CDP Data Schemas
  • 25 Oct 2024
  • 1 Minute to read
  • Contributors
  • Dark
    Light

CDP Data Schemas

  • Dark
    Light

Article summary

Table NameDescription
Cyber VulnerabilitiesThe CyberVulnerability object describes the nature and severity of vulnerabilities, risk management, and mitigation strategies.
DeviceThe Device object represents an addressable computer system or host, which is typically connected to a computer network and participates in the transmission or processing of data within the computer network.
Device OwnersThe DeviceOwners object represents a one-to-many mapping from the device to its owners.
Organization HierarchyThe OrganizationHierarchy object represents the organization hierarchy of the employee and its supervisors.
Software ApplicationThe SoftwareApplication object represents the comprehensive overview of software applications within an organization or environment.
Software Application Devices
The SoftwareApplicationDevices object represents the one-to-many mapping from SoftwareApplication to its devices.
Software Application Owners
The SoftwareApplicationOwners objects represent the one-to-many mapping from SoftwareApplication to its owners.
UserThe User object represents the characteristics of a user/person or a security principal.

Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence