Module 3: Risk & Planning

Asset Inventory Quest

Action Item
30 min
+100 XP

Asset Identification and Valuation

Asset identification is the critical first step in ISO 27001 risk assessment. You cannot protect what you don't know you have. This lesson teaches you how to systematically identify, classify, and value your organization's information assets.

What is an Information Asset?

An information asset is anything that has value to your organization and requires protection. ISO 27001 focuses on information assets, but remember that information can exist in many forms:

  • Digital: Databases, files, emails, cloud storage
  • Physical: Paper documents, backup tapes, printed reports
  • Knowledge: Employee expertise, procedures, trade secrets
  • Supporting Assets: Hardware, software, networks, facilities that store or process information

Asset vs. Supporting Asset

Primary Information Assets:

  • Customer database
  • Product designs
  • Financial records
  • Strategic business plans
  • Source code

Supporting Assets (enable or protect primary assets):

  • Database server (hardware)
  • Database management system (software)
  • Network infrastructure
  • Data center facility
  • IT staff

Both types must be identified, but primary information assets drive your risk assessment priorities.

Why Asset Identification Matters

For ISO 27001 Compliance

Clause 6.1.2(c) requires you to identify:

  • Information security risks by applying the risk assessment process
  • Assets and asset owners
  • Threats to those assets
  • Vulnerabilities
  • Impacts

Without a comprehensive asset inventory, your risk assessment will be incomplete, and you'll fail the audit.

For Effective Security

You can't protect assets you don't know about (shadow IT problem):

  • Unauthorized cloud services
  • Forgotten databases
  • Undocumented systems
  • Personal devices accessing corporate data
  • Legacy systems no one remembers

For Incident Response

When a security incident occurs, you need to quickly answer:

  • What assets are affected?
  • Who owns them?
  • How critical are they?
  • What's the business impact?
  • Who needs to be notified?

A current asset inventory enables rapid response.

For Cost Justification

Asset valuation helps you:

  • Justify security investments
  • Allocate budget appropriately
  • Prioritize protection efforts
  • Demonstrate ROI on security controls

Types of Information Assets

1. Data and Information

Categories:

Customer/Client Data:

  • Customer names, contact details
  • Financial information, payment card data
  • Purchase history, preferences
  • Personal identifiable information (PII)
  • Health information (if applicable)
  • Authentication credentials

Employee Data:

  • Personnel records, HR files
  • Salary and benefits information
  • Performance reviews
  • Medical records
  • Background check results
  • Access credentials

Financial Data:

  • Accounting records, general ledger
  • Bank account information
  • Tax records, financial statements
  • Invoices, purchase orders
  • Budgets and forecasts
  • Audit reports

Intellectual Property:

  • Patents, trademarks, copyrights
  • Product designs and specifications
  • Research and development data
  • Source code and algorithms
  • Trade secrets and formulas
  • Marketing strategies

Operational Data:

  • Business processes and procedures
  • Contracts and agreements
  • Supply chain information
  • Inventory data
  • Quality control records
  • Compliance documentation

Strategic Information:

  • Business plans and strategies
  • Merger and acquisition plans
  • Market research
  • Competitive intelligence
  • Board meeting minutes

2. Software Assets

Business Applications:

  • Customer Relationship Management (CRM) systems
  • Enterprise Resource Planning (ERP) systems
  • Financial management software
  • Human resources systems
  • Project management tools
  • Custom developed applications

Infrastructure Software:

  • Operating systems (Windows, Linux, etc.)
  • Database management systems
  • Virtualization platforms
  • Backup and recovery software
  • Security software (antivirus, firewall)
  • Monitoring and management tools

Development Tools:

  • Integrated Development Environments (IDEs)
  • Version control systems
  • Testing and QA tools
  • Compilers and interpreters

Productivity Software:

  • Office suites (Microsoft 365, Google Workspace)
  • Email and calendar systems
  • Collaboration platforms
  • Communication tools

3. Hardware Assets

Servers and Infrastructure:

  • Physical servers (file, database, application, web)
  • Virtual machines
  • Network equipment (routers, switches, firewalls)
  • Storage systems (SAN, NAS)
  • Backup systems

End-User Devices:

  • Desktop computers
  • Laptops and notebooks
  • Mobile devices (smartphones, tablets)
  • Printers and multifunction devices
  • Removable media (USB drives, external drives)

Specialized Equipment:

  • Point-of-sale terminals
  • Industrial control systems
  • Medical devices
  • IoT devices
  • Security cameras and access control systems

4. Network and Communication Assets

Network Infrastructure:

