Loading...
Loading...
Guides cybersecurity asset modeling, inventory, and vulnerability assessment using MITRE D3FEND. Covers asset inventory (hardware, software, network, data, containers), network mapping, vulnerability enumeration, dependency mapping, and operational risk assessment. Use when building CMDBs, running asset discovery, mapping network topology, assessing vulnerabilities, or modeling organizational cyber posture—not for hardening controls (d3fend-harden), detection engineering (d3fend-detect), or incident response (d3fend-evict).
npx skill4agent add daemon-blockint-tech/agentic-enteprises-skill d3fend-modeld3fend-hardend3fend-detectd3fend-isolated3fend-evictcybersecurity| Asset Type | What to Capture | Tools |
|---|---|---|
| Hardware | Devices, firmware, components | Lansweeper, Nmap, agent-based discovery |
| Software | Installed apps, versions, licenses | SCCM, osquery, SBOM tools |
| Network | Nodes, interfaces, VLANs | Nmap, SNMP, network scanners |
| Data | Databases, file stores, sensitivity | Data classification tools |
| Containers | Images, registries, runtime inventory | Trivy, Docker Scout, Kubernetes APIs |
references/asset_inventory.mdreferences/network_mapping.mdreferences/vulnerability_assessment.mdreferences/dependency_risk_mapping.mdreferences/asset_inventory.mdreferences/network_mapping.mdreferences/vulnerability_assessment.mdreferences/dependency_risk_mapping.md