User Management
Manage who can access FAIR TPRM. Share the invite code to allow new registrations.
INVITE CODE — share this with users you want to allow
——
REGISTERED USERS
🌙 ☀️
NIST SP 800-30 REV 1

Vendor Profile

Capture basic information about the third party. This establishes organizational context for the risk assessment in alignment with NIST 800-30 asset and threat source identification.

Organization Details
Vendor Maturity & Certifications

Select all certifications and compliance frameworks the vendor currently holds. These reduce vulnerability scores in the FAIR model.

Data & Access

Define what data the vendor can access and how they connect to your environment. FAIR Asset Value (AV) and NIST 800-30 asset characterization are built from these inputs.

Data Classification & Volume
Data Types Accessible

Select all data types the vendor can view, process, or store. Each type adds to the loss magnitude calculation.

Access & Connectivity

Threat Landscape

Assess the threat event frequency (TEF) — the rate at which threat agents act against this vendor. Aligns with NIST 800-30 Threat Source and Threat Event characterization.

Loss Event Frequency (LEF) = Threat Event Frequency (TEF) × Vulnerability (Vuln)
TEF = Contact Frequency × Probability of Action
Threat Source Profile

Select all relevant threat sources per NIST 800-30 Table D-2.

Threat Frequency & Capability
5
Opportunistic (1)Sophisticated (5)Nation-State (10)
5
Minimal (1)Moderate (5)Highly motivated (10)

Control Assessment

Evaluate the vendor's security controls and your own oversight controls. These drive FAIR Vulnerability and align with NIST 800-30 Predisposing Conditions and Control Effectiveness.

Vulnerability = 1 − Control Strength × Control Coverage
Higher control scores → Lower vulnerability → Lower LEF
Vendor Security Controls
5
No controls (1)Basic MFA (5)Zero-trust PAM (10)
5
None (1)TLS + AES-256 (5)Full DLP + tokenization (10)
5
Ad-hoc (1)Monthly patching (5)Automated ASAP (10)
5
Reactive only (1)Documented IR plan (5)SOC + SOAR (10)
Your Organization's Oversight Controls

Loss Magnitude

Quantify the potential financial and operational impact of a loss event. FAIR Loss Magnitude (LM) = Primary Loss + Secondary Loss. NIST 800-30 maps this to Adverse Impact characterization.

Risk = Loss Event Frequency (LEF) × Loss Magnitude (LM)
LM = Primary Loss (direct) + Secondary Loss (indirect: regulatory, reputational)
Primary Loss Factors
Secondary Loss Factors (NIST 800-30 Table H-3)
5
Minimal (1)Moderate (5)Catastrophic (10)
5
Minimal (1)Moderate (5)Major litigation (10)
ASSESSMENT COMPLETE

Risk Assessment Results

OVERALL RISK SCORE
FAIR × NIST 800-30 Composite
LIKELIHOOD × IMPACT MATRIX (NIST 800-30)
LIKELIHOOD →
← IMPACT →
LIKELIHOOD SCORE
Threat Event Frequency × Vulnerability
IMPACT SCORE
Primary + Secondary Loss Magnitude
FAIR Factor Breakdown
NIST SP 800-30 Risk Detail Table
FAIR / NIST Factor Input Value Weighted Score Interpretation
Risk Treatment Recommendations
Risk Disposition