Please note: This sample shows only a section of the complete asset inventory tool.
SECURITY CLASSIFICATION: LAST UPDATED: UPDATED BY:
REF ASSET NAME
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
OWNER
INFORMATION C...
STATUS
CSF-DOC-IDAM-2
(blank)
Select…
Select…
DATA DATE OF STATUS RETENTION ACQUISITION PERIOD (IF KNOWN)
COMMENTS
The following items have been identified as information assets within the context of the cybersecurity framework.
[Enter classification here] [Enter date here] [Enter who updated here]
DESCRIPTION
Information Asset Inventory
PURPOSE
OWNER LEGAL REQ
Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select…
FINANCIAL BUSINESS VALUE CRITICALITY
Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select…
Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select…
SENSITIVITY TO PERSONALLY INFORMATION LOCATION UNAUTHORISED IDENTIFIABLE CLASSIFICATION DISCLOSURE OR INFORMATION MODIFICATION Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select…
REF NO
Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select…
Hardware Asset Inventory CSF-DOC-IDAM-2
SECURITY CLASSIFICATION: LAST UPDATED: UPDATED BY:
REF ASSET NAME 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
STATUS
(blank)
Select…
The following items have been identified as hardware assets within the context of the cybersecurity framework.
[Enter classification here] [Enter date here] [Enter who updated here]
DESCRIPTION
MANUFACTURER
ALLOCATED TO
MANUFACTURER
MODEL
SERIAL NUMBER
ASSET NUMBER
DATE ACQUIRED STATUS Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select… Select…
COMMENTS