshots from your tools
  • Security: enforce least privilege, scoped credentials, connector isolation
  • Data residency: control what leaves your boundary; keep data in-region

This reduces integration friction and makes “risk-in-context” feasible in enterprise environments.

Minimum viable SDLC context graph for risk assessment

Start small and expand:

Minimum data sources

  • Git + CI/CD (change + provenance)
  • Kubernetes/cloud inventory (runtime truth)
  • One risk source (SCA/CSPM) + policy source (controls/exceptions)

Outcome

  • findings mapped to running assets,
  • assets mapped to ownership, exposure, and criticality,
  • exceptions and compensating controls tracked as first-class nodes.

Key takeaways

  • Risk assessment fails when findings aren’t linked to runtime reality.
  • Context graphs add lineage, exposure, ownership, and decision traces.
  • One shared SDLC context graph supports security, compliance, and operations.
  • OpsMx accelerates adoption using an Enterprise Delegate for secure onboarding and data residency.

FAQ

What’s the difference between a knowledge graph and a context graph?

A knowledge graph models entities and relationships. A context graph adds time-indexed traces and decision history, which are required for risk assessment and governance.

Do we need to connect every tool to get value?

No. Start with change lineage + runtime truth + one risk/policy source, then expand.

Tags : security

Gopal Dommety, Ph.D. is the Chief Executive Officer of OpsMx, a company advancing the automation and security of software delivery for the modern enterprise. Under his leadership, OpsMx is redefining how organizations build, secure, and release software, enabling developers to deliver innovation with speed, safety, and confidence. A technologist and inventor, Dr. Dommety holds over 70 patents and is the principal author of several Internet Protocols (RFCs) that power today’s global networking infrastructure. His work has shaped critical areas of large-scale distributed systems, algorithmic design, and secure automation. He has also authored more than 20 peer-reviewed papers, book chapters, and journal publications, and previously led the Mind-Map Project, an AI research initiative focused on modeling behavioral and personality traits from user-generated data. Before founding OpsMx, he was a General Partner at Neem Capital, a technology-focused investment firm, and held senior leadership roles in product management, research, and engineering at major technology companies and startups. Rooted in humble beginnings from a remote village in India, Gopal’’s career is guided by the principles of simplicity, first-principles thinking, and purpose-driven innovation—values that continue to shape his vision for building secure, intelligent, and resilient technology systems that move the world forward.

0 Comments

Submit a Comment

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.