Cyber risk quantification evidence loop
feed CRQ from the live engagement record instead of from a parallel spreadsheet
Cyber risk quantification programmes turn vague risk language into loss exposure ranges that the board, the audit committee, the underwriter, and the regulator can read against the financial statements. The discipline lives or dies on whether the loss event frequency, threat event frequency, vulnerability, and loss magnitude inputs reconcile to the operating record the security team runs on day to day. Most programmes maintain CRQ in a parallel FAIR spreadsheet, refresh it quarterly from memory, and lose the audit trail between cycles. Run the cyber risk quantification evidence loop on the same engagement record the vulnerability programme, the exception register, the audit-evidence retention workflow, and the leadership cadence already use so each scenario input regenerates from the source the security team operates on rather than from a separate document.
No credit card required. Free plan available forever.
Run CRQ on the same record the operators run on, not on a parallel spreadsheet
Cyber risk quantification programmes translate vague risk language into loss exposure ranges the board, the audit committee, the underwriter, and the regulator can read against the financial statements. The discipline depends on whether the FAIR inputs (loss event frequency, threat event frequency, vulnerability, threat capability, resistance strength, primary and secondary loss magnitude) reconcile to the operating record the security team runs on. Most CRQ programmes hold the inputs in a parallel sheet, refresh them quarterly from memory, and lose the audit trail between cycles. Run the cyber risk quantification evidence loop on the same engagement record the vulnerability programme, the exception register, the audit-evidence retention workflow, and the leadership cadence already use so each input regenerates from the source the operators run on rather than from a separate document.
This workflow composes with the rest of the security programme already on the workspace. For the long-form conceptual guide that frames CRQ as a board-facing discipline, read the cyber risk quantification guide. For the externally facing carrier read of the same evidence, read the cyber insurance security evidence workflow. For the exception register the residual band leans on, read the vulnerability acceptance and exception management workflow. For the leadership cadence the CRQ narrative feeds, read the security leadership reporting workflow.
Six input categories the CRQ refresh actually reads
A CRQ programme that runs on the live record concentrates on six input categories. Each category has a queryable anchor on the workspace so the next refresh regenerates from the live engagement rather than being reauthored.
In-scope asset set per scenario
The scenario binds to a queryable asset set on the workspace rather than to an abstract estate description. Asset criticality scoring records the in-scope production estate, the regulated payment service, the customer-data tier, the privileged-identity perimeter, and the third-party-data flow per scenario so the next refresh reads against the asset set the operators run on rather than against a separate sheet.
Examples: Production estate by asset tier, regulated payment service per environment, customer-data services by data classification, privileged-identity perimeter by role, third-party data flows by vendor.
Vulnerability backlog inputs
The FAIR vulnerability input regenerates from findings management: open critical and high findings on the in-scope assets, aged finding count against the published SLA, exception count by severity, EPSS-enriched exploit likelihood on CVE-bound findings, and scan coverage gaps. The vulnerability number in the scenario reflects the queue the operators run on, not the wishful number on the slide.
Examples: Open criticals over 30 days on the in-scope asset set, aged highs by SLA tier, exception count by severity and expiry, EPSS-enriched exploit likelihood per CVE-bound finding.
Control coverage and efficacy inputs
Control coverage by framework comes from the compliance tracking layer: scan cadence on the in-scope estate, MFA enforcement on privileged accounts, encrypted-credential coverage on authenticated scan jobs, framework mapping (NIST CSF 2.0, CIS Controls v8, ISO 27001, SOC 2, PCI DSS) by scenario. Control efficacy is the modifier the FAIR model applies between threat capability and the scenario landing.
Examples: NIST CSF 2.0 sub-category coverage per scenario, CIS v8 IG1 baseline coverage, ISO 27001 A.8.8 vulnerability management coverage, MFA enforcement state on privileged accounts.
Threat and incident anchor inputs
Loss event frequency anchors against the operating record: declared incidents on the engagement, vulnerability disclosure programme volume against regulated services, third-party advisory activity in the policy period, breach-notification events recorded against the regulator-readiness workflow, and the post-incident retest evidence. The frequency input reconciles to the timeline the security team and the legal team have already lived through.
Examples: Declared incident count per scenario over the policy period, VDP submission rate per regulated service, third-party advisory activity, breach-notification cycles.
