Computer hardware, software and connections is required for computing. A technical system audit includes a detailed inventory of all computer hardware, software and systems (processes).
Until now, this has been a costly task requiring time, manpower, technical expertise, tools and wizardry.
It is simple:
Capture data to create an inventory
Amalgamate data inventories
Analyse data use as part of operations
The SysAuditor tool set automates the collection, amalgamation and analysis of a computing environment. The collection tools gather detailed hardware information (chips, memory, buses, etc.) and software drivers associated with hardware components is linked and captured. Operating system (OS) details, versions, licensing and related information is important for any audit. Processes, connectivity and numerous other data elements are captured and inventoried for later analysis.
The auditor workflow starts with creating individual system inventories. Individual inventories are combined to create an enterprise inventory. The enterprise inventory is analysed to create a picture of systems operations to identify operational strengths and weaknesses.
SPDX is a common language graph framework for data sharing. SPDX format is used to collect and categorize data for sharing and analysis.
The following image uses SPDX profiles (System Bill of Materials) to establish usable facts such as standards and licensing for compliance, processes for supply chains and operations for system identification.
A Software Bill of Materials (SBOM) is a comprehensive, structured inventory that lists all components, libraries, modules, and dependencies—both direct and indirect—that make up a software application. This "list of ingredients" includes open-source and third-party modules, their versions, licenses, and other relevant metadata.
The SysAuditor helps you answers questions such as:
Is this system (computer and software) the one I ordered? Does it have all the correct components?
What is installed? Do all the components adhere to your policies and is it operating as expected?
Can you create an amalgamated inventory of all the computers, software, connections and containers within your environment?
Can you document all components with a computer including hardware and software trees with relationships?
Can you save the information related to hardware, software, connections, AI, licences, so the information can be shared internally or externally?
How do you interlink records and enhance or enrich records with 3rd party data sets?
Can you analyze your data to identify vulnerabilities and threats?