Asset Management

Mechanisms exist to document and govern instances of approved deviations from established baseline configurations.


Login

Asset Management

Automated mechanisms exist to employ Network Access Control (NAC), or a similar technology, which is capable of detecting unauthorized devices and disable network access to those unauthorized devices.


Login

Asset Management

Mechanisms exist to enable Dynamic Host Configuration Protocol (DHCP) server logging to improve asset inventories and assist in detecting unknown systems.


Login

Asset Management

Mechanisms exist to protect Intellectual Property (IP) rights with software licensing restrictions.


Login

Asset Management

Mechanisms exist to create and maintain a map of technology assets where sensitive/regulated data is stored, transmitted or processed.


Login

Asset Management

Mechanisms exist to implement and manage a Configuration Management Database (CMDB), or similar technology, to monitor and govern technology asset-specific information.


Login

Asset Management

Mechanisms exist to track the geographic location of system components.


Login

Asset Management

Mechanisms exist to bind components to a specific system.


Login

Asset Management

Mechanisms exist to ensure asset ownership responsibilities are assigned, tracked and managed at a team, individual, or responsible organization level to establish a common understanding of requirements for asset protection.


Login

Asset Management

Mechanisms exist to include capturing the name, position and/or role of individuals responsible/accountable for administering assets as part of the technology asset inventory process.


Login