ISO/IEC 27002:2022 | 5.9 - Inventory of Information and Other Associated Assets
Per ISO/IEC 27002:20222 | 5.9 - Information Security in Project Management, “The organization should identify its information and other associated assets and determine their importance in terms of information security. Documentation should be maintained in dedicated or existing inventories as appropriate.”
An asset inventory, also known as a fixed asset inventory or asset register, is a detailed record or listing of all the tangible and intangible assets owned by an individual, organization, or entity. It provides a comprehensive overview of the assets, including their physical and financial characteristics, location, condition, and other relevant details.
An asset inventory typically includes the following:
- Tangible assets: These are physical items that can be touched or seen, including buildings, land, vehicles, machinery, equipment, furniture, and computer hardware.
- Intangible assets: These are non-physical assets that lack a physical presence but hold value, such as intellectual property (patents, copyrights, trademarks), licenses, software, domain names, brand names, and goodwill.
Additionally, for the inventory of assets, they are to include the use of, but not limited to, the following unique identifiers:
- Asset Name
- Hostname
- Asset Description
- Asset Element (Physical or Electronic)
- Asset Function
- Does Asset Contain or consist of any type of PII?
- Data Retention Period
- Serial Number or other type of unique identifier
- IP | Routing | Network Address Information
- physical Location
- Logical Location
- Asset Owner
- Asset Users
- Audit Trails and Logging Enabled
- File Integrity Monitoring Enabled
- Anti-malware software in use
- Assigned FIPS 140 Security Categorization
- Any other relevant information
What organizations need to have in place is a well-defined policy, and a supporting asset inventory spreadsheet, for ISO/IEC 27002:20222 | 5.9 - Inventory of Information and Other Associated Assets, which is available for download, along with more than 100 + ISMS policies, procedures, programs, and plans - all from MorganHill.
Download ISMS 27002:2022 Policy Templates Today - Over 100 + Documents Available
We offer world-class, industry leading security documentation for helping organizations develop all required Information Security Management System (ISMS) policies, procedures, programs, and plans in accordance with ISO/IEC 27001 & 27002:2022.
WORLD CLASS ISMS SECURITY DOCUMENTS
More Posts
Talk to MorganHill today and Get the Answers You Need
Scope: We'll help you define important scoping parameters.
Documentation: We'll help you develop all required policies and procedures.
Guidance: We'll guide you through the ISO/IEC process from start to finish.
One Price: Our fees for all services are fixed.
Wherever you are in North America, Europe, Africa, or Asia, MorganHill is ready to assist.
Expertise: Since 2006, we have been an industry leader for ISO/IEC.
Knowledge: We've worked with every ISO/IEC standard currently in print.
Industry: We've worked in every major industry/sector.
Health Technology Case Study
Four months after completing all necessary pre-certification work, the organization obtained ISO/IEC 27001 certification from an accredited ISO ANAB body that we recommend to them.
Cybersecurity Case Study
Obtained ISO 27001 certification from an accredited ISO ANAB body that I recommend to them.
Manufacturing Case Study
Four months after completing all necessary pre-certification work, the organization obtained ISO 27001 certification from an accredited ISO ANAB body that we recommend to them.
Healthcare Case Study
Three months after completing all necessary pre-certification work, the organization obtained ISO/IEC 27001 certification from an accredited ISO ANAB body that we recommend to them.