Skip to the content Skip to the Navigation
CyberLadder.io
  • Home
  • Background
  • The Framework
    • Introduction
    • Stage 1: Identify & Document
    • Stage 2: Plan
    • Stage 3: Implement
    • Stage 4: Educate & Test
  • Threats
  • Common Mistakes
  • Cautionary Tales
  • Glossary

Stage 1: Identify & Document

  1. HOME
  2. Stage 1: Identify & Document
  1. What Is A Cybersecurity Program?
  2. Hardware Asset Inventory
  3. Software Asset Inventory
  4. Network Maps
  5. Physical Site Map
  6. Digital Identity Inventory
  7. Privileges & Access Controls
  8. Data Classification
  9. Third-Party Access Inventory
  10. Data Flows
  11. Business Systems & Critical Processes
  12. Dependency Map
  13. Basic Security Scans
  14. Reconnaissance
  15. Applicable Regulations
  16. Stakeholders
  17. Business Impact Analysis (BIA)
  18. Risk Assessment & Management
  19. Gap Analysis

An UMPI Capstone Project
More About UMPI

Homepage

Cybersecurity Program

YourPace Programs

Apply

Further Reading

NIST Cybersecurity Framework

MITRE ATT&CK

CISA Homepage

Center for Internet Security (CIS)

ISO/IEC 27001:2022

Copyright © CyberLadder.io All Rights Reserved.

Powered by WordPress & Lightning Theme by Vektor,Inc. technology.

MENU
  • Home
  • Background
  • The Framework
    • Introduction
    • Stage 1: Identify & Document
    • Stage 2: Plan
    • Stage 3: Implement
    • Stage 4: Educate & Test
  • Threats
  • Common Mistakes
  • Cautionary Tales
  • Glossary