3.2
IG1 IG2 IG3

Establish and Maintain a Data Inventory

Control Group: 3. Data Protection
Asset Type: Data
Security Function: Identify

Description

Establish and maintain a data inventory, based on the enterprise’s data management process. Inventory sensitive data, at a minimum. Review and update inventory annually, at a minimum, with a priority on sensitive data.

Implementation Checklist

1
Document current state and create baseline inventory
2
Define data fields and attributes to track
3
Assign ownership and responsibilities
4
Establish review cadence and update procedures
5
Select and deploy inventory management tool
6
Populate initial inventory with all known assets
7
Establish process for adding/removing inventory entries
8
Draft policy/procedure document
9
Obtain stakeholder review and approval
10
Communicate to affected personnel
11
Schedule periodic review and updates

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Unknown Data Exposure During Breach

Confidentiality

Without a data inventory, the organization cannot determine what sensitive data was exposed in a breach, leading to delayed notifications and underestimated impact assessments.

Orphaned Sensitive Data in Decommissioned Systems

Confidentiality

Sensitive data on systems being decommissioned or migrated is not properly handled because no inventory tracks where sensitive data resides.

Vulnerabilities (When Safeguard Absent)

No Inventory of Sensitive Data Locations

Without a data inventory, the organization does not know where sensitive data is stored, processed, or transmitted, making it impossible to apply appropriate protections.

Inability to Scope Data Protection Controls

Security controls like encryption, access restrictions, and monitoring cannot be properly targeted without knowing which assets contain sensitive data.

Evidence Requirements

Type Evidence Item Collection Frequency
Document Current inventory or catalog documentation Maintained continuously, reviewed quarterly
Document Process/procedure documentation for identification activities Reviewed annually
Technical Asset/software inventory export with required fields populated Exported quarterly for review
Record Inventory review meeting minutes or sign-off Per review cycle
Document Governing policy document (current, approved, communicated) Reviewed annually