Esc
Operational Activity Mapping
Definition
Operational activity mapping identifies activities of the organization and the organization's suborganizations, groups, roles, and individuals that carry out the activities and then establishes the dependencies of the activities on the systems and people that perform those activities.
Synonyms: Mission Mapping .
loading...
Technique Subclasses
There are 5 techniques in this category, Operational Activity Mapping.
Name | ID | Definition | Synonyms |
---|---|---|---|
Operational Activity Mapping | D3-OAM | Operational activity mapping identifies activities of the organization and the organization's suborganizations, groups, roles, and individuals that carry out the activities and then establishes the dependencies of the activities on the systems and people that perform those activities. | Mission Mapping |
- Access Modeling | D3-AM | Access modeling identifies and records the access permissions granted to administrators, users, groups, and systems. | |
- Operational Dependency Mapping | D3-ODM | Operational dependency mapping identifies and models the dependencies of the organization's activities on each other and on the organization's performers (people, systems, and services.) This may include modeling the higher- and lower-level activities of an organization forming a hierarchy, or layering, of the dependencies in an organization's activities. | |
- Operational Risk Assessment | D3-ORA | Operational risk assessment identifies and models the vulnerabilities of, and risks to, an organization's activities individually and as a whole. | Mission Risk Assessment |
- Organization Mapping | D3-OM | Organization mapping identifies and models the people, roles, and groups with an organization and the relations between them. |
loading...
References
All
Internet Article
The following references were used to develop the Operational Activity Mapping knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)
Catia UAF Plugin
Reference Type: Internet Article Organization: Dassault Systemes
D3FEND™
A knowledge graph of cybersecurity countermeasures