Loss magnitude tier inputs
Primary loss (response, replacement, productivity, fines and judgements) and secondary loss (legal, regulatory, customer churn, market response) tiers are recorded as engagement metadata per scenario. The regulatory-fine band reads against the framework references compliance tracking carries (GDPR Article 83, NIS2 Article 34, DORA Article 50, SEC cybersecurity disclosure). The tiers are dated, attested, and reviewed.
Examples: Response cost band per scenario, regulatory fine band per applicable regulation, customer-loss band per asset tier, reputation impact band.
Activity log and evidence trail inputs
The CRQ refresh draws on the timestamped state changes on findings, engagements, scans, comments, documents, and team membership across the period. The CSV export covers 30, 90, or 365 days by plan with user attribution, timestamp, and event type per row. The activity-log trail is the artefact the audit committee, the internal auditor, and the regulator read against the CRQ output.
Examples: Activity log CSV across the policy period, scan execution history, finding state-change history, exception register lifecycle history.
How FAIR inputs map to the workspace
The mapping below shows where each FAIR input lives on the engagement record so the next refresh reads the source the operators do. SecPortal anchors the dated, auditable inputs; the CRQ engine the programme operates (FAIR-CAM, Open FAIR, RiskLens, in-house simulation) reads against them.
| FAIR input | Workspace anchor on the engagement record |
|---|---|
| Loss Event Frequency (LEF) | Declared incident count on the engagement, VDP submission volume against regulated services, third-party advisory activity in the period, breach-notification cycles, and the post-incident retest evidence. Anchored to the activity-log trail rather than to literature estimates. |
| Threat Event Frequency (TEF) | Threat intelligence driven prioritisation: KEV catalogue matches on the in-scope estate, EPSS-enriched exploit likelihood on the open finding queue, external scan history showing observable attack surface, vulnerability disclosure programme inbound volume. |
| Vulnerability (V) | Open critical and high findings on the in-scope assets, aged finding count against SLA, exception count by severity, scan coverage gaps on the estate, MFA enforcement on privileged accounts, and control coverage by framework. Regenerates from findings management and compliance tracking. |
| Threat Capability (TCap) | Recorded against the scenario as engagement metadata: a calibrated, dated, named-author estimate that revises when threat intelligence on the workspace changes. The activity log captures revisions so the input is auditable. |
| Resistance Strength (RS) or Control Strength | Compliance tracking coverage per framework (NIST CSF 2.0, CIS Controls v8, ISO 27001, SOC 2, PCI DSS), authenticated scanning depth on in-scope systems, code scanning coverage on connected repositories, and encrypted-credential coverage. The strength input is the operating coverage rather than the policy aspiration. |
| Primary Loss Magnitude (PLM) | Response, replacement, productivity, and fines-and-judgements tiers recorded as scenario metadata. The response cost reads against the incident-response engagement template; the fines tier reads against the framework references compliance tracking carries. |
| Secondary Loss Event Frequency (SLEF) and Secondary Loss Magnitude (SLM) | Legal, regulatory, customer churn, and market response tiers recorded as scenario metadata. The regulatory tier reads against GDPR Article 83, NIS2 Article 34, DORA Article 50, SEC cybersecurity disclosure, HIPAA penalty tables, and PCI DSS card-brand fines as applicable to the scenario. |
| Annualised Loss Expectancy (ALE) or Loss Exposure Distribution | Computed by the CRQ engine the programme runs (FAIR-CAM, Open FAIR, RiskLens, in-house simulation) against the inputs above. SecPortal does not run the Monte Carlo simulation; it holds the auditable, dated inputs the engine reads. |
Six failure modes that quietly break the CRQ evidence loop
CRQ programmes fail in the same six places. They look like sensible defaults at the time (maintain a separate FAIR sheet, refresh annually, assert control efficacy, ignore exceptions) and the cost arrives at the audit committee, at the board risk committee, or at the regulator review when the residual band does not reconcile to the operating year.
The CRQ spreadsheet drifts from the operating record
A CRQ programme that maintains FAIR inputs in a parallel sheet and refreshes once a year is a programme that drifts from the live record. The vulnerability number in the scenario does not match the open backlog. The frequency input does not match the declared incident count. The control efficacy does not match the compliance coverage. The defensible practice is to derive the inputs from the workspace so the CRQ refresh reads the same record the operators run on.
