There are 5 techniques in this category, System Mapping.
|System mapping encompasses the techniques to identify the organization's systems, how they are configured and decomposed into subsystems and components, how they are dependent on one another, and where they are physically located.
|- Data Exchange Mapping
|Data exchange mapping identifies and models the organization's intended design for the flows of the data types, formats, and volumes between systems at the application layer.
|Information Exchange Mapping , and Data Flow Mapping
|- Service Dependency Mapping
|Service dependency mapping determines the services on which each given service relies.
|- System Dependency Mapping
|System dependency mapping identifies and models the dependencies of system components on each other to carry out their function.
|- System Vulnerability Assessment
|System vulnerability assessment relates all the vulnerabilities of a system's components in the context of their configuration and internal dependencies and can also include assessing risk emerging from the system's design as a whole, not just the sum of individual component vulnerabilities.
A knowledge graph of cybersecurity countermeasures