DELIVERABLESVulnerable Asset List - Submit the completed list of vulnerable assets Internal and External Threats List - submit the itemized list of threats External Inputs of Threats and Vulnerabiliti

Internal and External Threats Template

In this step, you will build on your vulnerable asset list from the first step to identify threats and vulnerabilities -- internal and external to the enterprise, for each asset.

Vulnerable Assets

Threats and Vulnerabilities 

Note: You can add more rows to the bottom of the table if needed.