D3-AI
Asset Inventory
Asset inventorying identifies and records the organization's assets and enriches each inventory item with knowledge about their vulnerabilities.
D3-CI
Configuration Inventory
Configuration inventory identifies and records the configuration of software and hardware and their components throughout the organization.
D3-DI
Data Inventory
Data inventorying identifies and records the schemas, formats, volumes, and locations of data stored and used on the organization's architecture.
D3-SWI
Software Inventory
Software inventorying identifies and records the software items in the organization's architecture.
D3-AVE
Asset Vulnerability Enumeration
Asset vulnerability enumeration enriches inventory items with knowledge identifying their vulnerabilities.
D3-NNI
Network Node Inventory
Network node inventorying identifies and records all the network nodes (hosts, routers, switches, firewalls, etc.) in the organization's architecture.
D3-HCI
Hardware Component Inventory
Hardware component inventorying identifies and records the hardware items in the organization's architecture.
D3-NM
Network Mapping
Network mapping encompasses the techniques to identify and model the physical layer, network layer, and data exchange layers of the organization's network and their physical location, and determine allowed pathways through that network.
D3-LLM
Logical Link Mapping
Logical link mapping creates a model of existing or previous node-to-node connections using network-layer data or metadata.
D3-ALLM
Active Logical Link Mapping
Active logical link mapping sends and receives network traffic as a means to map the whole data link layer, where the links represent logical data flows rather than physical connection
D3-PLLM
Passive Logical Link Mapping
Passive logical link mapping only listens to network traffic as a means to map the the whole data link layer, where the links represent logical data flows rather than physical connections.
D3-NVA
Network Vulnerability Assessment
Network vulnerability assessment relates all the vulnerabilities of a network's components in the context of their configuration and interdependencies and can also include assessing risk emerging from the network's design as a whole, not just the sum of individual network node or network segment vulnerabilities.
D3-PLM
Physical Link Mapping
Physical link mapping identifies and models the link connectivity of the network devices within a physical network.
D3-APLM
Active Physical Link Mapping
Active physical link mapping sends and receives network traffic as a means to map the physical layer.
D3-PPLM
Passive Physical Link Mapping
Passive physical link mapping only listens to network traffic as a means to map the physical layer.
D3-NTPM
Network Traffic Policy Mapping
Network traffic policy mapping identifies and models the allowed pathways of data at the network, tranport, and/or application levels.
D3-OAM
Operational Activity Mapping
Operational activity mapping identifies activities of the organization and the organization's suborganizations, groups, roles, and individuals that carry out the activities and then establishes the dependencies of the activities on the systems and people that perform those activities.,Identifying staff and organizational structure is part of operational activity mapping. One inventories assets; people are *not* assets, but are resources. Grasping operations and activities (missions) and mapping them to people is (notionally) last phase of modeling architecture.
D3-AM
Access Modeling
Access modeling identifies and records the access permissions granted to administrators, users, groups, and systems.
D3-ODM
Operational Dependency Mapping
Operational dependency mapping identifies and models the dependencies of the organization's activities on each other and on the organization's performers (people, systems, and services.) This may include modeling the higher- and lower-level activities of an organization forming a hierarchy, or layering, of the dependencies in an organization's activities.
D3-ORA
Operational Risk Assessment
Operational risk assessment identifies and models the vulnerabilities of, and risks to, an organization's activities individually and as a whole.
D3-OM
Organization Mapping
Organization mapping identifies and models the people, roles, and groups with an organization and the relations between them.
D3-SYSM
System Mapping
System mapping encompasses the techniques to identify the organization's systems, how they are configured and decomposed into subsystems and components, how they are dependent on one another, and where they are physically located.
D3-DEM
Data Exchange Mapping
Data exchange mapping identifies and models the organization's intended design for the flows of the data types, formats, and volumes between systems at the application layer.
D3-SVCDM
Service Dependency Mapping
Service dependency mapping determines the services on which each given service relies.
D3-SYSDM
System Dependency Mapping
System dependency mapping identifies and models the dependencies of system components on each other to carry out their function.
D3-SYSVA
System Vulnerability Assessment
System vulnerability assessment relates all the vulnerabilities of a system's components in the context of their configuration and internal dependencies and can also include assessing risk emerging from the system's design as a whole, not just the sum of individual component vulnerabilities.