Loss event frequency is a literature estimate without an anchor
Pulling LEF from an industry breach report and applying it to a single scenario without an internal anchor produces output that does not reconcile to the operating year. The audit committee reads it as a guess. The defensible LEF cites the declared incidents on the engagement, the VDP submission volume, the breach-notification cycles, and the post-incident retest evidence as the internal anchor; the literature estimate is a sanity check, not a substitute.
Control efficacy is asserted, not measured
A CRQ refresh that claims a control is operating without the compliance-tracking coverage, the scan history, the MFA enforcement state, or the encrypted-credential evidence behind the claim is asserting efficacy rather than measuring it. The activity-log trail is the auditable record of the operating control, and it is the input the FAIR model applies to threat capability.
Vulnerability input ignores aged findings and the exception register
A CRQ scenario that uses only the count of open criticals ignores the half-life of the backlog, the exception count by severity, and the compensating-control inventory. Aged criticals over the published SLA are a different vulnerability input from fresh criticals. Exceptions with documented compensating controls modify the vulnerability differently from undocumented residual risk. The findings management queue and the exception register are the two queryable inputs the model reads.
Loss magnitude tiers are not dated or attested
Primary and secondary loss tiers that float in the spreadsheet without a date or named attester are tiers the audit committee discounts. The defensible practice is to record each tier on the engagement as dated, named-author metadata with a documented review cadence so the magnitude input is an artefact rather than an opinion.
The treatment decision is not bound to the scenario
A CRQ output that produces a loss exposure band without binding the treatment decision (accept, reduce, transfer, avoid) to a remediation engagement, an exception register entry, a cyber insurance evidence pack, or a contractual indemnity is a number in a slide rather than a decision. The defensible practice is to bind every CRQ output to the operational record that implements the treatment so the next refresh reads against the action the team took.
Six fields every CRQ evidence loop policy has to record
A defensible CRQ evidence loop is six concrete fields on the workspace, not an abstract paragraph in the risk policy. Anything missing from the list below is a known gap in the audit trail rather than a detail that surfaces later when the audit committee, the internal auditor, or the regulator asks for the input record.
Named scenario register
A small set of named scenarios (between four and twelve) recorded on the workspace with the bound asset set, the FAIR input map, the loss magnitude tiers, the named accountable executive, and the review cadence. The register is the contract between the CRQ model and the live record so each refresh regenerates from the named scenarios rather than from a free-form sheet.
Per-scenario FAIR input anchor map
Each FAIR input (LEF, TEF, V, TCap, RS, PLM, SLEF, SLM) is mapped to a queryable anchor on the workspace: the engagement filter, the findings query, the compliance coverage view, the exception register filter, the activity-log filter, or the framework reference. The anchor keeps the CRQ refresh reproducible across analysts and across cycles.
Refresh cadence and trigger policy
A documented refresh cadence (quarterly minimum) plus a list of triggers that cause an off-cycle refresh: a material control change, a declared incident, a major scan-coverage gap closure, a regulated dataset change, an MFA enforcement change, a new framework adoption. The cadence and trigger policy is the audit-readable governance behind the CRQ programme.
Residual band and treatment decision record
Each scenario carries the residual loss exposure band, the treatment decision (accept, reduce, transfer, avoid), the named accountable executive, and the linked operational record that implements the decision (remediation engagement, exception register entry, cyber insurance evidence pack, indemnity reference). The record is the bridge between the CRQ output and the operating workflow.
Board and audit-committee narrative cadence
A documented cadence for board, audit-committee, and risk-committee narratives: the headline residual exposure band, the trend versus the prior period, the named drivers (backlog movement, exception movement, control coverage movement, incident movement), and the linked evidence anchor on the workspace. The narrative is regenerated from the live record rather than rewritten.
Activity-log retention and audit trail policy
A documented activity-log retention window (30, 90, or 365 days by plan) plus a documented evidence-preservation policy for the CRQ inputs across the period. The CSV export covers user attribution, timestamp, and event type per row so the audit committee, the internal auditor, and the regulator read the same trail the security team operates on.
CRQ evidence loop refresh checklist
Before each refresh and before any board, audit-committee, or regulator narrative is filed, the risk lead walks through a short checklist. Each item takes minutes; missing any one is the source of the failure modes above and the audit findings that follow.
- Named scenario register holds between four and twelve scenarios bound to in-scope assets.
- Each scenario carries a per-input FAIR anchor map pointing at a queryable workspace artefact.
- Vulnerability input regenerates from the findings management queue against the in-scope asset set.
