Inventory and Control of Enterprise Assets
Actively manage (inventory, track, and correct) all enterprise assets (end-user devices, including portable and mobile; network devices; non-computing/Internet of Things (IoT) devices; and servers) connected to the infrastructure, physically, virtually, remotely, and those within cloud environments, to accurately know the totality of assets that need to be monitored and protected within the enterprise. This will also support identifying unauthorized and unmanaged assets to remove or remediate.
Why Is This Control Critical?
Enterprises cannot defend what they do not know they have. Managed control of all enterprise assets also plays a critical role in security monitoring, incident response, system backup, and recovery. Enterprises should know what data is critical to them, and proper asset management will help identify those enterprise assets that hold or manage this critical data, so appropriate security controls can be applied.
Related Policy Templates
Safeguards (5)
| ID | Title | Asset Type | Function | Implementation Groups |
|---|---|---|---|---|
| 1.1 | Establish and Maintain Detailed Enterprise Asset Inventory | Devices | Identify |
IG1
IG2
IG3
|
| 1.2 | Address Unauthorized Assets | Devices | Respond |
IG1
IG2
IG3
|
| 1.3 | Utilize an Active Discovery Tool | Devices | Detect |
IG2
IG3
|
| 1.4 | Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory | Devices | Identify |
IG2
IG3
|
| 1.5 | Use a Passive Asset Discovery Tool | Devices | Detect |
IG3
|