  • Local Area Networks (LANs)
  • Wide Area Networks (WANs)
  • Wireless networks (Wi-Fi)
  • Virtual Private Networks (VPNs)
  • Internet connections

Communication Systems:

  • Email systems
  • Voice over IP (VoIP) phone systems
  • Video conferencing systems
  • Instant messaging platforms
  • Collaboration tools

5. Physical Assets and Facilities

Facilities:

  • Data centers
  • Server rooms
  • Office buildings
  • Storage areas
  • Backup sites

Physical Media:

  • Paper documents and files
  • Backup tapes
  • Optical media (CDs, DVDs)
  • Archived records

Environmental Controls:

  • HVAC systems
  • Power supply and UPS
  • Fire suppression systems
  • Physical security systems

6. Services

Internal Services:

  • IT support and help desk
  • Network management
  • Application support
  • Security operations
  • Backup and recovery

External Services:

  • Cloud services (IaaS, PaaS, SaaS)
  • Managed security services
  • Internet service providers
  • Telecommunications providers
  • Outsourced IT support
  • Payment processors

7. People (Human Assets)

Key Personnel:

  • IT administrators with privileged access
  • Database administrators
  • Security team members
  • Developers with source code access
  • Executive management with strategic knowledge
  • Subject matter experts

Intangible Human Assets:

  • Knowledge and expertise
  • Relationships and networks
  • Skills and competencies
  • Institutional memory

Asset Identification Process

Step 1: Define Scope and Boundaries

Questions to Answer:

  • What's included in your ISMS scope?
  • Which business units are included?
  • Which locations are covered?
  • What about third-party services?
  • Are personal devices (BYOD) included?

Document:

  • Geographic scope (all offices, specific locations)
  • Organizational scope (entire company, specific departments)
  • Technical scope (on-premises, cloud, hybrid)
  • Asset types to be included

Step 2: Gather Existing Documentation

Review:

  • IT asset management (ITAM) databases
  • Configuration management databases (CMDBs)
  • Network diagrams and documentation
  • Software licensing records
  • Hardware inventory systems
  • Vendor contracts and agreements
  • Data flow diagrams
  • System documentation

Don't Start from Scratch: Most organizations already have partial asset inventories in various systems.

Step 3: Conduct Asset Discovery

Automated Discovery:

  • Network scanning tools
  • Asset discovery software
  • Cloud inventory tools
  • Mobile device management (MDM) systems
  • Software asset management (SAM) tools

Manual Discovery:

  • Walk-throughs of facilities
  • Interviews with department heads
  • Review of file shares and storage
  • Application portfolio reviews
  • Review of user accounts and access rights

Step 4: Interview Stakeholders

Who to Interview:

IT Department:

  • What systems do you manage?
  • What data do these systems contain?
  • Where are backups stored?
  • What cloud services are used?

Business Units:

  • What information is critical to your work?
  • What systems do you depend on daily?
  • What would impact your ability to serve customers?
  • Are you using any shadow IT or personal tools?

Finance:

  • What financial systems are in use?
  • What payment data is processed?
  • What are the regulatory requirements?

HR:

  • What employee data is collected?
  • Where is it stored?
  • How long is it retained?

Legal/Compliance:

  • What contracts contain data handling requirements?
  • What regulatory obligations exist?
  • What intellectual property needs protection?

Step 5: Identify Shadow IT

Shadow IT refers to IT systems, solutions, or services used without explicit IT approval.

Common Sources:

  • Cloud storage (Dropbox, Google Drive, OneDrive)
  • Collaboration tools (Slack, Trello, Asana)
  • Development tools (GitHub, GitLab)
  • CRM systems (personal accounts)
  • File sharing services
  • Project management tools

Discovery Methods:

  • Review cloud access security broker (CASB) logs
  • Analyze firewall and proxy logs
  • Check expense reports for SaaS subscriptions
  • Survey employees
  • Review browser history and bookmarks
  • Monitor DNS queries

Step 6: Map Dependencies and Relationships

Understand:

  • Which assets depend on others?
  • What's the data flow between assets?
  • What assets support critical business processes?
  • Single points of failure

Create Visual Maps:

  • Data flow diagrams
  • System dependency maps
  • Network topology diagrams
  • Process flow charts

Asset Classification

Once identified, classify assets to enable appropriate protection:

Classification by Information Type

Categories:

Public:

  • Already publicly available
  • No harm if disclosed
  • Examples: Marketing materials, published reports, public website content

Internal:

  • For internal use only
  • Minor harm if disclosed
  • Examples: Internal policies, organizational charts, general business communications

Confidential:

  • Sensitive business information
  • Significant harm if disclosed
  • Examples: Business plans, customer lists, employee data, financial records

