You can't patch what you don't know you have. Hardware visibility comes from your tech stack inventory.
Authenticated scanning across the assets in F1.
Continuous discovery of internet-facing assets — including ones IT may have lost track of.
Internal or external network pen test by a qualified third party.
Good = Critical 24–72h, High 7d, Medium 30d. Aggressive SLA on internet-facing devices (firewalls, VPN gateways) is its own bar.
Which classes have automated patching in place today.
Good = maintained register, board-reviewed annually, mapped to mitigation owners.
Whether the district tracks measurable cyber risk indicators over time (open vulns by severity, patch SLA compliance, MFA coverage trend, training completion, phish click rate).
Covers SaaS vendors (PowerSchool pattern), MSPs, and OT vendors with persistent district access (cross-references Endpoint F13).