Mechanisms exist to document and govern instances of approved deviations from established baseline configurations.
Mechanisms exist to document and govern instances of approved deviations from established baseline configurations.
Automated mechanisms exist to employ Network Access Control (NAC), or a similar technology, which is capable of detecting unauthorized devices and disable network access to those unauthorized devices.
Mechanisms exist to enable Dynamic Host Configuration Protocol (DHCP) server logging to improve asset inventories and assist in detecting unknown systems.
Mechanisms exist to protect Intellectual Property (IP) rights with software licensing restrictions.
Mechanisms exist to create and maintain a map of technology assets where sensitive/regulated data is stored, transmitted or processed.
Mechanisms exist to implement and manage a Configuration Management Database (CMDB), or similar technology, to monitor and govern technology asset-specific information.
Mechanisms exist to track the geographic location of system components.
Mechanisms exist to bind components to a specific system.
Mechanisms exist to ensure asset ownership responsibilities are assigned, tracked and managed at a team, individual, or responsible organization level to establish a common understanding of requirements for asset protection.
Mechanisms exist to include capturing the name, position and/or role of individuals responsible/accountable for administering assets as part of the technology asset inventory process.