Asset inventorying identifies and records the organization's assets and enriches each inventory item with knowledge about their vulnerabilities.
Configuration inventory identifies and records the configuration of software and hardware and their components throughout the organization.
Data inventorying identifies and records the schemas, formats, volumes, and locations of data stored and used on the organization's architecture.
Software inventorying identifies and records the software items in the organization's architecture.
Asset Vulnerability Enumeration
Asset vulnerability enumeration enriches inventory items with knowledge identifying their vulnerabilities.
Network Node Inventory
Network node inventorying identifies and records all the network nodes (hosts, routers, switches, firewalls, etc.) in the organization's architecture.
Hardware Component Inventory
Hardware component inventorying identifies and records the hardware items in the organization's architecture.
Network mapping encompasses the techniques to identify and model the physical layer, network layer, and data exchange layers of the organization's network and their physical location, and determine allowed pathways through that network.
Logical Link Mapping
Logical link mapping creates a model of existing or previous node-to-node connections using network-layer data or metadata.
Active Logical Link Mapping
Active logical link mapping sends and receives network traffic as a means to map the whole data link layer, where the links represent logical data flows rather than physical connection
Passive Logical Link Mapping
Passive logical link mapping only listens to network traffic as a means to map the the whole data link layer, where the links represent logical data flows rather than physical connections.
Network Vulnerability Assessment
Network vulnerability assessment relates all the vulnerabilities of a network's components in the context of their configuration and interdependencies and can also include assessing risk emerging from the network's design as a whole, not just the sum of individual network node or network segment vulnerabilities.
Physical Link Mapping
Physical link mapping identifies and models the link connectivity of the network devices within a physical network.
Active Physical Link Mapping
Active physical link mapping sends and receives network traffic as a means to map the physical layer.
Passive Physical Link Mapping
Passive physical link mapping only listens to network traffic as a means to map the physical layer.
Network Traffic Policy Mapping
Network traffic policy mapping identifies and models the allowed pathways of data at the network, tranport, and/or application levels.
Operational Activity Mapping
Operational activity mapping identifies activities of the organization and the organization's suborganizations, groups, roles, and individuals that carry out the activities and then establishes the dependencies of the activities on the systems and people that perform those activities.,Identifying staff and organizational structure is part of operational activity mapping. One inventories assets; people are *not* assets, but are resources. Grasping operations and activities (missions) and mapping them to people is (notionally) last phase of modeling architecture.
Access modeling identifies and records the access permissions granted to administrators, users, groups, and systems.
Operational Dependency Mapping
Operational dependency mapping identifies and models the dependencies of the organization's activities on each other and on the organization's performers (people, systems, and services.) This may include modeling the higher- and lower-level activities of an organization forming a hierarchy, or layering, of the dependencies in an organization's activities.
Operational Risk Assessment
Operational risk assessment identifies and models the vulnerabilities of, and risks to, an organization's activities individually and as a whole.
Organization mapping identifies and models the people, roles, and groups with an organization and the relations between them.
System mapping encompasses the techniques to identify the organization's systems, how they are configured and decomposed into subsystems and components, how they are dependent on one another, and where they are physically located.
Data Exchange Mapping
Data exchange mapping identifies and models the organization's intended design for the flows of the data types, formats, and volumes between systems at the application layer.
Service Dependency Mapping
Service dependency mapping determines the services on which each given service relies.
System Dependency Mapping
System dependency mapping identifies and models the dependencies of system components on each other to carry out their function.
System Vulnerability Assessment
System vulnerability assessment relates all the vulnerabilities of a system's components in the context of their configuration and internal dependencies and can also include assessing risk emerging from the system's design as a whole, not just the sum of individual component vulnerabilities.