Fair TPRM & GRC Platform — Version 2.5.8
Fair TPRM is a unified platform built around two integrated modules:
Both modules share the same database, the same permission model, and the same audit log — eliminating data silos and duplicate work.
Fair TPRM uses role-based access control (RBAC) with seven default ACL groups. Each user is assigned to one or more groups that determine which modules and actions they can access.
| Group | Access Level |
|---|---|
| Administrator | Full access to all modules, settings, and administrative functions across the entire platform. |
| Cyber TPRM | Full access to all TPRM module operations including vendor management, assessments, FAIR analysis, and SRS scoring. |
| Cyber GRC | Full access to all GRC module operations including compliance assessments, controls, evidence, policies, audits, and the risk register. |
| GRC Contributors | Limited access — can complete assigned tasks, provide evidence, and respond to assessment questions delegated to them. |
| Auditor | Read-only access to both TPRM and GRC modules for audit and review purposes. |
| Procurement | Access to vendor onboarding, contract management, and procurement documents within the TPRM module. |
| Stakeholder | Access limited to vendors they own or have been assigned, including the ability to submit vendor requests. |
GRC stands for Governance, Risk & Compliance. The GRC module helps your organization:
Follow this five-step workflow to complete your first GRC compliance assessment:
| Status | Description |
|---|---|
| Draft | Assessment has been created but questions have not been started. |
| In Progress | Questions are actively being answered by the assessment team. |
| Under Review | All questions answered; the lead auditor is reviewing responses. |
| Completed | Assessment has been reviewed and finalized. Scores are locked. |
| Archived | Assessment retained for historical reference. Read-only. |
The unified assessment contains 170+ questions organized across the following 14 security domains:
| Code | Domain | Questions |
|---|---|---|
| GOV | Governance & Leadership | 12 |
| IAM | Identity & Access Management | 14 |
| DSP | Data Security & Privacy | 12 |
| EPS | Endpoint Security | 8 |
| NET | Network Security | 12 |
| APS | Application Security | 9 |
| OPS | Security Operations | 12 |
| INC | Incident Management | 8 |
| SCM | Supply Chain Management | 7 |
| PHY | Physical Security | 6 |
| HRS | Human Resources Security | 8 |
| BCP | Business Continuity & DR | 11 |
| CRY | Cryptography | 9 |
| CMP | Compliance & Audit | 8 |
Based on the maturity rating you select, the system determines a Conformity Status for each mapped framework requirement:
Evidence files support your assessment responses and demonstrate compliance to auditors.
All uploaded evidence is also accessible from the (sidebar → GRC Module → Evidence & Monitoring → Evidence Library). The library provides a centralized view of all evidence across the platform, with filtering by status, expiry date, and linked control or question.
Requirements marked as “Not Applicable” are excluded from the denominator, ensuring your score reflects only relevant requirements.
| Framework | Version | Mapped Questions |
|---|---|---|
| NIST Cybersecurity Framework (CSF) | 2.0 | 170+ |
| ISO/IEC 27001 | 2022 | 170+ |
| SOC 2 Type II | 2017 | 170+ |
| PCI DSS | 4.0 | 132 |
| CMMC / NIST 800-171 | v2.0 | 97 |
| CIS Controls | v8 | 95 |
| NIST SP 800-171 | Rev 2 | 90 |
| HIPAA Security Rule | 2013 | 61 |
| NIST AI Risk Management Framework (AI RMF) | 1.0 | 48 |
The compliance report lists every requirement for the selected framework. Each requirement card displays:
The CSF Maturity Score dashboard displays:
The Frameworks page displays the full requirement hierarchy for each supported framework. Requirements are organized in a tree view with expandable sections, domains, and individual requirements. Each requirement shows its conformity status and linked assessment questions.
Internal controls document the security measures your organization has in place. Controls can be mapped to requirements across multiple frameworks simultaneously.
The crosswalk tool lets you compare coverage between any two supported frameworks to identify gaps and overlaps.
The Evidence Library provides a centralized view of all compliance evidence uploaded across the platform.
| Status | Description |
|---|---|
| Current | Evidence is valid and within its expiry date. |
| Expired | Evidence has passed its expiry date and needs to be renewed. |
| Superseded | Evidence has been replaced by a newer version. |
| Draft | Evidence has been uploaded but not yet approved or finalized. |
The Policy Management feature lets you create, review, approve, and publish organizational policies with version tracking and periodic review scheduling.
