Skip to content

Reports

Mapping report

The cartography report contains all the objects making up the cartography and the links between them.

It generates a Word document containing information on all the objects in the selected views at the desired level of granularity.


Lists

Mercator allows you to extract a range of information in the form of lists:

Supported entities and applications

Generates a list of information system entities and their supported applications.

This list can be used to draw up an inventory of the entities responsible for the various information system applications, along with their managers and contact points.

Applications by application group

List of applications by application group

This list provides an overview of all the applications in the information system, classified by application group. This list can be used to monitor vulnerabilities in information system applications.

Crisis Directory

Document centralizing critical applications, their suppliers, and relationships to facilitate management and continuity in crisis situations.

Security needs analysis

List of security requirements between macro-processes, processes, applications, databases and information.

This list is used to analyze the consistency of the information classification plan in terms of confidentiality, integrity, availability and traceability between processes, applications, databases and the information they contain.

VLANs

List of VLANs, subnets and devices

Configuration of Logical servers

List of logical servers by applications and managers.

This list can be used to identify logical server managers and the applications they serve.

Backups

List of inventoried backup plans of logical servers

External connections

External entities connected to the information system

Logical server configuration

Logical server configuration list.

This list is used to analyze the configuration of logical servers.

This list can be used to analyze the capacity required to run the information system, and to make year-on-year projections.

Physical infrastructure inventory

List of equipment by site/location

This list is used to review the physical inventory of information system equipment.

Every year, we recommend you print out this list and check that the equipment in the inventory corresponds to what is actually present in the corresponding premises, sites and bays.

Workstation inventory

Liste of workstations by site/building with they configuration


Business Impact Assessment (BIA)

Security needs

List of activities and applications with their security needs in terms of RTO and RPO

Impacts on business continuity

Measuring the consequences of a service interruption


Common Vulnerabilities and Exposures

Find matching CVE

Search for CVE based on application's CPE


GDPR

Register of processing

Register of processing

List of processes

List of treatments, applications, databases and related information.


Audit

Maturity levels

This list contains details of the maturity levels for each type of information system mapping object.

Updates / Changes

This list is used to audit changes made to the mapping.

A map that never changes is not up-to-date. This report identifies the changes (creations, deletions and modifications) made to the cartography by object type over the course of a year.