Asset Management

Level N/A

Mechanisms exist to track the origin, development, ownership, location and changes to systems, system components and associated data.


Login

Asset Management

Mechanisms exist to maintain network architecture diagrams that: ▪ Contain sufficient detail to assess the security of the network's architecture; ▪ Reflect the current architecture of the network environment; and ▪ Document all sensitive/regulated data flows.


Login

Asset Management

Mechanisms exist to determine cybersecurity & data privacy control applicability by identifying, assigning and documenting the appropriate asset scope categorization for all systems, applications, services and personnel (internal and third-parties).


Login

Asset Management

Mechanisms exist to ensure control applicability is appropriately-determined for systems, applications, services and third parties by graphically representing applicable boundaries.


Login

Asset Management

Mechanisms exist to create and maintain a current inventory of systems, applications and services that are in scope for statutory, regulatory and/or contractual compliance obligations that provides sufficient detail to determine control applicability, based on asset scope categorization.


Login

Asset Management

Mechanisms exist to maintain strict control over the internal or external distribution of any kind of sensitive/regulated media.


Login

Asset Management

Mechanisms exist to obtain management approval for any sensitive / regulated media that is transferred outside of the organization's facilities.


Login

Asset Management

Mechanisms exist to implement enhanced protection measures for unattended systems to protect against tampering and unauthorized access.


Login

Asset Management

Mechanisms exist to educate users on the need to physically secure laptops and other mobile devices out of site when traveling, preferably in the trunk of a vehicle.


Login

Asset Management

Mechanisms exist to appropriately protect devices that capture sensitive/regulated data via direct physical interaction from tampering and substitution.


Login