Draft → Review → Approved → Published → Retired
The Audits feature supports your internal and external audit processes from planning through remediation and closure.
| Status | Description |
|---|---|
| Planning | Audit scope and resources are being defined. |
| Fieldwork | Audit testing and evidence collection are underway. |
| Reporting | Findings are being documented and the audit report is being drafted. |
| Remediation | Findings have been reported and remediation tasks are in progress. |
| Closed | All findings have been resolved and the audit is finalized. |
The Risk Register tracks organizational risks with quantified likelihood and impact scoring.
The Inherent Risk Score is calculated as Likelihood × Impact (range 1–25) before controls are applied. The Residual Risk Score is recalculated after treatment controls are linked, reflecting the remaining risk after mitigation measures are in place.
Continuous monitors run automated compliance checks on a scheduled basis to demonstrate ongoing compliance to auditors.
The Task Inbox shows all GRC tasks assigned to the currently logged-in user. Tasks are generated when assessment questions or remediation items are delegated to you.
The GRC Dashboard provides a single-pane-of-glass view across your entire compliance program. It displays:
The TPRM (Third-Party Risk Management) module provides end-to-end vendor risk management. It allows you to track and assess vendors, assign risk tiers, send security assessments, perform FAIR risk quantification, monitor 4th party dependencies, and discover Shadow SaaS applications across your organization.
For detailed information about TPRM capabilities, visit the Vendor Lifecycle and FAIR Analysis pages.
To add a vendor, navigate to the TPRM Module in the sidebar and click Add Vendor. Complete the required fields including Vendor Name, Domain, Type, Tier, contact information, and data handling details such as PII Count and SPII Count (the number of personally identifiable and sensitive personally identifiable information records the vendor will access).
Every vendor follows a defined lifecycle from initial request through offboarding. The status flow is:
Draft → Pending Review → In Review → Approved / Rejected → Active → Annual Review → Offboarded
Each transition is logged in the audit trail, and automated notifications can be configured for status changes. See the Vendor Lifecycle page for full details.
Security assessments can be sent directly to vendors through the platform. The vendor receives an email with a secure link to complete the questionnaire. Responses are automatically scored and integrated into the vendor’s risk profile. Assessments can be customized by tier, and follow-up assessments can be triggered based on scoring results.
The SRS provides an external security score for each vendor based on automated scanning of their public-facing infrastructure. Scoring categories include DNS configuration, SSL/TLS certificate health, email security (SPF, DKIM, DMARC), and open port exposure. Signal weights are fully configurable by administrators. See the Monitoring page for details.
Fair TPRM implements the FAIR (Factor Analysis of Information Risk) quantitative risk model to estimate the financial impact of vendor-related security incidents. The analysis produces an Annualized Loss Expectancy (ALE) and recommended cyber insurance coverage. All multipliers and thresholds are configurable. Visit the FAIR Analysis page for a complete overview.
Fourth-party risk tracking lets you identify and monitor your vendors’ vendors — the downstream dependencies that could affect your organization. The platform maps these sub-service relationships and flags concentration risk when multiple vendors rely on the same fourth party.
Shadow SaaS discovery identifies unapproved SaaS applications in use across your organization. The feature detects cloud services that have not been formally onboarded through the TPRM process, enabling your security team to assess risk, enforce governance, and bring shadow applications under management.
The General Settings page (Admin → Settings → General) allows administrators to configure core platform settings including the Application Name, Company Name, and Support Email address. These values appear throughout the platform interface and in system-generated emails.
Customize the platform’s appearance from Admin → Settings → Branding. Upload your organization’s logo, set primary and accent colors, and adjust the sidebar navigation width. Branding changes take effect immediately for all users.
Manage user accounts from Admin → Users. Administrators can create new users, assign them to one or more ACL groups, enable or disable TOTP two-factor authentication, and deactivate accounts. Group membership determines which modules and actions each user can access.
Configure outbound email from Admin → Settings → Email. Enter your SMTP server details including host, port, encryption method (TLS/SSL), username, and password. The platform uses email for vendor assessment invitations, task notifications, password resets, and audit reminders.
Fair TPRM supports SAML 2.0 single sign-on for enterprise identity providers. Configure SSO from Admin → Settings → SAML. You will need to provide the IdP Entity ID, SSO URL, SLO URL, and X.509 certificate from your identity provider. SCIM 2.0 provisioning is also supported for automated user lifecycle management.
