Content library
NIST Cybersecurity Framework
ID.AM-1: Physical device inventory

How to fill the requirement

NIST Cybersecurity Framework

ID.AM-1: Physical device inventory

Task name
Priority
Status
Theme
Policy
Other requirements
Documentation of other protected assets
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Equipment maintenance and safety
23
requirements

Task is fulfilling also these other security requirements

8.1.1: Inventory of assets
ISO27 Full
8.1.2: Ownership of assets
ISO27 Full
ID.AM-1: Physical device inventory
NIST
ID.AM-2: Software and app inventory
NIST
HAL-04: Suojattavat kohteet
Julkri
1. Task description

The organization shall list all relevant protected assets to determine ownership and to ensure that security measures cover all necessary items.

A large portion of the protected assets (including data sets, data systems, personnel / units, and partners) are treated through other tasks. In addition, the organization must list other important assets, which may be, depending on the nature of its operations, e.g. hardware (servers, network equipment, workstations, printers) or infrastructure (real estate, power generation, air conditioning). In addition the organization should make sure that relevant external devices are documented.

Documentation of assets inventories outside the ISMS
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Management of data sets
Management of data sets
16
requirements

Task is fulfilling also these other security requirements

8.1.1: Inventory of assets
ISO27 Full
ID.AM-1: Physical device inventory
NIST
ID.AM-2: Software and app inventory
NIST
HAL-04: Suojattavat kohteet
Julkri
HAL-04.1: Suojattavat kohteet - vastuut
Julkri
1. Task description

Assets to be protected related to information and data processing services should be inventoried. The purpose is to ensure that the cyber security is focused on the necessary information assets.

Inventory can be done directly in the management system, but an organization may have other, well-functioning inventory locations for certain assets (including code repositories, databases, network devices, mobile devices, workstations, servers, or other physical assets).

Describe in this task, which lists outside the management system are related to protection of information assets.

No items found.