The idea in brief: In cybersecurity, an asset is something valuable that a business owns or anything that can be directly used to create value. This is very similar to the accounting and finance idea of an asset.
In more detail: The most common types of assets are software applications and laptops. But intellectual property and the data companies control are also considered assets.
From a cybersecurity view, there are two essential types of assets:
This means that assets that are managed in cybersecurity include:
As IT and technology services have become easier to buy using credit cards (e.g. cloud computing and SaaS services), companies have become reliant on this 'shadow IT' infrastructure for business processes.
'Shadow IT' or 'grey IT' are the IT assets that are not managed and monitored as part of its asset management processes, but the company relies on them to operate and create value.
Listing your most important assets is often the first step when using a security framework, as it allows you to set the limits of what you're going to protect. But how do you discover what assets are in your company?
You can start to understand what assets you have by looking at:
Once you have started to find the assets in your company, it is crucial to document what has been found. This can be as simple as writing on a sheet of paper or on a spreadsheet. For more complex environments, it may be necessary to use one of the database tools available.