Loading...
Loading...
Mission Browser
Browse, filter, and explore the complete CDA mission catalog.
Showing 19 of 94 missions
Complete discovery and classification of all data assets across the organization.
Map all data flows including ingress, egress, internal transfers, and third-party sharing.
Evaluate current data classification schemes and identify gaps in labeling and handling.
External and internal attack surface enumeration including shadow IT discovery.
Comprehensive vulnerability scanning across all network segments and applications.
Audit system configurations against CIS benchmarks and industry standards.
Establish baseline security posture score across all six PDM domains.
Complete inventory of all endpoints including BYOD and IoT devices.
Evaluate email security controls including SPF, DKIM, DMARC, and gateway configuration.
Measure current security awareness levels through simulated phishing and assessments.
Complete inventory of all identity sources, service accounts, and privileged access.
Review role assignments, permissions, and least-privilege compliance across all systems.
Evaluate authentication methods, MFA coverage, and password policies.
Industry-specific threat intelligence briefing covering relevant threat actors and TTPs.
Search dark web markets and forums for leaked credentials, data, and mentions.
Develop threat models for critical assets using STRIDE or MITRE ATT&CK frameworks.
Enterprise risk assessment identifying, analyzing, and prioritizing information security risks.
Map current controls to applicable compliance frameworks and identify gaps.
Review existing security policies for completeness, currency, and alignment with standards.