- Control coverage input regenerates from the compliance tracking layer per framework.
- Loss event frequency cites declared incidents, VDP volume, and breach-notification cycles as the internal anchor.
- Threat event frequency cites KEV catalogue matches, EPSS-enriched exploit likelihood, and external scan history.
- Loss magnitude tiers are dated, attested, and reviewed on the documented cadence.
- Residual band, treatment decision, named accountable executive, and operational record link are recorded per scenario.
- Refresh cadence and trigger policy are documented on the workspace.
- Activity-log CSV export covers the refresh period with user attribution per row.
- Board and audit-committee narrative regenerates from the live record at each refresh.
- Exception register entries with the eight-field decision back every residual-band accept decision.
How the CRQ evidence loop looks in SecPortal
The CRQ evidence loop runs on the same workspace surfaces the rest of the security programme already uses. The discipline is keeping the named scenario, the FAIR input anchor, and the operating record on one workspace so the next refresh reads the live record rather than a separately maintained sheet. SecPortal does not run the Monte Carlo simulation; the CRQ engine the programme operates reads the inputs the workspace holds.
Engagement holds the scenario register
The named scenarios, the bound asset set, the per-input anchor map, the residual band, and the treatment decision sit on the engagement record. The next refresh reads from the same source.
Findings answer vulnerability
Findings management holds the open backlog by severity, the aged finding count, the EPSS-enriched likelihood, and the CVSS 3.1 vector behind every CRQ vulnerability input.
Scan history anchors threat input
External scanning, authenticated scanning, and code scanning histories carry the observable attack surface behind the threat event frequency input.
Compliance coverage anchors resistance
Compliance tracking maps controls to NIST CSF 2.0, CIS Controls v8, ISO 27001, SOC 2, and PCI DSS so the resistance strength input reads operating coverage rather than policy aspiration.
Exception register modifies vulnerability
The vulnerability acceptance and exception management workflow records the eight-field decision behind every open exception so the vulnerability input reads documented residual risk rather than undocumented risk.
Activity log is the audit trail
The activity log captures user attribution, timestamp, and event type per row across the refresh period. CSV export covers 30, 90, or 365 days by plan.
AI reports draft the narrative
AI-assisted reports regenerate the board narrative at each refresh: residual band, trend, named drivers, and the linked evidence anchor on the workspace.
Asset criticality binds scenarios
Asset criticality scoring records the in-scope asset tier per scenario so when the asset set moves the scenario regenerates against the new set.
Continuous monitoring keeps inputs fresh
Continuous monitoring on daily, weekly, biweekly, or monthly cadences keeps the vulnerability, threat, and control coverage inputs current between explicit refresh cycles.
Five reporting views the CRQ cycle actually drives
The reports that drive CRQ are not the static slide deck the risk lead files quarterly. They are the live views the audit committee, the board risk committee, the executive sponsor, and the security lead read across the refresh period. The five below derive from the live engagement record rather than a parallel extract.
Named scenario residual exposure register
The headline view for the audit committee and the board risk committee: the named scenarios, the residual loss exposure band per scenario, the trend versus prior period, and the named accountable executive. Regenerates from the engagement record so the next quarter reads the same source.
Per-scenario FAIR input drill-down
The analyst-facing view of the FAIR inputs per scenario: LEF, TEF, V, TCap, RS, PLM, SLEF, SLM each linked to the workspace anchor (findings query, compliance coverage view, exception register filter, activity-log filter, framework reference) the input regenerates from.
Treatment decision cohort view
The decision-facing view for the executive sponsor: the residual band, the treatment decision (accept, reduce, transfer, avoid), the linked operational record (remediation engagement, exception register entry, cyber insurance evidence pack, indemnity reference), and the named accountable executive.
Refresh cadence and trigger event log
The governance-facing view for the audit committee: every refresh on the documented cadence plus every trigger-driven off-cycle refresh, the named driver (material control change, declared incident, scan-coverage gap, regulated dataset change, MFA change), and the activity-log evidence behind each.
CRQ-to-leadership narrative draft
The board-readable narrative draft the AI-assisted reporting layer regenerates from the live record at each refresh: the headline residual exposure band, the trend, the named drivers, the linked evidence anchor, and the recommended treatment decisions. The security lead edits a draft rather than authoring from a blank page.
