Sample Asset Management Policy & Procedure Template

Contents

1. Purpose

This Asset Management Security Policy and Procedure establishes the requirements and activities for identifying and controlling protected information assets and supporting technology and infrastructure assets.

Note, this policy / procedure complies with the requirements of the ISO 27001:2013 International Standard Annex A.8.1.1, A.8.1.2, A.8.1.3, A.8.1.4.

Free Security Policy Templates

Get a step ahead of your cybersecurity goals with our comprehensive templates.

IT Security Policy Templates

2. Scope

Asset Manager (AM) – [Company Name] having responsibility for managing controlled assets.

  • The AM will maintain a comprehensive Asset Management Process consistent with the overall requirements of this procedure.
  • Ensure the asset is properly classified and protected.
  • Ensure proper handling if the status changes or is dispositioned.
  • Asset User (AU) – [Company Name] employee who is accountable for the appropriate use and the protection of assigned assets.
  • The AU is responsible to report any damage, theft or loss of an asset in accordance with the HR Security Policy and the Acceptable Use Policy.

3. Policy

[Company Name] assures that all assets, including information and the technology and infrastructure assets supporting the processing of related data within the ISMS scope, are identified, and controlled.


[Company Name] achieves this by monitoring and tracking the acquisition, deployment, operation, removal, and disposition of assets, over their service life and/or period of [Company Name] custody, to assure information protections and security are maintained.

4. Procedure

Acquire And Register Asset

Whenever an information technology asset is acquired the Asset Manager will capture the following information about the asset in the Asset Register.

  •  Identifier (ID) – is the unique identifier for the asset.
  • Type – Hardware, Software or Information asset.
  • Categories: Enter the category for the asset. For example, a hardware asset might be a server or a storage device, while a software asset might be an operating system or an application.
  • Document the date purchased.
  • Record to whom ownership and/or custody has been assigned.
  • For each type of asset capture other descriptive information that will help track the lifecycle of the asset, as guided by the Asset Register drop down selections.

Examples include hardware make, model, and serial numbers; software license numbers and revision levels; and information types and classifications.

Deploy Asset

This step refers to transportation of the asset to its operational location, and performing any planning, development, setup, configuration, and testing processes necessary to place the asset into operation with appropriate ISMS Statement of Applicability controls, and without compromising the security of any other asset. Appropriate updates to the Asset Register are made by the Asset Manager.

Operate Asset

This step refers to operation of assets supporting ongoing protected information processing while maintaining ISMS Statement of Applicability controls.

If changes occur to the Asset during its operational life, for example, any reassignment of an asset or change in deployment the Asset User will report the change to the Asset Manager who will record it in the Asset Register.

In the case of the loss or theft of an asset the Asset User will immediately inform the Asset Manager or their immediate Supervisor who will trigger a Security Incident, and the Security Incident Management process.

Remove / Dispose Of Asset

This step refers to removal and/or disposal of assets from their operating environments and/or their assigned custodian.

The Asset User will notify the Asset Manager, who will determine the planning, preparation, and takedown, without negatively impacting business operations or compromising the protective controls for any other asset.

This disposition is recorded in the Asset Register by the Asset Manager.

Monitor, Track, And Review Assets

  • Changes To Assets: Status changes (e.g., location, assignment, classification…) are recorded in the Asset Register by the Asset Manager at the time of the change and throughout the service life of the Asset.
  • Monitoring Of Assets: This Asset Management Procedure is a focus of the Internal Audit activity to assure ongoing accuracy of the Asset Register and compliance to the procedure.
  • Review Of Assets: The Asset Security Management System, and the Asset Register, are included as agenda topics for ISMS Management Review.

A Physical Inventory of all assets will be conducted annually by the Asset Manager with the assistance of department managers. The results of these inventories will be retained by the Asset Manager and covered during Management Review.

5 Asset management Records

  • Asset Register

6. Reference Documents

  • Information Security Management System (ISMS) Plan
  • Information Security Manual
  • Asset Register
  • HR Security Policy
  • Acceptable Use Policy

Article by

Picture of Jason Firch, MBA
Jason Firch, MBA
Jason is a proven marketing leader, veteran IT operations manager, and cybersecurity expert with over a decade of experience. He is the founder and President of PurpleSec.
Picture of Jason Firch, MBA
Jason Firch, MBA
Jason is a proven marketing leader, veteran IT operations manager, and cybersecurity expert with over a decade of experience. He is the founder and President of PurpleSec.

Share This Page

Our Editorial Process

Our content goes through a rigorous approval process which is reviewed by cybersecurity experts – ensuring the quality and accuracy of information published.

Categories

.

The Breach Report

Our team of security researchers analyze recent cyber attacks, explain the impact, and provide actionable steps to keep you ahead of the trends.

Related Templates

Acceptable Use of Information Systems

An acceptable use policy outlines the use of computer equipment. Inappropriate use exposes the company to risks including virus attacks, compromise of network systems and services, and legal issues.

This policy defines the requirement for reporting and responding to incidents related to the company’s information systems and operations

A penetration testing policy provides guidance for managing a penetration testing program and performing penetration testing activities with the goal of improving defensive IT security

The purpose of an internet usage policy is to establish the rules for the use of company Internet for access to the Internet or the Intranet.

The company must prioritize its assets and protect the most critical ones first; however, it is important to ensure patching takes place on all machines.