Document Control
Reference: ISMS-C DOC
INVENTORY AND OWNERSHIP OF 8.1.1
ASSETS (TIER 2) Issue No:
Issue Date:
Page: 1 of 2
This is a toolkit trial version only -
Buy the full ISMS ISO 27001: 2013 Documentation Toolkit
here
1 Scope1
All of Organisation Name’s information assets are inventoried, in line with this
procedure.
2 Responsibilities
2.1 The Finance Director (CFO) is responsible for implementing and maintaining the
asset inventory.
2.2 All asset [owners] (as defined below) are responsible for providing the information
required under this procedure and for ensuring that it is maintained and kept up to
date.
3 Procedure [ISO27002 Clause 8.1.1]
3.1 Organisation Name maintains a [single] inventory of information assets, which is Commented [A1]: You need to decide how you link and
subdivided into a hardware inventory [], a software log [], an information asset reconcile this to your financial fixed asset register, and include that
detail here in this clause
database [], and a schedule of intangible assets []. In addition, Organisation Name
maintains a schedule of key information-related services [] and management is
aware of those individuals whose skills, knowledge and experience are considered
essential.
3.2 [This inventory is the asset inventory that is used in the risk assessment process Commented [A2]: If you are using an asset-based risk assessment
(see [].] methodology.
3.3 For each asset, Organisation Name documents sufficient information to identify the
asset [], identifies the physical (or logical) location of the asset, information
security classification of each asset, the [purchase cost/current written down
value/insurance value/all three] for each asset, and the security processes or
controls (including access controls, backups, etc.) associated (following a risk
assessment) with each asset (see control section []).
3.4 For each asset, Organisation Name identifies the business unit or business role that
‘owns’ the asset. For software, the [owner] is its trained system administrator. The
[owner] is responsible for ensuring that the asset is correctly classified, for the day
to day maintenance of the identified controls (see control section []), that access
1
The schedules should be customised to detail the information you are documenting, and they should be
reconciled to the financial ledgers – or this information can be integrated into the financial register – if you do
this, you will need to be careful that you don’t create information classification conflicts, where those who need
to see one part of the data can’t. These schedules can also be kept in databases. See Chapter 8 of IT
Governance: An International Guide to Data Security and ISO27001/ISO27002 for more information on Asset
Management. For assets present at the point of commencing the planning phase of the cycle, use that date and
a single standard methodology for each aspect, such as valuation, classification, etc. – note the methodology
you use in an annex to the schedule.
Organisation Name Classification_3
Customisable PROCEDURE template v3.0
Comments to
[email protected] © IT Governance Ltd 2015
www.itgovernance.co.uk
Document Control
Reference: ISMS-C DOC
INVENTORY AND OWNERSHIP OF 8.1.1
ASSETS (TIER 2) Issue No:
Issue Date:
Page: 2 of 2
controls (see control section []) are defined and periodically reviewed, and that
vulnerabilities are identified and patched in line with [].
3.5 Organisation Name groups some assets together into composite information
‘systems’, in which case it identifies the assets within the system and the [owner]
is the business unit or role responsible for the system.
3.6 [Owners] may delegate routine tasks, in respect of their assets or systems, in line
with section [].
3.7 All new information assets are added to the appropriate schedule as and when they
are acquired [], together with details of the required security processes/controls,
and removed from the schedule when they are disposed of [].
Document Owner and Approval
The Information Security Manager is the owner of this document and is responsible
for ensuring that this procedure is reviewed in line with the review requirements of
the ISMS.
A current version of this document is available to [all/specified] members of staff
on the [corporate intranet] and is published [ ].
This procedure was approved by the Chief Information Security Officer (CISO) on
[date] and is issued on a version controlled basis under his/her signature.
Signature: Date:
Change History Record
Issue Description of Change Approval Date of Issue
1 Initial issue <Manager> Xx/yy/zz
This is a toolkit trial version only -
Buy the full ISMS ISO 27001: 2013 Documentation Toolkit
here
Organisation Name Classification_3
Customisable PROCEDURE template v3.0
Comments to
[email protected] © IT Governance Ltd 2015
www.itgovernance.co.uk