Enterprise Asset Management Policy

Control 1
Applicable Safeguards: 1.1 1.2 1.3 1.4 1.5

1. Purpose

Establish requirements for maintaining a comprehensive inventory of all enterprise assets and ensuring only authorized assets are connected to [ORGANIZATION]'s network infrastructure.

2. Scope

This policy applies to all hardware assets owned, managed, or used by [ORGANIZATION], including end-user devices, servers, network infrastructure, IoT devices, mobile devices, and cloud-hosted virtual machines, across all locations and environments.

3. Policy

3.1 Asset Inventory Requirements

3.1.1

[ORGANIZATION] shall maintain a detailed inventory of all enterprise assets with the potential to store or process data, updated no less frequently than [CUSTOMIZE: bi-annually/quarterly/monthly].

3.1.2

The asset inventory shall record, at minimum: asset tag or unique identifier, hardware address (MAC), network address (if static), hostname, asset owner, assigned department, asset type, operating system and version, physical or virtual location, and network authorization status.

3.1.3

All assets shall be classified as Authorized, Unauthorized, or Under Review within [CUSTOMIZE: 48 hours/1 week] of discovery.

3.1.4

The designated Asset Manager ([CUSTOMIZE: role/team]) shall be responsible for maintaining the accuracy and completeness of the asset inventory.

3.2 Asset Discovery

3.2.1

[ORGANIZATION] shall utilize automated active discovery tools to scan the network for connected assets no less frequently than [CUSTOMIZE: daily/weekly].

3.2.2

DHCP server logs shall be collected and used to identify and update the enterprise asset inventory no less frequently than weekly.

3.2.3

For IG3 environments: Passive asset discovery tools shall be deployed to continuously identify assets connected to the network, with results reviewed at least weekly.

3.2.4

Asset discovery tools shall cover all network segments, including DMZ, internal, guest, and cloud-connected networks.

3.3 Unauthorized Asset Response

3.3.1

A documented process shall exist to address unauthorized assets discovered on the network, with review occurring no less frequently than weekly.

3.3.2

Unauthorized assets shall be handled through one of the following actions within [CUSTOMIZE: 24/48/72] hours of identification: removal from the network, quarantine to an isolated network segment, blocking of remote connectivity, or authorization with documented approval.

3.3.3

All unauthorized asset incidents shall be logged and reported to [CUSTOMIZE: IT Security/CISO] for tracking and trend analysis.

3.4 Asset Lifecycle Management

3.4.1

All new assets shall be registered in the inventory prior to or within [CUSTOMIZE: 24/48] hours of deployment on the network.

3.4.2

Assets being decommissioned shall follow [ORGANIZATION]'s data sanitization and disposal procedures before being removed from the inventory.

3.4.3

Asset inventory reviews shall be conducted [CUSTOMIZE: quarterly/bi-annually] to verify accuracy and remove stale entries.

4. Compliance

4.1

Compliance with this policy is mandatory for all personnel within its scope. Compliance will be monitored through periodic audits, automated controls, and management review.

4.2

Exceptions to this policy must be documented with a business justification, approved by [CUSTOMIZE: CISO/Security Team], and reviewed at least annually.

5. Enforcement

5.1

Violations of this policy may result in disciplinary action up to and including termination of employment or contract, and may result in civil or criminal penalties where applicable law has been violated.

5.2

[ORGANIZATION] reserves the right to audit compliance with this policy at any time, with or without notice.

6. Review and Revision

6.1

This policy shall be reviewed at least annually by [CUSTOMIZE: CISO/Policy Owner] and updated as necessary to reflect changes in the threat landscape, regulatory requirements, or organizational structure.

6.2

All revisions shall be documented with version number, date, author, and description of changes.

Policy Approval

Approved By

[CUSTOMIZE]

Title

[CUSTOMIZE]

Date

[CUSTOMIZE]

Document Control

Version: [CUSTOMIZE: 1.0]
Effective Date: [CUSTOMIZE]
Last Reviewed: [CUSTOMIZE]
Next Review: [CUSTOMIZE]
Classification: Internal