Capture basic information about the third party. This establishes organizational context for the risk assessment in alignment with NIST 800-30 asset and threat source identification.
Select all certifications and compliance frameworks the vendor currently holds. These reduce vulnerability scores in the FAIR model.
Define what data the vendor can access and how they connect to your environment. FAIR Asset Value (AV) and NIST 800-30 asset characterization are built from these inputs.
Select all data types the vendor can view, process, or store. Each type adds to the loss magnitude calculation.
Assess the threat event frequency (TEF) — the rate at which threat agents act against this vendor. Aligns with NIST 800-30 Threat Source and Threat Event characterization.
Select all relevant threat sources per NIST 800-30 Table D-2.
Evaluate the vendor's security controls and your own oversight controls. These drive FAIR Vulnerability and align with NIST 800-30 Predisposing Conditions and Control Effectiveness.
Quantify the potential financial and operational impact of a loss event. FAIR Loss Magnitude (LM) = Primary Loss + Secondary Loss. NIST 800-30 maps this to Adverse Impact characterization.
| FAIR / NIST Factor | Input Value | Weighted Score | Interpretation |
|---|