Restricted/Secret:

  • Highly sensitive information
  • Severe harm if disclosed
  • Examples: Trade secrets, strategic plans, sensitive customer data, intellectual property

Classification by Criticality

Mission Critical:

  • Essential for business operations
  • Cannot operate without them
  • Examples: Order processing system, manufacturing control systems

Business Critical:

  • Important for operations
  • Significant impact if unavailable
  • Workarounds possible but difficult
  • Examples: Email system, intranet, collaboration tools

Important:

  • Supports business operations
  • Moderate impact if unavailable
  • Reasonable workarounds available
  • Examples: Project management tools, reporting systems

Non-Critical:

  • Minor impact if unavailable
  • Easy to work without temporarily
  • Examples: Training systems, some internal tools

Classification by Data Subject

Personal Data (GDPR/Privacy Laws):

  • Personally identifiable information (PII)
  • Special category data (health, biometric, etc.)
  • Customer data
  • Employee data

Corporate Data:

  • Owned by organization
  • Business information
  • Operational data

Third-Party Data:

  • Received from partners or vendors
  • Subject to contractual obligations
  • May have specific handling requirements

Asset Valuation

Asset valuation determines how much an asset is worth to your organization. This drives risk assessment and security investment decisions.

Valuation Methods

Method 1: Replacement Cost

What it is: Cost to replace the asset if lost or destroyed

Best for: Hardware, software, physical assets

Calculation:

  • Purchase price of new equivalent
  • Installation and configuration costs
  • Migration costs
  • Training costs

Example:

  • Database server hardware: $15,000
  • Operating system and licenses: $2,000
  • Database software licenses: $50,000
  • Installation and configuration: $5,000
  • Total Replacement Cost: $72,000

Limitations:

  • Doesn't account for data value
  • Ignores business impact
  • May undervalue unique assets

Method 2: Revenue Impact

What it is: Lost revenue if asset unavailable

Best for: Revenue-generating systems, customer-facing assets

Calculation:

  • Revenue per hour/day/week
  • Multiply by downtime duration
  • Add lost opportunity costs

Example:

  • E-commerce website
  • Average revenue: $50,000 per day
  • Downtime: 3 days
  • Lost sales during outage: $150,000
  • Customer churn: $25,000
  • Revenue Impact: $175,000

Method 3: Business Impact

What it is: Overall business consequences if asset compromised

Consider:

Financial Impact:

  • Direct costs (recovery, notification, forensics)
  • Lost revenue
  • Regulatory fines
  • Legal costs
  • Increased insurance premiums

Operational Impact:

  • Business disruption
  • Productivity loss
  • Extended work hours
  • Process workarounds
  • Delayed projects

Reputational Impact:

  • Loss of customer trust
  • Media coverage
  • Brand damage
  • Competitive disadvantage
  • Difficulty recruiting

Legal and Regulatory Impact:

  • Fines and penalties
  • Contractual breaches
  • Litigation costs
  • License suspension or revocation
  • Regulatory sanctions

Example:

  • Customer database breach
  • Notification costs: $50,000
  • Regulatory fine: $500,000
  • Legal costs: $200,000
  • Lost customers: $1,000,000
  • Reputational damage: $2,000,000
  • Total Business Impact: $3,750,000

Method 4: Qualitative Valuation

What it is: Descriptive value ratings

Scale:

  • Very High: Mission critical, irreplaceable, severe impact if lost
  • High: Critical to operations, significant impact if lost
  • Medium: Important but replaceable, moderate impact if lost
  • Low: Minor importance, minimal impact if lost

Best for:

  • Quick assessments
  • When precise values are unknown
  • Strategic-level discussions
  • Mixed asset types

Example Asset Valuation:

AssetReplacement CostRevenue ImpactBusiness ImpactQualitative Value
Customer Database$100,000$500,000/weekVery HighVery High
Employee Laptops$1,200 each$500/day per deviceMediumMedium
Public Website$25,000$50,000/dayHighHigh
Office Printer$500NoneLowLow

CIA Valuation

Rate each asset for Confidentiality, Integrity, and Availability:

Confidentiality: How sensitive is the information?

  • High: Severe harm if disclosed (trade secrets, personal data)
  • Medium: Moderate harm if disclosed (internal docs)
  • Low: Minimal harm if disclosed (public information)

Integrity: How critical is accuracy?

  • High: Severe consequences if modified (financial records, medical data)
  • Medium: Moderate consequences if modified (reports, databases)
  • Low: Minimal consequences if modified (draft documents)

Availability: How critical is accessibility?

