Asset V2 Lexicon#

On this page you will find the detailed definitions for the terms commonly used throughout the V2 Asset Service.


A specific resource that Mnemonic’s is aware of. It may additionally be monitored and protected by Mnemonic on behalf of its owning customer. This can be anything from a piece of hardware, software, or data that holds value for the customer.

Asset Definition#

The rule-set or criteria that outlines what components an Asset of a particular type may contain. This can be used to categorize or specify Assets based on their elements or parts.

Component Definition#

The specifications or guidelines that dictate what type of data a component of a given type may contain. This is used to ensure consistency and compatibility across different components within an Asset.

Asset Component#

A distinct piece of information or a specific part that contributes to the entirety of an Asset. This can be a module in a software, a part in a machine, or a subset of data within a larger dataset.

Asset Group#

A designated collection of Assets or other Groups that are grouped together due to shared characteristics, commonalities or purpose. This grouping may not necessarily be based on the type or nature of the Asset.

Vulnerability Source#

The original data source that provides the foundation for Vulnerability Definitions. It can be a database, a report, a threat intelligence feed, or any other source that provides information about potential vulnerabilities.

Vulnerability Definition#

The globally shared data, including potential resolutions, for observed vulnerabilities of a specific type. This definition helps in understanding, managing, and resolving vulnerabilities in a standardized manner.


An observed instance of a Vulnerability (Definition) that has been detected on a specific Asset. It represents a weakness or a flaw that can potentially be exploited to compromise the Asset.

Vulnerability Component#

A specific piece of information about an observed Vulnerability. This could be details about its source, its potential impact, its severity, or any other information that contributes to understanding and addressing the vulnerability.