What regulators and frameworks expect behind the CRQ output
CRQ output is read against a small set of risk management standards, regulatory disclosures, and analytical frameworks. The mapping below shows where the workspace evidence reads against those baselines, so the audit committee, the regulator review, and the internal risk policy share the same source.
| Framework or regulation | What the standard expects |
|---|---|
| NIST SP 800-30 Risk Assessment Guide | NIST SP 800-30 expects the risk assessment to identify threats, vulnerabilities, likelihood, impact, and risk. The CRQ evidence loop reads against the workspace inputs the methodology contemplates: threats from threat intelligence driven prioritisation, vulnerabilities from findings management, likelihood from the activity-log trail and the historical engagement record, impact from the loss magnitude tiers on the scenario, and risk from the FAIR engine the programme runs. |
| ISO/IEC 27005 Information Security Risk Management | ISO/IEC 27005 expects the risk management process to identify, analyse, evaluate, and treat risk in a documented cycle. The CRQ evidence loop satisfies the documented cycle through the named scenario register, the per-scenario input anchor map, the refresh cadence policy, and the residual band and treatment decision record on the engagement. The activity log is the audit trail behind the cycle. |
| NIST CSF 2.0 Govern (GV) and Identify (ID) functions | NIST CSF 2.0 introduced the Govern function with sub-categories on risk management strategy (GV.RM), roles and responsibilities (GV.RR), policy (GV.PO), and oversight (GV.OV). The Identify function carries Risk Assessment (ID.RA) and Improvement (ID.IM). The CRQ evidence loop reads against these sub-categories: GV.RM through the documented refresh cadence, GV.RR through the named accountable executive per scenario, ID.RA through the FAIR input anchor map, and ID.IM through the treatment decision record. |
| FAIR (Open FAIR / Factor Analysis of Information Risk) | FAIR expects the analyst to compute LEF, TEF, V, TCap, RS, PLM, SLEF, and SLM against documented input estimates with calibrated ranges. The CRQ evidence loop produces the documented inputs as queryable workspace artefacts so the FAIR engine reads against an auditable record rather than against a static spreadsheet. SecPortal does not run the Monte Carlo simulation; it holds the inputs the engine reads. |
| SEC cybersecurity disclosure rules (Item 106 of Regulation S-K and Form 8-K Item 1.05) | The SEC expects registrants to describe their cybersecurity risk management, strategy, and governance, and to disclose material cybersecurity incidents on a defined timeline. CRQ output is one of the analytical inputs registrants reference in the risk management narrative. Anchoring CRQ to the operating record produces the auditable narrative the disclosure regime expects rather than a textual claim. |
| DORA, NIS2, GDPR, and HIPAA penalty regimes | The regulatory loss magnitude tiers in the FAIR scenario read against DORA Article 50, NIS2 Article 34, GDPR Article 83, and HIPAA Section 1176 penalty tables as applicable to the in-scope service. The compliance tracking layer holds the framework mapping so the regulatory tier in the scenario reads against the obligation the service is in scope for. |
Where the CRQ evidence loop sits in the security programme
The CRQ evidence loop is the analytical read of the security programme that compliance tracking, vulnerability SLA management, exception management, asset criticality scoring, and incident response all already feed. It composes with the rest of the workspace so the audit committee narrative, the board risk-committee narrative, the regulator review, and the cyber insurance underwriting pack share the same evidence source rather than being assembled separately for each.
Upstream and adjacent
The CRQ evidence loop reads from vulnerability SLA management (the SLA breach component of vulnerability), asset criticality scoring (the in-scope asset set per scenario), threat intelligence driven prioritisation (the KEV and EPSS inputs behind threat event frequency), and security debt portfolio management (the structural-risk view that complements the per-scenario view).
Downstream and reporting
CRQ output rolls up into security leadership reporting (the board cadence reads the residual exposure register), cyber insurance security evidence (the carrier-facing read of the same workspace inputs), compliance audits (the auditor reads the input anchor map), and audit evidence retention and disposal (the retention policy behind the activity-log trail).
Pair the workflow with the long-form guides and the framework references
The CRQ evidence loop is operational. The surrounding guides explain the buyer logic, the board narrative, and the risk-policy model that the loop feeds. Pair this workflow with the cyber risk quantification guide for the conceptual model, the board-level security reporting guide for the executive narrative, the cybersecurity risk assessment guide for the assessment methodology, and the risk-based vulnerability management buyer guide for the procurement perspective. The framework references that underpin the CRQ programme include FAIR, ISO/IEC 27005, NIST SP 800-30, ISO 31000, NIST CSF 2.0, and COSO ERM.