  • High: Severe impact if unavailable (production systems, critical services)
  • Medium: Moderate impact if unavailable (email, collaboration tools)
  • Low: Minimal impact if unavailable (archived records)

Example CIA Rating:

AssetConfidentialityIntegrityAvailabilityOverall Value
Customer Payment DataVery HighVery HighHighVery High
Product Pricing DatabaseHighVery HighHighHigh
Employee Phone DirectoryLowMediumLowLow
Backup SystemHighHighVery HighVery High

Asset Ownership

Every asset must have a designated owner who is accountable for its protection.

Asset Owner Responsibilities

Asset owners should:

  • Determine appropriate classification
  • Approve access to the asset
  • Ensure adequate protection
  • Report security incidents
  • Participate in risk assessment
  • Approve risk treatment decisions
  • Ensure compliance with policies

Asset owners are NOT:

  • Always the IT department
  • The same as custodians (who manage day-to-day)
  • Responsible for technical implementation (that's IT's job)

Identifying Owners

Rules:

  • Owner should have business accountability
  • Should understand business value and impact
  • Should have authority to make decisions
  • One primary owner per asset (may have delegates)

Examples:

  • Customer database → Sales Director or CRM Manager
  • Financial systems → Chief Financial Officer or Controller
  • HR records → HR Director
  • Product source code → CTO or Development Manager
  • Website → Marketing Director or Digital Manager

Asset Custodians

Custodian = Person or team responsible for day-to-day management

Responsibilities:

  • Implement owner's decisions
  • Manage technical controls
  • Perform backups
  • Monitor access
  • Apply patches and updates
  • Handle operational tasks

Example:

  • Asset: Customer database
  • Owner: Sales Director (business accountability)
  • Custodian: Database Administrator (technical management)

Asset Inventory Template

Create a comprehensive asset inventory using this structure:

Essential Fields

FieldDescriptionExample
Asset IDUnique identifierAST-001, DB-CRM-001
Asset NameDescriptive nameCustomer Relationship Database
Asset TypeCategoryData, Hardware, Software, Service
DescriptionWhat it is and doesPrimary database containing all customer information
OwnerBusiness ownerSales Director
CustodianTechnical managerDatabase Administrator
LocationPhysical/logical locationAWS us-east-1, Building A Server Room
ClassificationSensitivity levelConfidential
CriticalityBusiness criticalityMission Critical
CIA RatingConfidentiality/Integrity/AvailabilityHigh/Very High/High
ValueMonetary or qualitative value$500,000 / Very High
DependenciesRelated assetsWeb application, backup system, network
UsersWho has accessSales team, customer service (200 users)
Vendor/SupplierProvider if externalOracle, AWS
Regulatory RequirementsApplicable lawsGDPR, PCI DSS
Last Review DateWhen last assessed2024-09-15

Sample Asset Register

Asset ID: AST-001 Asset Name: Customer Database Asset Type: Data / Software Description: PostgreSQL database containing customer records, orders, and payment history Owner: Sales Director (Jane Smith) Custodian: Database Admin (John Doe) Location: AWS RDS us-east-1 Classification: Confidential Criticality: Mission Critical CIA Rating: C=High, I=Very High, A=High Value: $750,000 (business impact) Dependencies: Web application, backup system, VPN access Users: Sales (50), Customer Service (30), Finance (10) Vendors: Amazon Web Services, PostgreSQL Regulatory: GDPR, CCPA, industry data protection Last Review: 2024-10-01


Asset ID: AST-002 Asset Name: Email System Asset Type: Service Description: Microsoft 365 cloud email and collaboration platform Owner: IT Director (Mike Johnson) Custodian: IT Support Team Location: Microsoft Cloud (Europe) Classification: Internal (emails range from Public to Confidential) Criticality: Business Critical CIA Rating: C=Medium, I=Medium, A=High Value: $100,000/day revenue impact if down Dependencies: Internet connection, Azure AD, MFA system Users: All employees (500) Vendors: Microsoft Regulatory: GDPR (email retention) Last Review: 2024-09-20

Common Asset Identification Mistakes

Mistake 1: Only Identifying IT Assets

Problem: Focusing solely on servers, networks, and software while ignoring:

  • Paper records
  • Physical media
  • People and knowledge
  • Third-party services
  • Mobile devices

Solution: Use a comprehensive asset categorization framework that includes all asset types.

Mistake 2: Too Granular or Too High-Level

Too Granular:

  • Listing every individual file
  • Every single laptop
  • Each network cable

Too High-Level:

  • "All customer data"
  • "IT infrastructure"
  • "Office equipment"

Solution: Group similar assets logically. List 100 laptops as "employee laptops" with quantity, but list critical servers individually.

