Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 402

FAIR (Factor Analysis of Information Risk)

What is FAIR (Factor Analysis of Information Risk)?

FAIR (Factor Analysis of Information Risk)An open international standard for quantifying information and cyber risk in financial terms by decomposing risk into loss event frequency and loss magnitude factors.


FAIR, maintained by the FAIR Institute and standardised by The Open Group (O-RA, O-RT), is the most widely adopted quantitative cyber risk model. It decomposes risk into Loss Event Frequency (threat event frequency multiplied by vulnerability) and Loss Magnitude (primary and secondary losses), each driven by sub-factors that practitioners estimate with calibrated ranges. Tooling such as FAIR-U and commercial platforms typically run Monte Carlo simulations to produce loss distributions, including ALE and loss exceedance curves. FAIR is used to prioritise security investments, support board and regulator discussions, set risk appetite, and underwrite cyber insurance. It is complementary to ISO 31000, NIST RMF, and ERM frameworks.

Examples

  1. 01

    FAIR analysis of business email compromise to justify funding for advanced email protection.

  2. 02

    Quarterly FAIR-based top-risks report for the audit committee.

Frequently asked questions

What is FAIR (Factor Analysis of Information Risk)?

An open international standard for quantifying information and cyber risk in financial terms by decomposing risk into loss event frequency and loss magnitude factors. It belongs to the Compliance & Frameworks category of cybersecurity.

What does FAIR (Factor Analysis of Information Risk) mean?

An open international standard for quantifying information and cyber risk in financial terms by decomposing risk into loss event frequency and loss magnitude factors.

How does FAIR (Factor Analysis of Information Risk) work?

FAIR, maintained by the FAIR Institute and standardised by The Open Group (O-RA, O-RT), is the most widely adopted quantitative cyber risk model. It decomposes risk into Loss Event Frequency (threat event frequency multiplied by vulnerability) and Loss Magnitude (primary and secondary losses), each driven by sub-factors that practitioners estimate with calibrated ranges. Tooling such as FAIR-U and commercial platforms typically run Monte Carlo simulations to produce loss distributions, including ALE and loss exceedance curves. FAIR is used to prioritise security investments, support board and regulator discussions, set risk appetite, and underwrite cyber insurance. It is complementary to ISO 31000, NIST RMF, and ERM frameworks.

How do you defend against FAIR (Factor Analysis of Information Risk)?

Defences for FAIR (Factor Analysis of Information Risk) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for FAIR (Factor Analysis of Information Risk)?

Common alternative names include: FAIR, FAIR analysis.

Related terms

See also