You are on page 1of 3

System

Inputs

Contextual
Event Data
Data

Operating Systems Vulnerability Scans


Applications User Information
Devices Asset Information
Databases Threat Intelligence

SIEM

Data Completion
Collection System Outputs Logic Rules
Normalization Aggregation

Analysis
Reports
Real-time Monitoring
• Analysis and Discovery Systems • Cleanse data based on
business rules. • Load data into NPPMS
• Review existing documentation new systems
• Match. merge,
• Gather relevant metadata • Exception handling.
deduplication
• Manual cleansing

Analysis and Extract and


Cleanse Validate Load Reconcile
Discovery Profile

• Extract master and • Preload reports. • Postload reports


transactional data. • Preload error reports. • Postload error reports.
• Dependency uniqueness, • Business sign-off • Business sign-off
redundancy analysis.
• Data quality assessment.
VAPT Testing Methodology
( Web & Mobile )
Information Analysis and Vulnerability Risk Analysis and
Exploitation Reporting
Gathering Planning Discovery Recommendations

You might also like