2.1
IG1 IG2 IG3

Establish and Maintain a Software Inventory

Asset Type: Applications
Security Function: Identify

Description

Establish and maintain a detailed inventory of all licensed software installed on enterprise assets. The software inventory must document the title, publisher, initial install/use date, and business purpose for each entry; where appropriate, include the Uniform Resource Locator (URL), app store(s), version(s), deployment mechanism, and decommission date. Review and update the software inventory bi-annually, or more frequently.

Implementation Checklist

1
Document current state and create baseline inventory
2
Define data fields and attributes to track
3
Assign ownership and responsibilities
4
Establish review cadence and update procedures
5
Select and deploy inventory management tool
6
Populate initial inventory with all known assets
7
Establish process for adding/removing inventory entries

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Supply Chain Compromise via Untracked Software

Integrity

Malicious or backdoored software installed without inventory tracking evades security review, enabling supply chain attacks like those seen in SolarWinds-type compromises.

License Compliance Exploitation

Confidentiality

Unlicensed or pirated software installed outside inventory controls introduces trojanized versions or cracks that contain embedded malware and credential stealers.

Abandoned Software as Attack Surface

Integrity

Applications installed for past projects but never inventoried remain on systems with known vulnerabilities, providing easy exploitation targets for attackers.

Vulnerabilities (When Safeguard Absent)

No Centralized Software Inventory

Without a maintained software inventory, the organization cannot determine what applications are installed across endpoints, leaving unknown software unpatched and unmonitored.

Inability to Verify Software Legitimacy

Without records of publisher, version, and business purpose, the organization cannot distinguish authorized software from unauthorized or malicious installations.

Evidence Requirements

Type Evidence Item Collection Frequency
Document Current inventory or catalog documentation Maintained continuously, reviewed quarterly
Document Process/procedure documentation for identification activities Reviewed annually
Technical Asset/software inventory export with required fields populated Exported quarterly for review
Record Inventory review meeting minutes or sign-off Per review cycle
Document Governing policy document (current, approved, communicated) Reviewed annually