DELIVERABLESVulnerable Asset List - Submit the completed list of vulnerable assets Internal and External Threats List - submit the itemized list of threats External Inputs of Threats and Vulnerabiliti

Vulnerable Assets Template

In this step, list all the vulnerable assets for the enterprise. 

Note that assets should simply be identified at this stage. Items do not need to be prioritized or assigned values. Pay particular attention to application software in both the acquisition and implementation phases. 

This initial list should be as comprehensive as possible, even if you don’t keep every item in your final working list of resources to be protected.

Vulnerable Assets