Streamlining Asset Identification For Effective Risk Management

|
|
|
PUBLISHED on
25
May
2022
SUMMARY

A question that comes up time and time again is ‘How do you approach asset identification within my information security risk assessment’.  Typically, this question is twofold; which assets to include and the depth or granularity.  This week’s top tip will look at granularity.

In short, stay high level where possible.  Your goal, through the risk assessment, is to identify and then manage your risks in terms of confidentially, integrity and availability (CIA).  If you start with an asset list pages long, perhaps by taking an extract from your IT department’s configuration management database (CMDB), your results are going to be pages long.  With this level of detail, you will find yourself spending a significant amount of time trying to consolidate risks into a manageable number.  You can always go into additional detail where an asset has a different CIA value.  For example, if you have laptops which store, process or transmit information, you need to include these in your assessment.  However, you do not need to include every make and model in your assessment or even group laptops by every department; they should instead be grouped by the levels of information they have access to.  So ‘Laptops’ could be used to cover most staff members’ laptops, as they all have access to the same level of information.  You can then create a separate group for ‘Sensitive Laptops’, i.e., laptops that are used by your senior management team or HR, as these laptops will typically have a higher level of access to information.

By grouping these assets, you reduce the number of duplicated results in your risk assessment and get a more detailed and manageable representation of risk.  Also, if the controls are likely to be deployed consistently across all assets, then there may be no benefit to splitting assets into subcategories.  For example, if all laptops are encrypted and have similar endpoint controls (e.g. antivirus, firewalling), then grouping the assets in one will be appropriate.

So, consider what that asset ultimately holds or has access to, and approach your asset granularity with that in mind!

How URM Can Help

With over 2 decades of experience supporting hundreds of organisations’ information security risk management programmes, URM is the ideal partner to help you create and implement an effective and practical information security risk management approach.  With our proven information security risk management software, Abriska 27001, we can support the entire risk assessment process, identifying not only the threats to your information assets, but also the likelihood and impact of them occurring.  We can also assist with risk treatment and help you prioritise risk treatment activities to maximise your time, effort and budget.

Do you need any help with ISO 27001 certificate?

URM can help you achieve ISO 27001 certification
Thumbnail of the Blog Illustration
Information Security
Published on
27/7/2022
How do You Avoid Information Security Breaches?

With the news often including stories regarding high-profile information security breaches, many of us find ourselves asking how we can avoid it.

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
22/7/2022
What are the Most Common Insider Threats to Information Security?

Broadly speaking, information security is held up by three pillars – People, Process and Technology. It is widely accepted that humans are the weakest link

Read more
Thumbnail of the Blog Illustration
Information Security
Published on
1/4/2026
ISO 27001 Clause 9.1: Monitoring, Measurement, Analysis and Evaluation Explained

URM’s blog explores ISO 27001 Clause 9.1, what it requires and practical guidance on how to implement this Clause in full conformance with the Standard.

Read more
It’s one thing having the required technical knowledge, it’s another thing for a consultant to apply that knowledge to the context of our organisation. To use a sporting analogy, we view cyber and information security as a marathon not a sprint. I am not a believer in doing everything all at once. Our approach has been risk based and incremental, remediating our biggest risks first before moving on. I believe this approach is far more sustainable and effective. And URM’s consultants fully understand this and are very pragmatic and tailored in their guidance and advice. They know we are not implementing ISO 27001 purely for the certificate, but more as a framework for continual improvement, and at a pace where new systems and processes can be fully understood and absorbed by our team and be business as usual.
The Owners and Distributors of Quality Brands
contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.