1

Inventory and Control of Enterprise Assets

Actively manage (inventory, track, and correct) all enterprise assets (end-user devices, including portable and mobile; network devices; non-computing/Internet of Things (IoT) devices; and servers) connected to the infrastructure, physically, virtually, remotely, and those within cloud environments, to accurately know the totality of assets that need to be monitored and protected within the enterprise. This will also support identifying unauthorized and unmanaged assets to remove or remediate.

Why Is This Control Critical?

Enterprises cannot defend what they do not know they have. Managed control of all enterprise assets also plays a critical role in security monitoring, incident response, system backup, and recovery. Enterprises should know what data is critical to them, and proper asset management will help identify those enterprise assets that hold or manage this critical data, so appropriate security controls can be applied.

Related Policy Templates

Safeguards (5)

ID Title Asset Type Function Implementation Groups
1.1 Establish and Maintain Detailed Enterprise Asset Inventory Devices Identify
IG1 IG2 IG3
1.2 Address Unauthorized Assets Devices Respond
IG1 IG2 IG3
1.3 Utilize an Active Discovery Tool Devices Detect
IG2 IG3
1.4 Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory Devices Identify
IG2 IG3
1.5 Use a Passive Asset Discovery Tool Devices Detect
IG3