What Is an Asset?

The idea in brief: In cybersecurity, an asset is something valuable that a business owns or anything that can be directly used to create value. This is very similar to the accounting and finance idea of an asset.

In more detail: The most common types of assets are software applications and laptops. But intellectual property and the data companies control are also considered assets.

From a cybersecurity view, there are two essential types of assets:

  1. Assets that must be configured to meet security outcomes
  2. Assets that could be impacted by a cyberattack or ransomware

This means that assets that are managed in cybersecurity include:

  1. Laptops, computers, printers, network infrastructure - these are often called "hardware assets".
  2. Finance software, word processing apps, design and marketing apps, industrial control software - these are often called "software assets".
  3. Data about customers, your order book, supply chain information - these are often called "data assets".
  4. Trade secrets, patents, R&D data - these are often called "intellectual property assets".

Shadow IT

As IT and technology services have become easier to buy using credit cards (e.g. cloud computing and SaaS services), companies have become reliant on this 'shadow IT' infrastructure for business processes.

'Shadow IT' or 'grey IT' are the IT assets that are not managed and monitored as part of its asset management processes, but the company relies on them to operate and create value.

What Assets Do You Own?

Listing your most important assets is often the first step when using a security framework, as it allows you to set the limits of what you're going to protect. But how do you discover what assets are in your company?

You can start to understand what assets you have by looking at:

  1. Purchase orders and procurement records
  2. Logging and monitoring systems - e.g. DNS servers or Microsoft Active Directory
  3. Mobile Device Managers or device management tools - e.g. Microsoft Insight
  4. Vulnerability management platforms
  5. Feedback from your engineering or development teams
  6. A manual audit - i.e. visiting offices and looking under desks. This is time-consuming but often finds assets that people have forgotten about.

Once you have started to find the assets in your company, it is crucial to document what has been found. This can be as simple as writing on a sheet of paper or on a spreadsheet. For more complex environments, it may be necessary to use one of the database tools available.

Related Reads

The Guide: Cyber Security Frameworks

The Guide: Cyber Security Frameworks

Fresh Security's guide to cyber security frameworks - answering your questions and introducing you to useful cyber security.

Subscribe to Fresh Thoughts

Our weekly newsletter brings you cybersecurity stories and insights. The insights that help you cut through the bull.

We'll never share your email.

Resources

Fresh Security Support

Your Questions

Blog

Fresh Sec Limited

Call: +44 (0)203 9255868