
Goal: Assess the organization’s digital footprint, business structure, and attack surface as it currently stands.
- Hardware Asset Inventory
- Software Asset Inventory
- Third-Party Access Inventory
- User Roles & Job Functions
- Digital Identities & Accounts
- Privileged Accounts
- Shared & Service Accounts
- Shadow IT Identification
- AI Tool Identification
- Legacy Systems
- Network Maps
- Site Survey
- Data Discovery
- Data Classification
- Data Flows
- Interdependencies
- Legal/Regulatory Requirements