Mistake 3: Forgetting Shadow IT

Problem: Only documenting officially sanctioned IT

Solution:

  • Actively discover unauthorized services
  • Survey employees
  • Monitor network traffic
  • Review expense reports

Mistake 4: No Regular Updates

Problem: Asset inventory completed once and never updated

Solution:

  • Schedule quarterly reviews
  • Update with every new system or service
  • Integrate with change management
  • Decommission removed assets

Mistake 5: Wrong Asset Owners

Problem: IT owns all assets in the register

Solution: Assets should be owned by business stakeholders who understand their value and use.

Mistake 6: Inconsistent Valuation

Problem: Different methods used for similar assets, making comparison impossible

Solution:

  • Define a standard valuation approach
  • Document methodology
  • Train assessors
  • Review for consistency

Integration with Risk Assessment

Asset identification feeds directly into risk assessment:

Risk Assessment Needs:

  • Assets (this lesson) - What needs protection?
  • Threats (next lesson) - What could harm assets?
  • Vulnerabilities (upcoming) - What weaknesses exist?
  • Controls (upcoming) - What protection is in place?

Risk Formula: Risk = Asset Value × Threat × Vulnerability

Without accurate asset identification and valuation, you cannot:

  • Assess risk correctly
  • Prioritize risk treatment
  • Justify security investments
  • Allocate resources effectively

Practical Exercise: Build Your Asset Inventory

Step 1: Start Small (30 minutes)

  • List your top 10 most critical information assets
  • Include at least one from each category: data, software, hardware, service

Step 2: Document Each Asset (1 hour)

  • Use the asset inventory template
  • Assign owners
  • Classify by sensitivity
  • Rate CIA values

Step 3: Conduct Interviews (2 hours)

  • Talk to 3 department heads
  • Ask: "What information/systems are critical to your work?"
  • Document their assets
  • Identify any shadow IT

Step 4: Value Your Assets (1 hour)

  • Choose a valuation method
  • Calculate or estimate values for top 10 assets
  • Document your methodology

Step 5: Review and Validate (30 minutes)

  • Review with asset owners
  • Correct any errors
  • Get owner approval
  • Schedule next review

Tools for Asset Management

Spreadsheets (Small Organizations):

  • Excel or Google Sheets
  • Easy to start
  • Version control challenges
  • Limited scalability

Dedicated Asset Management Tools:

  • ServiceNow CMDB
  • Jira Service Management
  • Lansweeper
  • Asset Panda
  • Snipe-IT (open source)

GRC Platforms (Integrated):

  • RSA Archer
  • ServiceNow GRC
  • MetricStream
  • LogicManager
  • Compliance.ai

Discovery Tools:

  • Nmap (network scanning)
  • Qualys Asset Inventory
  • Tenable.io
  • Microsoft Defender for Endpoint
  • Rapid7 InsightVM

Maintaining Your Asset Inventory

Scheduled Reviews

Quarterly:

  • Review high-value and critical assets
  • Update asset values if business changes
  • Verify asset owners are still correct
  • Check for decommissioned assets

Annually:

  • Complete inventory review
  • Reassess all classifications
  • Update documentation
  • Validate with stakeholders

Trigger-Based Updates

Update your asset inventory when:

  • New systems implemented
  • Major changes to existing systems
  • Business acquisitions or divestitures
  • Organizational restructuring
  • Significant security incidents
  • New regulatory requirements
  • Technology refreshes
  • Cloud migrations

Integration with Change Management

Every change should trigger asset review:

  • New asset added?
  • Existing asset modified?
  • Asset retired?
  • Owner changed?
  • Location changed?

Link your asset management process with IT change management.

Conclusion

Asset identification and valuation is foundational work that enables everything else in your ISMS:

You've learned:

  • What constitutes an information asset
  • How to systematically identify all asset types
  • How to classify assets by sensitivity and criticality
  • How to value assets using multiple methods
  • How to assign ownership and responsibility
  • How to create and maintain an asset inventory

Remember:

  • You can't protect what you don't know you have
  • Asset value drives risk assessment priorities
  • Asset owners make risk decisions, not just IT
  • Asset inventories must be living documents

Next Steps:

  1. Start your asset inventory this week
  2. Identify owners for critical assets
  3. Document your valuation methodology
  4. Schedule regular review cycles
  5. Integrate with change management

Next Lesson: Threat Hunting for ISO 27001 Risk Assessment - Now that you know WHAT you have, we'll identify WHAT could harm it.

Complete this lesson

Earn +100 XP and progress to the next lesson