3. Asset management

3.1 Responsibility for assets

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

3.2 Information classification

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

3.3 Media handling

3.1.1 Inventory and ownership of assets

Assets associated with information and information processing facilities should be identified and an inventory of these assets should be drawn up and maintained. Assets maintained in the inventory should be owned.
  • Identify assets relevant in the lifecycle of information and document their importance. The lifecycle of information should include creation, processing, storage, transmission, deletion and destruction.
  • Assign ownership and classification for each of the identified assets.
  • Conduct periodical inventories of assets to ensure that effective protection takes place.
  • Implement a process to ensure timely assignment of asset ownership. Ownership should be assigned when assets are created or when assets are transferred to the organization. The asset owner should be responsible for the proper management of an asset over the whole asset lifecycle.
  • The asset owner should:
    a) ensure that assets are inventoried;
    b) ensure that assets are appropriately classified and protected;
    c) define and periodically review access restrictions and classifications to important assets, taking into account applicable access control policies;
    d) ensure proper handling when the asset is deleted or destroyed.

See also CISControl 1 Inventory and Control of Enterprise Assets and CIS Control 2 Inventory and  Control of Software Assets .

3.1.2 Return of assets

All employees and external party users should return all of the organizational assets in their possession upon termination of their employment, contract or agreement.
  • Formalize the termination process to include the return of all previously issued physical and electronic assets owned by the organization.
  • In cases where an employee or external party user purchases the organization’s equipment or uses their own personal equipment, follow the procedure to ensure that all relevant information is transferred to the organization and securely erased from the equipment.
  • In cases where an employee or external party user has knowledge that is important to ongoing operations, that information should be documented and transferred to the organization.