Reports¶
Mapping report¶
The cartography report contains all the objects making up the cartography and the links between them.
It generates a Word document containing information on all the objects in the selected views at the desired level of granularity.
Lists¶
Mercator allows you to extract a range of information in the form of lists:
Supported entities and applications¶
Generates a list of information system entities and their supported applications.
This list can be used to draw up an inventory of the entities responsible for the various information system applications, along with their managers and contact points.
Applications by application group¶
List of applications by application group
This list provides an overview of all the applications in the information system, classified by application group. This list can be used to monitor vulnerabilities in information system applications.
Crisis Directory¶
Document centralizing critical applications, their suppliers, and relationships to facilitate management and continuity in crisis situations.
Security needs analysis¶
List of security requirements between macro-processes, processes, applications, databases and information.
This list is used to analyze the consistency of the information classification plan in terms of confidentiality, integrity, availability and traceability between processes, applications, databases and the information they contain.
VLANs¶
List of VLANs, subnets and devices
Configuration of Logical servers¶
List of logical servers by applications and managers.
This list can be used to identify logical server managers and the applications they serve.
Backups¶
List of inventoried backup plans of logical servers
External connections¶
External entities connected to the information system
Logical server configuration¶
Logical server configuration list.
This list is used to analyze the configuration of logical servers.
This list can be used to analyze the capacity required to run the information system, and to make year-on-year projections.
Physical infrastructure inventory¶
List of equipment by site/location
This list is used to review the physical inventory of information system equipment.
Every year, we recommend you print out this list and check that the equipment in the inventory corresponds to what is actually present in the corresponding premises, sites and bays.
Workstation inventory¶
Liste of workstations by site/building with they configuration
Business Impact Assessment (BIA)¶
Security needs¶
List of activities and applications with their security needs in terms of RTO and RPO
Impacts on business continuity¶
Measuring the consequences of a service interruption
Common Vulnerabilities and Exposures¶
Find matching CVE¶
Search for CVE based on application's CPE
GDPR¶
Register of processing¶
Register of processing
List of processes¶
List of treatments, applications, databases and related information.
Audit¶
Maturity levels¶
This list contains details of the maturity levels for each type of information system mapping object.
Updates / Changes¶
This list is used to audit changes made to the mapping.
A map that never changes is not up-to-date. This report identifies the changes (creations, deletions and modifications) made to the cartography by object type over the course of a year.