Buyer and operator pairing
The CRQ evidence loop is the workflow CISOs own as the executive sponsor of the residual exposure register, GRC and compliance teams run as the auditable risk management process, vulnerability management teams feed with the vulnerability and exception inputs, security operations leaders read for the cadence behind the input refresh, security programme managers maintain on the documented refresh cadence, internal security teams run as the analytical layer over the operating record, and vCISOs operate the workflow on behalf of clients without a dedicated risk function.
Honest scope: what SecPortal does and does not do for CRQ
SecPortal is the auditable evidence layer behind a CRQ programme. It is not a FAIR simulator and it does not replace the dedicated CRQ engine the programme operates. The scope below is the deliberate split between the workspace and the engine so the team picks the right tool for each layer.
What SecPortal does
- Holds the named scenario register against the in-scope asset set.
- Anchors each FAIR input to a queryable workspace artefact.
- Captures the dated, attested loss magnitude tiers as scenario metadata.
- Records the residual band and the treatment decision on the engagement.
- Provides the activity-log audit trail behind every refresh.
- Regenerates the board narrative through AI-assisted reports.
What SecPortal does not do
- Run the FAIR Monte Carlo simulation that produces the loss exposure distribution.
- Provide actuarial loss tables, industry loss databases, or breach-cost benchmarks.
- Auto-calibrate the threat capability or resistance strength values.
- Sync directly with FAIR-CAM, Open FAIR, RiskLens, ServiceNow GRC, or Archer.
- Compute insurance premium attribution or capital-allocation models.
- Replace the dedicated CRQ analyst or the calibrated estimation discipline.
What good CRQ evidence feels like
The FAIR inputs reconcile to the record
Every FAIR input regenerates from a queryable workspace anchor. The vulnerability number matches the open backlog. The control efficacy matches the compliance coverage. The frequency anchor matches the declared incident log.
Each refresh is a regeneration
The quarterly refresh regenerates the residual exposure register from the same record the operators run on. The trend versus prior period is operating-effectiveness evidence rather than a narrative.
Treatment decisions are operationalised
Reduce decisions become remediation engagements. Accept decisions become exception register entries with the eight-field decision. Transfer decisions become cyber insurance evidence packs. Avoid decisions retire the in-scope asset.
Audit trail is reproducible
The activity-log CSV across the refresh period plus the per-scenario input anchor map reconstructs every CRQ output for the audit committee, the internal auditor, and the regulator review.
The cyber risk quantification evidence loop is the analytical read of the security programme the workspace is already built to operate. Run it on the same engagement record so each FAIR input reconciles to the operating evidence, each refresh regenerates from the live record, each treatment decision binds to an operational record, and the audit trail reproduces on demand. For the conceptual model the loop implements, see the long-form cyber risk quantification guide.
Frequently asked questions about the cyber risk quantification evidence loop
What is a cyber risk quantification evidence loop?
The cyber risk quantification (CRQ) evidence loop is the operational workflow that derives FAIR model inputs from the live engagement record (findings management, compliance tracking, the exception register, the activity log, asset criticality scoring, the engagement history) rather than from a parallel spreadsheet. The loop runs each FAIR refresh against the same source the security team operates on so the loss exposure output reconciles to the operating year. SecPortal holds the auditable, dated inputs the FAIR engine reads; it does not run the Monte Carlo simulation itself.
How is the CRQ evidence loop different from cyber insurance security evidence?
Cyber insurance security evidence is the externally facing read of the security programme for carriers, brokers, and claim assessors against a questionnaire and a policy. The CRQ evidence loop is the internally facing read for the audit committee, the board risk committee, and the regulator against named scenarios and a FAIR model. The two share many evidence sources (the findings queue, the exception register, the activity log, the compliance coverage) but answer different audiences and run on different cadences. They compose on the same workspace.
Does SecPortal run the FAIR Monte Carlo simulation?
No. SecPortal does not run the Monte Carlo simulation that produces the loss exposure distribution. The CRQ engine the programme operates (FAIR-CAM, Open FAIR, RiskLens, in-house) consumes the inputs SecPortal holds: the vulnerability backlog state, the exception register, the compliance coverage, the activity-log trail, the asset-criticality scoring, the incident and disclosure history. The engine and the workspace separate concerns: the workspace is the auditable input record, the engine is the simulator.
