To learn more about the fields and mapping of fields in the Information Security Risk Manager, please continue reading the tutorial here.