HOPEX IT Risk Management
:
HOPEX IT Risk Management
:
Managing inventories
Managing inventories
Inventory of IT Assets
About the IT Asset Inventory
Accessing the IT Inventory
Describing Applications
Describing Technologies
Inventory for Threats and Vulnerabilities
Examples of Threats, Vulnerability types, and Vulnerabilities
Viewing Threats
Viewing Vulnerabilities
Inventory of Risks and Controls
Viewing Risks
Viewing Controls
Preparing the Working Environment for Questionnaires
Inventory of Requirements and Regulations
Accessing Requirements and Regulations
Characteristics of regulations
Requirement Characteristics
Vendor Inventory
Accessing the list of vendors
Characteristics of vendors
List of technologies provided
Vendor Risk Assessment
The IT RM (IT Risk Management) inventories are used to build and view the inventory of the elements necessary to manage risks, compliance and IT vendors.
For more details on inventory use cases, see
"Using HOPEX IT Risk Management"
.