D3-AI   Asset Inventory  Asset inventorying identifies and records the organization's assets and enriches each inventory item with knowledge about their vulnerabilities.  
                                                    
                                                    
                                                         D3-CI   Configuration Inventory  Configuration inventory identifies and records the configuration of software and hardware and their components throughout the organization.    
                                                        
                                                    
                                                    
                                                         D3-DI   Data Inventory  Data inventorying identifies and records the schemas, formats, volumes, and locations of data stored and used on the organization's architecture.    
                                                        
                                                    
                                                    
                                                         D3-SWI   Software Inventory  Software inventorying identifies and records the software items in the organization's architecture.    
                                                        
                                                    
                                                    
                                                         D3-AVE   Asset Vulnerability Enumeration  Asset vulnerability enumeration enriches inventory items with knowledge identifying their vulnerabilities.    
                                                        
                                                    
                                                    
                                                         D3-NNI   Network Node Inventory  Network node inventorying identifies and records all the network nodes (hosts, routers, switches, firewalls, etc.) in the organization's architecture.    
                                                        
                                                    
                                                    
                                                         D3-HCI   Hardware Component Inventory  Hardware component inventorying identifies and records the hardware items in the organization's architecture.    
                                                        
                                                    
                                                
                                                    
                                                         D3-NM   Network Mapping  Network mapping encompasses the techniques to identify and model the physical layer, network layer, and data exchange layers of the organization's network and their physical location, and determine allowed pathways through that network.  
                                                    
                                                    
                                                         D3-LLM   Logical Link Mapping  Logical link mapping creates a model of existing or previous node-to-node connections using network-layer data or metadata.    
                                                        
                                                    
                                                         D3-ALLM   Active Logical Link Mapping  Active logical link mapping sends and receives network traffic as a means to map the whole data link layer, where the links represent logical data flows rather than physical connection    
                                                            
                                                        
                                                    
                                                         D3-PLLM   Passive Logical Link Mapping  Passive logical link mapping only listens to network traffic as a means to map the the whole data link layer, where the links represent logical data flows rather than physical connections.    
                                                            
                                                        
                                                    
                                                    
                                                         D3-NVA   Network Vulnerability Assessment  Network vulnerability assessment relates all the vulnerabilities of a network's components in the context of their configuration and interdependencies and can also include assessing risk emerging from the network's design as a whole, not just the sum of individual network node or network segment vulnerabilities.    
                                                        
                                                    
                                                    
                                                         D3-PLM   Physical Link Mapping  Physical link mapping identifies and models the link connectivity of the network devices within a physical network.    
                                                        
                                                    
                                                         D3-APLM   Active Physical Link Mapping  Active physical link mapping sends and receives network traffic as a means to map the physical layer.    
                                                            
                                                        
                                                    
                                                         D3-PPLM   Passive Physical Link Mapping  Passive physical link mapping only listens to network traffic as a means to map the physical layer.    
                                                            
                                                        
                                                    
                                                    
                                                         D3-NTPM   Network Traffic Policy Mapping  Network traffic policy mapping identifies and models the allowed pathways of data at the network, tranport, and/or application levels.    
                                                        
                                                    
                                                
                                                    
                                                         D3-OAM   Operational Activity Mapping  Operational activity mapping identifies activities of the organization and the organization's suborganizations, groups, roles, and individuals that carry out the activities and then establishes the dependencies of the activities on the systems and people that perform those activities.,Identifying staff and organizational structure is part of operational activity mapping. One inventories assets; people are *not* assets, but are resources. Grasping operations and activities (missions) and mapping them to people is (notionally) last phase of modeling architecture.  
                                                    
                                                    
                                                         D3-AM   Access Modeling  Access modeling identifies and records the access permissions granted to administrators, users, groups, and systems.    
                                                        
                                                    
                                                    
                                                         D3-ODM   Operational Dependency Mapping  Operational dependency mapping identifies and models the dependencies of the organization's activities on each other and on the organization's performers (people, systems, and services.)  This may include modeling the higher- and lower-level activities of an organization forming a hierarchy, or layering, of the dependencies in an organization's activities.    
                                                        
                                                    
                                                    
                                                         D3-ORA   Operational Risk Assessment  Operational risk assessment identifies and models the vulnerabilities of, and risks to, an organization's activities individually and as a whole.    
                                                        
                                                    
                                                    
                                                         D3-OM   Organization Mapping  Organization mapping identifies and models the people, roles, and groups with an organization and the relations between them.    
                                                        
                                                    
                                                
                                                    
                                                         D3-SYSM   System Mapping  System mapping encompasses the techniques to identify the organization's systems, how they are configured and decomposed into subsystems and components, how they are dependent on one another, and where they are physically located.  
                                                    
                                                    
                                                         D3-DEM   Data Exchange Mapping  Data exchange mapping identifies and models the organization's intended design for the flows of the data types, formats, and volumes between systems at the application layer.    
                                                        
                                                    
                                                    
                                                         D3-SVCDM   Service Dependency Mapping  Service dependency mapping determines the services on which each given service relies.    
                                                        
                                                    
                                                    
                                                         D3-SYSDM   System Dependency Mapping  System dependency mapping identifies and models the dependencies of system components on each other to carry out their function.    
                                                        
                                                    
                                                    
                                                         D3-SYSVA   System Vulnerability Assessment  System vulnerability assessment relates all the vulnerabilities of a system's components in the context of their configuration and internal dependencies and can also include assessing risk emerging from the system's design as a whole, not just the sum of individual component vulnerabilities.