In order to meet the requirements of ‘Asset management’ A.8 from Annex A of ISO 27001, it is necessary to identify organisational assets and define appropriate protection responsibilities, as well as ensuring that information receives an appropriate level of protection in accordance with its importance to the organisation.
Establishing Asset Registers
When compiling your asset registers or inventories, it is recommended that you record the following information for each information asset:
- Asset type
- Asset owner
- Asset classification
- Asset location
- Asset impact levels in relation to confidentiality, integrity and availability
Establishing Asset Types
URM suggests the following basic segregation of assets:
- Information assets
- Supporting assets
– hardware
– software
– people
– buildings - Intangible assets (e.g., brand and reputation).
Identifying Asset Owners
In the process of identifying asset owners, it is important to identify a functional role that has oversight of specific types of assets.
Asset owners are responsible for:
- Identifying risks to the asset type
- Providing guidance and instructions on how the asset should be used.
- Identifying levels of protection required depending on the asset classification.
- Implementing and verifying the effectiveness of security controls in respect of that asset type.
Assigning Asset Classifications
Depending on the organisational structure, it would typically be the asset owner who would decide asset classification. The classification must be approved by top management and the criteria for protection of assets must be in line with their criticality.
Assigning Impact Levels
As with classification, impact levels need to be assigned by the asset owner. Determining the impact levels of assets can be relatively complex, but in essence, the impact level will be inherited by the information contained on or within the asset.
If your organisation has received a request for a SOC 2 report and is looking to meet all the necessary requirements, URM can offer you informed guidance and practical support.
URM can help you achieve ISO 27001 certification
URM can provide a range of ISO 27002:2022 transition services including conducting a gap analysis, supporting you with risk assessment and treatment activities as well as delivering a 2-day transition training course.
![Thumbnail of the Blog Illustration](https://cdn.prod.website-files.com/663395d3790b636e6eefc3f0/663c872e33caf2aa5ad9a1c7_Blog-Thumb-ISO27001-Pitfalls.jpg)
URM’s blog discusses the common pitfalls of the ISO 27001 implementation and certification process, and how you can avoid making the same mistakes.
![Thumbnail of the Blog Illustration](https://cdn.prod.website-files.com/663395d3790b636e6eefc3f0/663395d3790b636e6eefcc2c_Blog-Thumb-Threat-Inteligence.jpg)
URM’s blog discusses the changes to the requirements around threat intelligence in ISO 27001:2022 and what certified organisations will need to do differently.
![Thumbnail of the Blog Illustration](https://cdn.prod.website-files.com/663395d3790b636e6eefc3f0/663395d3790b636e6eefcb10_Blog-Thumb-ISOvsSOC-Part-2.jpg)
2nd part of question and answer session where URM compared and contrasted 2 of the world’s leading information security standards, ISO 27001 and SOC 2.