Asset Management
Asset Management
identify and classify our organization's assets
assets is adequately protected
implementing the appropriate controls
Asset Discovery
Asset Inventory
Asset Identification
Asset Classification
Asset labeling based on sensitivity and criticality
Asset Owners
Asset Roles
Asset Retention Policies
Data Classification
Information classification policy
Asset Discovery Strategy:
Asset Discovery:
Physical Devices
Desktops
Servers
Laptops
Mobile devices /IPAD/kiosks
OT/IOT
Printer
Virtual devices
Cloud assets
SaaS applications
Network appliances/Devices
Application servers
Discovery Methods:
PowerShell script to find Assets
Shell scripts
NMAP scripts
Network scanning and Continuous Monitoring with Nmap
Tenable Host Discovery and OS Discovery scans
Dark Trace
PaloAlto
MS ATP
Sentinel One
CMDB
Server and System admin list
List to collect
All windows servers managed by SCCM team
All Linux Servers managed by SCCM team
All windows desktops managed by SCCM team
All Linux desktops managed by SCCM team
Board approved software applications
All Network Equipment
Routers
Switches
WAF
Load Balancers
Wi-Fi Assess points
Network Security control applications and solutions
Domain Names
IP ranges
Virtual Instances
Data backups
Patch Management servers
Active Directory
Domain controllers
DNS servers
FTP servers
Application servers
Database servers
Network Attached Storage
DHCP
Asset Classification
Asset Inventory with asset owner's information
Asset Owners
Public
Private
Govt
Stakeholders
Tangible Assets
Intangible Assets
Data Owners
Critical assets
Critical Data handling
Based on standards, Procedures, Baselines, Guidelines
PCI
HIPPA
CJIS
Review asset labels
Asset marking
Asset categorization/grouping
Operating System
Geographical condition
Under specific compliance
Business unit
Geographic Location
Asset Protection
Roles
Data owners
Data controller
Data processor
Data subject
Data steward
Data in rest
Encryption
Access controls
Backup
Data in motion
End to end t
Link
Onion routing
Data in use
Data Archive
Data destruction
Destruction
Shred
drill
Data purging
degaussing
Data clearing
Formatting
Overwriting
Wiping
Asset Management
Physical Devices
Software Platforms
Organization Asset Communication and data flow map
Critical Asset Classification
Cyber security team roles
Separation of duties
*** Conduct Regular Review
References:
Last updated
Was this helpful?