DELIVERABLESVulnerable Asset List - Submit the completed list of vulnerable assets Internal and External Threats List - submit the itemized list of threats External Inputs of Threats and Vulnerabiliti
Internal and External Threats Template
In this step, you will build on your vulnerable asset list from the first step to identify threats and vulnerabilities -- internal and external to the enterprise, for each asset.
Vulnerable Assets | Threats and Vulnerabilities |
Note: You can add more rows to the bottom of the table if needed. |