There are 8 techniques in this category, Asset Inventory.
|Asset inventorying identifies and records the organization's assets and enriches each inventory item with knowledge about their vulnerabilities.
|Asset Discovery , and Asset Inventorying
|- Container Image Analysis
|Analyzing a Container Image with respect to a set of policies.
|Container Image Scanning
|- Configuration Inventory
|Configuration inventory identifies and records the configuration of software and hardware and their components throughout the organization.
|- Data Inventory
|Data inventorying identifies and records the schemas, formats, volumes, and locations of data stored and used on the organization's architecture.
|Data Discovery , and Data Inventorying
|- Software Inventory
|Software inventorying identifies and records the software items in the organization's architecture.
|Software Discovery , and Software Inventorying
|- Asset Vulnerability Enumeration
|Asset vulnerability enumeration enriches inventory items with knowledge identifying their vulnerabilities.
|- Network Node Inventory
|Network node inventorying identifies and records all the network nodes (hosts, routers, switches, firewalls, etc.) in the organization's architecture.
|System Discovery , and System Inventorying
|- Hardware Component Inventory
|Hardware component inventorying identifies and records the hardware items in the organization's architecture.
|Hardware Component Discovery , and Hardware Component Inventorying
A knowledge graph of cybersecurity countermeasures