Which FAIR inputs does the workspace anchor?
Loss event frequency (LEF) anchors against declared incidents, VDP submission volume, and breach-notification cycles on the engagement. Threat event frequency (TEF) anchors against KEV matches, EPSS-enriched exploit likelihood, and external scan history. Vulnerability (V) anchors against findings management with severity, aged finding count, exception count, and scan coverage. Threat capability (TCap) is recorded as dated scenario metadata. Resistance strength (RS) anchors against compliance tracking coverage. Primary and secondary loss magnitude tiers (PLM, SLEF, SLM) are recorded as dated, attested scenario metadata.
How often should the CRQ evidence loop refresh?
The defensible minimum cadence is quarterly. The cadence is supplemented by triggered refreshes against material control changes (a major scan-coverage gap, a declared incident, an MFA enforcement change, a regulated dataset change, a new framework adoption). The cadence policy and the trigger list are recorded on the workspace as audit-readable governance, and every refresh is captured on the activity log with user attribution, timestamp, and event type so the audit committee reads the same trail the analysts operate on.
How does the exception register feed CRQ vulnerability inputs?
The exception register holds the eight-field decision (linked finding, severity, compensating controls, residual likelihood, residual impact, business rationale, expiry, review cadence) behind every open finding that exceeds the SLA. The CRQ vulnerability input reads the exception count by severity and the compensating-control inventory as a modifier on the headline open backlog: undocumented residual risk modifies the vulnerability differently from documented residual risk. The exception register turns vague risk language into auditable scenario evidence.
How does asset criticality scoring feed CRQ scenario binding?
The named scenario register binds each scenario to a queryable asset set on the workspace. Asset criticality scoring carries the asset tier (the regulated payment service, the customer-data tier, the privileged-identity perimeter, the third-party-data flow) so the in-scope assets per scenario are recorded against a maintained register rather than a free-form description. When the asset set moves, the scenario regenerates against the new set rather than drifting silently.
How does the activity log support audit-committee review of CRQ output?
The activity log captures timestamped state changes against findings, engagements, scans, comments, documents, and team membership across the period. The CSV export covers 30, 90, or 365 days by plan with user attribution, timestamp, and event type per row. The audit committee, the internal auditor, and the regulator read the activity-log CSV as the operating-effectiveness evidence behind the residual exposure band. Without it, the CRQ output is an assertion; with it, the output is an auditable artefact.
How does AI-assisted reporting handle the board narrative?
AI-assisted reporting drafts the executive narrative against the live record at each refresh: the headline residual exposure band, the trend versus prior period, the named drivers (backlog movement, exception movement, control coverage movement, incident movement), and the linked evidence anchor on the workspace. The security lead reviews and edits the draft rather than authoring from a blank page. The headline numbers reconcile to the live engagement record because the report regenerates from the same source the operators run on.
Which frameworks and regulations reference CRQ output?
NIST SP 800-30 (Risk Assessment), ISO/IEC 27005 (Information Security Risk Management), NIST CSF 2.0 (Govern and Identify functions), FAIR / Open FAIR, the SEC cybersecurity disclosure regime (Item 106 of Regulation S-K, Form 8-K Item 1.05), DORA Article 50, NIS2 Article 34, GDPR Article 83, and HIPAA Section 1176 penalty tables all read against quantified risk output or against the risk management process the CRQ programme operates. The compliance tracking layer maps controls to these frameworks so the CRQ output and the audit lookback share the same source.
How it works in SecPortal
A streamlined workflow from start to finish.
Pick a small set of named risk scenarios and bind each to a queryable input set
A defensible CRQ programme operates on between four and twelve named scenarios that map directly to the business: a ransomware incident on the production estate, a customer data exfiltration through the web tier, a third-party breach on a regulated dataset, a privileged-credential compromise on the identity perimeter, an extended outage on a regulated payment service. Each scenario binds to a queryable input set on the workspace: the in-scope assets through asset criticality scoring, the vulnerability backlog by severity and aged finding count from findings management, the compensating-control inventory from the exception register, and the control coverage by framework from the compliance tracking layer. The scenarios are the contract between the FAIR model and the live record so each refresh regenerates from the same source rather than being reauthored.
