In our organization we wanted to review the overall IT landscape and check the most critical applications for vulnerability in phase 1, and then look at lesser critical applications in phase 2... as we embarked on exercise, we realized that certain non-critical applications might be the entry point for critical applications. (so what seemed like a low-impact app built with very little focus; might be entry to critical appln)
Is there an approach we can take, by which we can look at severity of applications through this indirect mode also. Any direction/pointers will be appreciated