From the course: Security for the SMB: Implementing the NIST Cybersecurity Framework

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Inventory of critical assets

Inventory of critical assets

From the course: Security for the SMB: Implementing the NIST Cybersecurity Framework

Start my 1-month free trial

Inventory of critical assets

- [Instructor] Let's get started on the five functions or steps listed in the NIST cybersecurity framework. The first is identify, determining and documenting your key business assets. If you don't know what you have, how can you protect it? This category helps you figure out what technology, data, and other resources your company has that's valuable to you and others. The first category in the Identify function is Asset Inventory. This is a list of your most important systems, devices, software, services, and data. It includes both tangible items, like hardware and intangible ones, like software. You don't need to keep track of everything. Start with the items that have the highest value or risk. The NIST framework provides direction on what your inventory should contain, such as physical devices, software and applications, data flows, external or third party systems, and cybersecurity roles. What should your inventory…

Contents