Hard2bit
← Back to glossary Fundamentals

Asset

What is an asset

An asset is any information technology resource (hardware, software, data, personnel) that has value to the organization and requires protection against threats. Assets include servers, databases, credentials, applications, endpoints, and sensitive information. Effective asset management is the foundation of any cybersecurity program, because you cannot protect what you do not know and have not classified.

Why it matters

Asset identification and classification are fundamental for assessing risks, allocating security budgets, and establishing proportional controls. Without an accurate asset inventory, organizations cannot determine their attack surface, implement effective segmentation, or comply with regulations like ISO 27001 and NIS2. An unmanaged or unknown asset is a potential attack vector, especially in hybrid cloud environments where assets proliferate without control. Asset management is also critical for business continuity and immutable backup planning.

Key points

Assets include hardware, software, data, identities, and technical personnel; they must be inventoried and classified by criticality.

Each asset requires risk evaluation, assignment of responsible owners, and access controls based on exposure level.

Cloud and edge assets often fall outside traditional inventories, creating security posture blind spots.

Asset management is a legal requirement in ISO 27001, NIS2, DORA, and ENS; regular audits are mandatory.

Example: Asset inventory in a mid-size financial services firm

A financial services company starts its asset management programme and identifies the critical elements that until then lived in scattered spreadsheets: application servers, customer databases, executive laptops, corporate identities in the cloud productivity suite, internal APIs and a significant estate of SaaS services contracted by different business units. Each asset is classified by its impact on confidentiality, integrity and availability, and is assigned an owner who is accountable for the controls applied to it.

The first penetration test after the inventory surfaces an unknown web server that one department had spun up for a proof of concept and never decommissioned, still running an unauthorised application exposed to the internet — an unmanaged asset and a clear regulatory risk. From that finding the organisation introduces periodic inventory reviews, enforces MFA across every identity, segments the network to limit the blast radius of a compromised account and rolls EDR out to the full estate, closing the gap between what officially existed and what was actually connected.

Common mistakes

  • Confusing assets with hardware only; data and credentials are equally critical assets requiring specific protection.
  • Failing to update the asset inventory during organizational changes, cloud migrations, or mergers; causes security blind spots.
  • Assuming only 'visible' assets on the internal network exist; omitting APIs, containers, development VMs, and cloud resources increases risk.

Related services

This concept may be related to services such as:

Frequently asked questions

What methods exist for discovering unknown assets?

Network scanning, network flow analysis with NetFlow, CMDB queries, firewall log analysis, discovery penetration testing, active account audits in corporate directories (LDAP, Active Directory, cloud identity providers), exposed API analysis, shadow IT domain searches, and SSL/TLS traffic analysis.

How do you classify an asset by criticality?

Use an impact-probability matrix: evaluate loss of confidentiality, integrity, and availability. Consider dependencies with other assets, regulatory requirements, replacement cost, and impact on critical operations. ISO 27001 requires information classification (public, internal, restricted, secret).

Do cloud assets have special requirements?

Yes. Cloud requires CSPM (Cloud Security Posture Management) for continuous discovery, configuration validation, and detection of orphaned resources. NIS2 and DORA mandate full visibility of critical assets in hybrid environments. CASB and CSPM tools are essential.