Skip to the content Skip to the Navigation
CyberLadder.io
  • Home
  • Background
  • The Framework
    • Introduction
    • Stage 1: Identify & Document
    • Stage 2: Plan
    • Stage 3: Implement
    • Stage 4: Test, Monitor, and Educate
  • Threats & Attacks
  • Common Mistakes
  • Case Studies

Stage 1: Identify & Document

  1. HOME
  2. Stage 1: Identify & Document
Goal: Assess the organization’s digital footprint, business structure, and attack surface as it currently stands.
  1. Hardware Asset Inventory
  2. Software Asset Inventory
  3. Third-Party Access Inventory
  4. User Roles & Job Functions
  5. Digital Identities & Accounts
  6. Privileged Accounts
  7. Shared & Service Accounts
  8. Shadow IT Identification
  9. AI Tool Identification
  10. Legacy Systems
  11. Network Maps
  12. Site Survey
  13. Data Discovery
  14. Data Classification
  15. Data Flows
  16. Interdependencies
  17. Legal/Regulatory Requirements

An UMPI Capstone Project
More About UMPI

Homepage

Cybersecurity Program

YourPace Programs

Apply

Further Reading

NIST Cybersecurity Framework

MITRE ATT&CK

CISA Homepage

Center for Internet Security (CIS)

ISO/IEC 27001:2022

Copyright © CyberLadder.io All Rights Reserved.

Powered by WordPress & Lightning Theme by Vektor,Inc. technology.

MENU
  • Home
  • Background
  • The Framework
    • Introduction
    • Stage 1: Identify & Document
    • Stage 2: Plan
    • Stage 3: Implement
    • Stage 4: Test, Monitor, and Educate
  • Threats & Attacks
  • Common Mistakes
  • Case Studies