Information Assurance Security Lifecycle

  1. INVENTORY
    1. Discovery
    2. Inventory
    3. Configuration Scan
    4. Vulnerability Scan
  2. ASSESS
    1. Automatically Test Assets against policy/regulations
    2. Automatically Calculate compliance
    3. Identify specific assets that are vulnerable/non-compliant
  3. NOTIFY
    1. Alerts regarding new risks, compliance issues, changes to the IT environment
    2. Notify regarding risk and compliance status
  4. REMEDIATE
    1. Business Process Automation
    2. Business Process Integration
    3. Library of vulnerabilities and thier patches and remedies
    4. Software distribution
  5. VALIDATE
    1. Confirm remediation efforts are complete
    2. Automatically adjust compliance and risk posture
  6. REPORT
    1. Management Views
    2. Data Mining
    3. Trending
    4. Compliance Reporting