Table of contents
- Asset Management Policy
- How does the asset management policy work?
- Asset Management Policy Template
- The asset management lifecycle and policy
- Does the policy include people’s personal devices?
- Asset management policy contents summary
- Downloadable Asset Management Templates
- Asset Management Policy FAQ
- Asset Management Policy Example PDF
- Read Next
Asset Management Policy
The ISO 27001 asset management policy ensures the correct assets are identified and protected. We cannot protect what we do not know.
Asset management is one of the most time consuming activities that you will undertake. The asset management policy sets out what the company does when it comes to asset management. It is your blue print for the asset management life cycle.
How does the asset management policy work?
When it comes to cyber security, you cannot protect what you do not know. Having an understanding of what you have, what computers, what data, what mobiles is fundamental in ensuring you have the right protection in place to protect them.
An asset management policy will set out what you do for managing those assets.
Asset Management Policy Template
The asset management lifecycle and policy
The asset management lifecycle is concerned with how you acquire, or purchase, assets. Then how you deploy them. It covers how you transport them, how you record them, how you allocate them, how you return them, how you reissue them and ultimately how you destroy them. The policy should cover all of these steps.
It seems simple. Just write down all the devices that you have. It is that simple but I am never surprised when even companies of less than 10 people struggle to know what they actually have.
Your asset management policy will cover every device that can store, process and transmit data. We are looking at the easy things like laptops, tablet, phones but we are also looking at switches and routers. Perhaps printers with memory. Perhaps removable storage. Can it store, process or transmit data? If the answer is yes, it is covered by the policy.
Does the policy include people’s personal devices?
Yes. Yes it does. If they want to use it to access our systems and our data.
Asset management policy contents summary
Information and information processing, storing and transmitting devices are identified and an inventory of these assets is drawn up and maintained. Ownership of assets is identified, agreed and documented along with roles and responsibilities. The acceptable use of assets is covered as is the return of assets. The use of asset registers is included.
Asset management fits as part of a comprehensive information security management system that we explore on our ISO 27001 Templates Documents Ultimate Guide.
Downloadable Asset Management Templates
The following asset management templates will help you with asset management.
Asset Management Policy FAQ
The asset management template can be found here – https://hightable.io/product/asset-management-policy-template/. It covers the requirements of ISO 27001 and other standards and is an important document for knowing what to protect as well as controlling assets.
An asset management policy is a document that lays out what you do for the management of physical and data assets. It is a statement of what you do not how you do it. How you do it is located in your process, procedure and operating documents.
An asset management policy contains as a minimum:
Document Version Control
Document Contents Page
Asset Management Policy
Inventory of Asset
Ownership of Assets
Acceptable use of assets
Return of Assets
The purpose of this policy is the identification and management of assets.
The scope of the asset management policy is all company employees and external party users. The scope covers all company information and physical assets.
The asset management principle is that company assets are known, identified and managed with appropriate protection in place.
For recording and managing assets you need and Inventory of Assets. Information and information processing, storing and transmitting devices are identified and an inventory of these assets is drawn up and maintained.
For each asset, at least the following, is recorded
• The asset name
• The asset owner
• The importance of the asset
• The classification of the asset
For physical assets additionally, at least the following is recorded
• Asset number
• Serial number
• Whether in use
• Last checked by and date
• What the asset does
Individuals, roles or teams are assigned ownership of assets.
Asset owners ensure assets are inventoried.
Asset owners ensure assets are appropriately classified and protected.
Asset owners ensure the proper handling when the asset is deleted or destroyed in line with the Information Classification and Handling Policy.
The asset owner may delegate routine tasks.
Yes. The asset management policy is required for ISO 27001 certification.
IT asset management is important because you can control what you do not know. If we do not know what we have, how can we control it? Having an effective asset management life cycle that covers the asset from purchase to disposal with the appropriate IT technical controls on the asset will allow us secure our business and the information on which the business relies.
Asset Management Policy Example PDF
If you want to have a look at an example asset management policy PDF click the link. It is redacted in places but gives you a good idea of what good looks like.