Derive vulnerability and threat capability inputs from the operating record
FAIR vulnerability (the probability that an attack lands when a threat agent acts) and threat capability (the skill, persistence, and resourcing of the threat agent) are the two FAIR inputs CRQ teams misjudge most often when the inputs come from intuition. The vulnerability programme on the workspace produces the inputs from operating evidence: open critical and high findings on the in-scope assets, aged finding count against the published SLA, exception count by severity, EPSS-enriched exploit likelihood on CVE-bound findings, MFA enforcement state on privileged access, and scan coverage gaps on the in-scope estate. The vulnerability number in the scenario regenerates from the queue the operators run on rather than from a slide.
Anchor loss event frequency to the actual incident and disclosure record
FAIR loss event frequency (the rate at which the scenario results in a loss in a unit of time) is anchored against the operating record: declared incidents on the engagement, vulnerability disclosure programme volume on regulated services, third-party advisories the team has responded to in the policy period, breach-notification events recorded against the regulator-readiness workflow, and the post-incident retest evidence. When the rate is anchored against a queryable trail rather than against a literature estimate, the CRQ output reconciles to the board narrative the CISO is already telling about the operating year.
Build loss magnitude tiers against business and regulatory loss categories
Primary loss (response, replacement, productivity, fines and judgements, reputation) and secondary loss (legal, regulatory, customer churn, market response) are the FAIR loss magnitude categories the model expects. The loss magnitude tiers on the workspace are recorded as engagement metadata on each scenario: the response-cost band against the incident-response engagement template, the regulatory-fine band against the framework references the compliance tracking layer carries (GDPR Article 83, NIS2 Article 34, DORA Article 50, SEC cybersecurity disclosure), and the customer-loss band against the asset-criticality value of the affected systems. The tiers are explicit, reviewed, and dated rather than implicit in a spreadsheet a single analyst maintains.
Express the residual risk band and the treatment decision on the engagement record
CRQ output is only useful when the residual loss exposure band drives a treatment decision: accept, reduce, transfer, or avoid. The engagement record captures the residual band per scenario, the treatment decision, the named accountable executive, and the linked remediation engagement or exception register entry that operationalises the decision. Reducing residual exposure becomes a remediation engagement or a control investment with a measurable backlog. Transferring becomes a cyber insurance evidence pack feeding the underwriter or a contractual indemnity. Accepting becomes an exception register entry with the eight-field decision (linked finding, severity, compensating controls, residual likelihood, residual impact, business rationale, expiry, review cadence). The CRQ output and the treatment decision live on the same record so the next refresh reads the operating evidence behind the band rather than the intent behind it.
Refresh on a documented cadence and capture every input change in the activity log
A CRQ programme that refreshes once a year is a programme that drifts. The refresh cadence runs at minimum quarterly on the workspace with a triggered refresh on material control changes (a major scan-coverage gap, a published incident, a new regulated dataset, an MFA enforcement change). Every input change (new criticals on an in-scope asset, an aged exception expiring, a control coverage improvement, a closed incident-response engagement) is captured on the activity log with user attribution, timestamp, and event type. The activity-log CSV export is the audit trail the internal auditor, the board risk committee, the underwriter, and the regulator read against the CRQ output for the period.
Pair every CRQ refresh with a board-readable narrative drawn from the live record
The board, the audit committee, and the risk committee read CRQ output as a numerator-and-denominator story: the band moved because the backlog moved, the exception register grew, the control coverage closed a gap, or a new incident landed on the period. AI-assisted reporting drafts the executive narrative against the workspace: the open backlog by scenario asset, the closure rate, the breach pattern, the exception count and expiry profile, the framework coverage, and the activity-log evidence trail. The security lead edits a draft instead of authoring from a blank page, and the headline numbers reconcile to the live record because the report regenerates from the same source the operators run on.
Features that power this workflow
Orchestrate every security engagement from start to finish
Vulnerability management software that tracks every finding
Compliance tracking without a full GRC platform
Every action recorded across the workspace
AI-powered reports in seconds, not days
Test web apps behind the login
Vulnerability scanning tools that map your attack surface
Monitor continuously catch regressions early
Finding overrides that survive every scan cycle
Document management for every security engagement
Collaborate across your entire team
Multi-factor authentication on every workspace
Run CRQ on the same record the operators run on
Loss event frequency, vulnerability, exception, and control-coverage inputs from the live engagement. Activity-log evidence behind every refresh. Start free.
No credit card required. Free plan available forever.