Methods for cyber-physical security management for telecom CI - first

Summary
Inventory including compliance with standards, rigor, effectiveness and efficiency; Tabular Report and database