The first step in protecting your IT system and application portfolio is to draw up a comprehensive and exhaustive inventory of the applications that make up your IT system.
The idea is to ensure that application compliance requirements are met, that obsolete applications or components are identified and that there is a good understanding of modules, external components and exchange flows.
This involves listing all system components, including:
- applications or application components;
- databases and their components;
- Application Access Management (AAM);
- interfaces between applications and their data flows;
- the architecture patterns used.