SSCP Day 4: Securing What You Own: Asset Management

Before you can protect your data, you must know where it lives. The Asset Management process is the foundational administrative control (Domain 1) that addresses this challenge. It is the practice of tracking and managing the life cycle of every asset—be it a laptop, a server, or a critical database—that holds value and requires protection.

For the SSCP, this domain requires mastering three core phases: Identification, Classification, and Tracking. This ensures that security resources are always applied where they are needed most.


1. Asset Identification: Building the Inventory

Identification is the process of discovering and recording every piece of hardware, software, and information within the organizational boundaries. You can’t secure what you don’t know exists.

  • Goal: Create a comprehensive and accurate inventory of all assets.
  • What to Record: For hardware, this includes MAC/IP addresses, location, serial numbers, and ownership. For software, this means application names, version numbers, and licensing information.
  • The Risk of Failure: The primary risk is the existence of shadow IT—unauthorized devices or software connected to the network that the security team is unaware of, creating massive vulnerabilities.

2. Asset Classification: Determining Sensitivity

Once an asset is identified, its content must be formally categorized by the Data Owner to determine its value and the level of protection it requires. This is the cornerstone of protecting confidentiality.

  • Goal: Assign a protective label based on the highest level of data sensitivity stored or processed by the asset.
  • Common Classification Labels:
    • Public/Unclassified: Information available to the public (e.g., marketing materials). Requires minimal protection.
    • Internal/Private: Information intended for internal use only (e.g., internal memos).
    • Confidential/Sensitive: Information that would cause significant business harm if disclosed (e.g., trade secrets, financial projections). Requires strong protection.
    • Restricted/Secret: Highly sensitive data (e.g., source code, personally identifiable information (PII), or protected health information (PHI)). Requires the strictest controls.
  • The Principle: The higher the classification, the more stringent the security controls (encryption, access controls, physical locks) must be.

3. Asset Tracking: Lifecycle Management

Tracking ensures that the inventory remains accurate throughout the entire asset lifecycle, from procurement to disposal. This is an ongoing process handled by the Data Custodian and IT operations.

  • Goal: Maintain an auditable record of the asset’s status, location, and the security controls applied to it.
  • Key Lifecycle Events:
    • Acquisition: The asset is added to the inventory with its initial classification.
    • Use/Maintenance: Recording all patches, updates, and configuration changes (often tied to the Change Management Process).
    • Disposal: Procedures for secure media sanitization (e.g., wiping or degaussing hard drives) to ensure no confidential data leaves the organization.
  • Tracking Methods: Tools used for tracking often include Configuration Management Databases (CMDBs) or automated asset discovery tools that continuously scan the network.

Resources for Further Study

To master this foundational domain, focus on how these processes integrate with the roles of the Data Owner (classification authority) and the Data Custodian (tracking and protection execution).

Extensive Website References

  • NIST SP 800-128: Guide for Security-Focused Configuration Management
    • Reference: Search for “NIST SP 800-128”
    • Value: This publication provides a detailed, authoritative framework for asset and configuration management, including the need for baselines and continuous monitoring.
  • ISO/IEC 27002: Information Security, Cybersecurity and Privacy Protection (Asset Management Section)
    • Reference: Search for “ISO 27002 Asset Management Controls”
    • Value: Defines the international standard for controlling information assets, emphasizing inventory, ownership, and acceptable use.
  • SANS Institute: Importance of Asset Inventories
    • Reference: Search for “SANS Critical Security Controls Inventory and Control of Hardware Assets”
    • Value: Highlights why an accurate inventory is the absolute first step in effective security, often citing it as CSC 1 (Critical Security Control 1).

Recommended Video Resources

Focus AreaRecommended Video Search TopicKey Takeaway
Asset Lifecycle & Roles“Asset Management in Security: Owner vs Custodian”Explains the full life cycle of a hard drive or server and clarifies which roles (Owner, Custodian) are responsible for each phase, especially disposal.
Classification Deep Dive“Data Classification Schemes and Security Labels Explained”Focuses on the different levels of data classification (Confidential, Private, etc.) and what those labels mean for the technical controls applied to the asset.
Configuration Management“Introduction to Configuration Management Database (CMDB)”Provides an overview of the tools and systems used to track and manage all assets and their associated configurations in a live environment.