Skip to main content
By following this guide, you will create a bowtie analysis diagram — from defining the top event through identifying threats and consequences, adding barriers, and assessing barrier effectiveness.
Who should read this: Safety managers and admins who perform risk analyses. Investigators and hazard owners also benefit from understanding how bowtie diagrams map causal pathways and controls.Prerequisites: Safety manager or admin role with risk assessment permissions. Familiarity with the Bowtie Analysis reference and the Risk Matrix is recommended.

When to Use Bowtie Analysis

Use a bowtie analysis when:
  • A hazard has multiple causal pathways (threats) that could lead to the undesired event.
  • You need to visualize the relationship between threats, controls, and consequences for stakeholder communication.
  • The 5x5 risk matrix alone does not provide sufficient detail about which specific barriers are managing each pathway.
  • An investigation has identified barrier failures and you need to map the defense-in-depth structure.
  • A hazard is in the yellow (ALARP) or red (Unacceptable) zone and requires systematic barrier analysis.
For simple hazards with a single threat and clear controls, the 5x5 risk matrix may be sufficient on its own.

Create a Bowtie Analysis

1
Step 1: Navigate to the Bowtie page
2
Go to Safety > Hazards > Bowtie Analysis. This page lists all existing bowtie diagrams for your workspace.
3
Step 2: Create a new bowtie
4
Click New Bowtie. A dialog prompts you for the initial information.
5
Step 3: Define the top event
6
Enter the Top Event — the central undesired event at the heart of the bowtie. This should be the pivotal moment where control is lost.
7
Write the top event as a specific, observable event, not a vague condition. “Loss of runway directional control during landing” is more useful than “Runway problem.”
8
Step 4: Give the bowtie a title
9
Enter a descriptive title that summarizes the analysis scope (e.g., “Engine Failure During Takeoff”).
11
If the bowtie is associated with an existing hazard register entry, select it from the Linked Hazard dropdown. This creates traceability between the bowtie and the risk assessment record.
12
Step 6: Add a description (optional)
13
Provide additional context about the scope, operational context, or purpose of the analysis.
14
Step 7: Create the bowtie
15
Click Create. The system creates a draft bowtie and opens the detail page.

Add Threats (Left Side)

Threats are the causal factors on the left side of the bowtie. Each threat represents a distinct pathway that could lead to the top event.
1
Step 1: Identify potential threats
2
Ask: “What could cause this top event?” Consider threats across four categories:
3
CategoryExamplesHumanPilot error, fatigue, miscommunication, inadequate training.TechnicalEquipment malfunction, system failure, software error.OrganizationalProcedural gaps, staffing shortages, inadequate supervision.EnvironmentalWeather conditions, runway contamination, wildlife activity.
4
Step 2: Add each threat
5
For each identified threat, add it to the bowtie with a clear description, category classification, and likelihood assessment (rare, unlikely, possible, likely, or almost certain).
6
Step 3: Order threats by priority
7
Arrange threats from highest likelihood to lowest so the diagram highlights the most probable causal pathways first.
Use investigation findings, safety reports, and industry data to identify threats. Do not rely solely on brainstorming — review your organization’s historical data for evidence-based threat identification.

Add Consequences (Right Side)

Consequences are the potential outcomes on the right side of the bowtie. They represent what could happen if the top event occurs and recovery barriers are insufficient.
1
Step 1: Identify potential consequences
2
Ask: “If this top event occurs, what could happen?” Consider consequences across four impact domains:
3
DomainExamplesSafetyInjury, fatality, aircraft damage, environmental contamination.OperationalFlight delay, aircraft out of service, operational disruption.FinancialRepair costs, liability claims, regulatory fines, insurance impact.ReputationalMedia attention, customer confidence loss, regulatory scrutiny.
4
Step 2: Add each consequence
5
For each consequence, provide a clear description, severity rating (negligible through catastrophic), and impact category.
6
Step 3: Order by severity
7
Arrange consequences from most severe to least severe.

Add Preventive Barriers (Left Side)

Preventive barriers sit between threats and the top event. They are the controls that stop threats from causing the undesired event.
1
Step 1: For each threat, identify existing controls
2
Review what controls are currently in place that prevent each threat from leading to the top event. These may be SOPs, training requirements, engineering controls, or equipment.
3
Step 2: Add each barrier
4
For each barrier, provide:
5
  • A description of what the barrier does.
  • The barrier category — engineering, administrative, procedural, or PPE.
  • The linked threat — which threat this barrier blocks.
  • 6
    Step 3: Identify gaps
    7
    If a threat has no preventive barriers, or if existing barriers are known to be weak, flag the gap. Consider creating a CPA to implement a new barrier.

    Add Recovery Barriers (Right Side)

    Recovery barriers sit between the top event and consequences. They mitigate or limit the damage after the top event has occurred.
    1
    Step 1: For each consequence, identify existing mitigations
    2
    Review what controls would limit or prevent each consequence if the top event occurs. These are emergency procedures, protective equipment, containment measures, and response plans.
    3
    Step 2: Add each barrier
    4
    For each recovery barrier, provide the description, category, and linked consequence it mitigates.
    5
    Step 3: Identify gaps
    6
    If a severe consequence has no recovery barriers, this represents a significant risk gap requiring immediate attention.

    Assess Barrier Effectiveness

    1
    Step 1: Evaluate each barrier
    2
    For every barrier (preventive and recovery), assess its effectiveness:
    3
    RatingCriteriaEffectiveEvidence demonstrates the barrier works consistently. Verified through testing, audits, or operational experience.Partially EffectiveBarrier works under normal conditions but has known gaps, limitations, or dependencies on human compliance.IneffectiveBarrier does not reliably prevent the threat or mitigate the consequence. Evidence of failures exists.Not AssessedBarrier has not yet been evaluated. Schedule assessment.
    4
    Step 2: Address ineffective barriers
    5
    For any barrier rated as ineffective or partially effective, determine the appropriate action:
    6
  • Create a CPA to improve the barrier.
  • Replace the barrier with a more effective control.
  • Add a complementary barrier to provide defense in depth.
  • 8
    When a CPA is created to address a barrier gap, link it to the barrier record for traceability. This allows you to track whether the barrier improvement has been implemented and verified.
    A bowtie with multiple ineffective barriers indicates systemic risk. Escalate to the safety committee and consider whether operations should continue under current conditions until barriers are strengthened (14 CFR 5.55).

    Finalize and Activate

    Once threats, consequences, and barriers are documented and effectiveness is assessed, change the bowtie status from Draft to Active. Active bowties are included in ongoing safety assurance monitoring. Review active bowties periodically as part of your hazard review cycle to verify that barrier effectiveness has not degraded.

    Bowtie Analysis Reference

    Complete reference for bowtie structure, fields, and methodology.

    Conduct a Risk Assessment

    How the 5x5 risk matrix complements bowtie analysis.

    Hazard Register

    The hazard records that bowtie analyses link to.

    Create a CPA

    Implementing barriers identified through bowtie analysis.
    Last modified on April 11, 2026