Risk Identification Reports
Criticality of applications
Access path
Reports > IT Risk > Identification > Application Criticality
Parameters
• Business process: list of business processes

A business process represents a system that offers products or services to an internal or external client of the company or organization. At the higher levels, a business process represents a structure and a categorization of the business. It can be broken down into other processes. The link with organizational processes will describe the real implementation of the business process in the organization. A business process can also be detailed by a functional view.
• Type of application (optional)
Result
This report presents, in bubble form, the applications connected to business processes, with the following information:
|
X-axis
|
The number of applications interfaced via application flows with the application in question
|
|
Y-axis
|
The number of business capabilities connected to the application
|
|
Size of the bubble
|
Number of software installations for the application
|
|
Color of the bubble
|
Depends on the global cost of the application
|

A business capability is a component of information system processing. Processing can for example correspond to an activity or an enterprise business.

The global cost of the application is available in
HOPEX IT Portfolio Management.
Example
Table of Threats and Vulnerabilities
Access path
Reports > IT Risk > Identification > Threat and Vulnerability Table
Parameters
• Start and end dates

The start and end dates define the value range to take into account for the assessments. If the same object is assessed more than once during this period, the most recent assessment is taken into account.
• Threats using vulnerabilities

Threats are external or internal factors that endanger the IT assets of the enterprise.

Vulnerabilities are failures to control an IT asset that makes it vulnerable to a threat and can lead to a breach of confidentiality, lack of integrity or availability of this asset.
Result
The report presents the risks via the Threat > Vulnerability > Application tree.
It displays the most recent risk assessment for the application context.
Example