Framework
Risk

Bowtie Analysis

Causes → event → consequences

Best for
mapping preventions and mitigations
Time
1–2 hr
Difficulty
Intermediate
Example

Mapping preventions and mitigations around a customer-data breach

Bowtie analysis
  1. Causes — phishing, leaked token, vendor compromise, misconfigured S3
  2. Top event — customer PII exposed externally
  3. Preventive barriers — SSO + 2FA, secret scanning, vendor reviews, IaC linting
  4. Consequences — regulatory fines, churn spike, brand damage, lawsuits
  5. Mitigating barriers — IR runbook, cyber insurance, customer comms template, audit log

Related frameworks

Want to fill in your own Bowtie Analysis?
Get FrameworkList for iOS