What the Identify function covers
Asset management for small businesses
Conducting a practical risk assessment
Supply chain risk in the Identify function
Key Takeaways
TL;DR
The Identify function is foundational — you cannot protect what you do not know about or assess risks you have not identified.
Asset management starts with a simple spreadsheet covering hardware, software, data, and service providers.
A practical risk assessment for a small business can be completed in a day and documented in 2-3 pages.
Supply chain risk is one of the most underestimated threats — CDK, SolarWinds, and MOVEit proved that vendor compromises cascade to customers.
Cyber Defense Agent automates external asset discovery and vulnerability identification, accelerating the Identify function.
FAQ
Frequently asked questions
How often should I update my asset inventory?
Review your asset inventory at least quarterly and update it whenever you add new hardware, software, or service providers. Many small businesses find that setting a calendar reminder for quarterly reviews works well. CDA continuously monitors your external assets, so changes in your internet-facing infrastructure are caught automatically.
Do I need a formal risk assessment methodology?
No. The NIST CSF does not prescribe a specific methodology. A simple likelihood-times-impact matrix works well for small businesses. The important thing is that you document your assessment, base it on your actual environment (not a generic template), and review it at least annually.
What is shadow IT and why does it matter?
Shadow IT refers to technology used by employees without organizational approval — personal cloud storage, unapproved messaging apps, browser extensions, and SaaS tools signed up with business email. Shadow IT matters because it creates unmanaged, unmonitored attack surface. Ask your employees what tools they use and include them in your asset inventory.
How does CDA help with the Identify function?
CDA automatically discovers and assesses your external assets: domains, subdomains, DNS records, mail servers, web servers, open ports, exposed services, SSL certificates, and email authentication configuration. This automated external asset discovery and risk assessment feeds directly into the Identify function, saving you hours of manual work.
Get your Cyber Defense Score™ in 60 seconds.
100 tools. No installation. No credit card. Real evidence.