Fair TPRM offers optional AI-powered features for generating executive risk summaries, suggesting control descriptions, and analyzing assessment gaps. Configure AI integration from Admin → Settings → AI. The platform supports integration with compatible AI services, and all AI features can be enabled or disabled individually.
For full control over your AI integration, we recommend self-hosting OpenWebUI or LibreChat alongside Fair TPRM. Both are free, open-source AI front-ends that run as a single Docker container and are compatible with Fair TPRM’s AI integration settings.
Setup overview:
Cost: $0 for self-hosted OpenWebUI or LibreChat. If using a cloud LLM provider, costs depend on your API usage (typically a few dollars per month for moderate use). Fully local models via Ollama are completely free.
For continuous external security scoring, Fair TPRM integrates with the Shodan API. A Shodan membership (approximately $59/month) gives Fair TPRM automated Security Rating Scores for your entire vendor portfolio — including TLS analysis, CVE detection, network security, and application hardening.
Configure the Shodan API key in Admin → Settings → SRS. Shodan is automatically provisioned for free during the hosted demo.
| Term | Definition |
|---|---|
| ACL | Access Control List — defines which permissions are granted to each user group. |
| Assessment | A structured evaluation of security maturity using the 170+ unified questions across 14 domains. |
| CIS Controls | Center for Internet Security Controls — a set of prioritized cybersecurity best practices (v8 supported). |
| CMMC | Cybersecurity Maturity Model Certification — a US Department of Defense framework for contractor security. |
| Conformity Status | The compliance state of a requirement: Conforming, Partial, Non-Conforming, or Not Applicable. |
| Control | A security measure implemented to mitigate risk, mapped to one or more framework requirements. |
| Crosswalk | A mapping between two compliance frameworks showing how requirements in one correspond to requirements in another. |
| CSF | Cybersecurity Framework — refers to the NIST Cybersecurity Framework used for maturity scoring. |
| Domain | One of 14 security categories (e.g., GOV, IAM, DSP) that organize the unified assessment questions. |
| Evidence | Documents, screenshots, or artifacts uploaded to support assessment responses and demonstrate compliance. |
| FAIR | Factor Analysis of Information Risk — a methodology developed by the FAIR Institute for quantifying cyber risk in financial terms. |
| FairScore | The overall weighted maturity score (1.0–4.0) calculated from assessment responses across all 14 domains. |
| Finding | A gap or deficiency identified during an audit that requires remediation. |
| Framework | A compliance standard (e.g., SOC 2, ISO 27001) with a defined set of requirements that the platform maps to unified questions. |
| GRC | Governance, Risk & Compliance — the module for managing internal compliance across multiple frameworks. |
| HIPAA | Health Insurance Portability and Accountability Act — US healthcare data privacy and security regulation. |
| ISO 27001 | International standard for information security management systems (2022 edition supported). |
| Maturity Rating | A 1–4 score assigned to each assessment question: 1 (Initial), 2 (Developing), 3 (Defined), 4 (Managed/Optimized). |
| NIST 800-171 | NIST Special Publication 800-171 — security requirements for protecting Controlled Unclassified Information (CUI). |
| NIST AI RMF | NIST AI Risk Management Framework — a framework for managing risks associated with artificial intelligence systems throughout their lifecycle. |
| PCI DSS | Payment Card Industry Data Security Standard — requirements for organizations handling credit card data (v4.0 supported). |
| PII | Personally Identifiable Information — data that can identify an individual (name, email, SSN, etc.). |
| Requirement | A specific control objective or security measure defined by a compliance framework. |
| SOC 2 | Service Organization Control 2 — an auditing framework for service providers based on Trust Services Criteria. |
| SPII | Sensitive Personally Identifiable Information — a subset of PII that requires heightened protection (SSN, financial data, health records). |
| TPRM | Third-Party Risk Management — the module for managing vendor risk throughout the vendor lifecycle. |
| Unified Question | One of 170+ security questions in the assessment engine, each mapped to requirements across multiple compliance frameworks. |
Fair TPRM is free software for the world to download and self-host. Security teams with limited budgets can deploy full TPRM and GRC capabilities at no cost. Try the live demo or clone the repository and deploy on your own infrastructure.