Objective 4.2Medium10 min

Asset Assignment and Accounting

Tracking ownership, classification, and monitoring of organizational assets throughout their lifecycle including inventory management, CMDB maintenance, and accountability controls.

Understanding Asset Assignment and Accounting

Asset assignment and accounting ensures every organizational asset has a known owner, location, and classification. You can't protect what you don't know you have—complete asset visibility is fundamental to security.

Key asset management elements:Asset inventory — Complete list of all assets • Ownership assignment — Accountable individuals • Classification — Sensitivity/criticality levels • Monitoring — Track location and status

The 2013 Target breach began through an HVAC vendor with network access. Target didn't have complete visibility into which systems connected to their network or proper asset segmentation. Better asset management would have identified the unauthorized connection paths.

If you can't find it in your inventory, you can't secure it.

Why This Matters for the Exam

Asset management is tested on SY0-701 because it's foundational to security operations. Questions cover inventory practices, ownership, classification, and lifecycle management.

Understanding asset management helps with vulnerability scanning, incident response, and compliance. During incidents, knowing what assets exist and who owns them accelerates response.

The exam tests recognition of asset management practices and their security implications.

Deep Dive

What Is an Asset Inventory?

An asset inventory is a comprehensive database of all organizational assets.

Asset Inventory Contents:

AttributePurpose
Asset IDUnique identifier
TypeHardware, software, data
OwnerAccountable person
LocationPhysical/logical location
ClassificationSensitivity level
StatusActive, retired, etc.
ValueCost/importance

Asset Types:

Hardware:
- Servers, workstations, laptops
- Network equipment
- Mobile devices
- IoT devices

Software:
- Operating systems
- Applications
- Licenses
- Cloud services

Data:
- Databases
- File shares
- Backups
- Archives

Information:
- Intellectual property
- Trade secrets
- Customer data

What Is a CMDB?

Configuration Management Database (CMDB) tracks IT assets and their relationships.

CMDB Components:

ComponentDescription
Configuration Items (CIs)Individual assets
AttributesAsset properties
RelationshipsConnections between assets
HistoryChange tracking

CMDB Relationships:

[Web Application]
       |
       | runs on
       v
[Application Server]
       |
       | hosted on
       v
[Virtual Machine]
       |
       | runs on
       v
[Physical Server]
       |
       | connected to
       v
[Network Switch]

Understanding relationships helps:
- Impact analysis
- Incident investigation
- Change management

What Is Asset Ownership?

Asset ownership assigns accountability for each asset's security.

Ownership Roles:

RoleResponsibility
Asset OwnerAccountable for asset security
CustodianDay-to-day management
UserAuthorized to use asset
AdministratorTechnical management

Ownership Assignment:

Every asset must have:
- Identified owner (person, not role)
- Backup owner (succession)
- Clear responsibilities
- Regular review

Owner responsibilities:
- Authorize access
- Approve changes
- Accept risk
- Ensure compliance

What Is Asset Classification?

Classification categorizes assets by sensitivity and criticality.

Classification Levels:

LevelDescriptionExample
PublicNo restrictionsMarketing materials
InternalOrganization onlyPolicies, procedures
ConfidentialNeed-to-knowFinancial data
RestrictedHighly sensitiveTrade secrets, PII

Classification Process:

1. Identify asset
2. Determine sensitivity
   - What's the impact if disclosed?
   - What's the impact if lost?
   - What's the impact if unavailable?
3. Assign classification
4. Apply appropriate controls
5. Mark/label asset
6. Review periodically

How Do You Monitor Assets?

Asset monitoring tracks location, status, and changes.

Monitoring Methods:

MethodPurpose
Discovery scanningFind new assets
Inventory auditsVerify accuracy
Change trackingDetect modifications
Location trackingPhysical assets
License monitoringSoftware compliance

Automated Discovery:

Network scanning:
- Detect new devices
- Identify unauthorized assets
- Verify known inventory

Agent-based:
- Software inventory
- Configuration state
- Real-time updates

Comparison:
- Compare discovery to CMDB
- Identify discrepancies
- Investigate unknowns

What Is Asset Lifecycle Management?

Assets move through stages from acquisition to disposal.

Asset Lifecycle:

[Procurement] → [Deployment] → [Operation] → [Maintenance] → [Retirement] → [Disposal]

Each stage has security requirements:

Procurement:
- Vendor assessment
- Security requirements

Deployment:
- Baseline configuration
- Inventory registration

Operation:
- Monitoring
- Access control

Maintenance:
- Patching
- Updates

Retirement:
- Data migration
- Access removal

Disposal:
- Data destruction
- Physical disposal

How CompTIA Tests This

Example Analysis

Scenario: A company discovers unknown devices on their network during a security audit. They have no asset inventory. Design an asset management program.

Analysis - Asset Management Implementation:

Current State Problems:

✗ No asset inventory
✗ Unknown devices on network
✗ No ownership assignment
✗ No classification
✗ Cannot identify scope of incidents
✗ Compliance failures likely

Asset Management Program:

Phase 1: Discovery

Network discovery:
- Scan all network segments
- Identify all connected devices
- Document IP, MAC, hostname
- Identify operating systems

Physical inventory:
- Walk-through of facilities
- Document all hardware
- Check for unconnected devices
- Record serial numbers

Phase 2: Inventory Creation

Asset TypeAttributes to Track
ServersHostname, IP, OS, function, location
WorkstationsAsset tag, user, department, location
Network devicesType, IP, location, VLAN
MobileDevice ID, user, MDM status
SoftwareName, version, license, installed on
CloudService, provider, owner, data type

Phase 3: Ownership Assignment

For each asset:
1. Identify business function
2. Determine responsible department
3. Assign individual owner
4. Document backup owner
5. Define custodian (IT)
6. Get owner acknowledgment

Phase 4: Classification

Classification criteria:
- Data sensitivity
- Business criticality
- Regulatory requirements
- Availability requirements

Apply labels:
- Public (green)
- Internal (yellow)
- Confidential (orange)
- Restricted (red)

Phase 5: CMDB Implementation

FeaturePurpose
CI recordsStore asset details
RelationshipsMap dependencies
Change historyTrack modifications
IntegrationConnect to other tools
ReportingGenerate asset reports

Phase 6: Ongoing Monitoring

Automated:
- Weekly network discovery
- Compare to inventory
- Alert on new devices
- Track software changes

Manual:
- Quarterly physical audits
- Annual ownership review
- Classification review
- CMDB accuracy validation

Key insight: Asset management is foundational—you can't secure what you don't know exists. Discovery identifies current state, inventory tracks it, ownership creates accountability, classification determines controls, and monitoring ensures ongoing accuracy.

Key Terms

asset assignmentasset accountingasset managementasset inventoryCMDBasset classificationownership tracking

Common Mistakes

Role-based ownership instead of individual—"IT" can't be held accountable. Assign specific people.
Static inventory—assets change constantly. Continuous discovery and regular audits are essential.
Classification without controls—classification is meaningless without corresponding security controls.
Forgetting cloud assets—SaaS, IaaS, PaaS are assets too. Include them in inventory.

Exam Tips

Asset owner = accountable for security decisions. Custodian = manages day-to-day.
CMDB = Configuration Management Database = tracks assets AND relationships between them.
Discovery scanning finds unknown assets. Compare discovery to CMDB to find discrepancies.
Classification determines controls: Restricted = strictest controls, Public = minimal controls.
Every asset needs an owner (individual person, not role or department).
Asset lifecycle: Procurement → Deployment → Operation → Maintenance → Retirement → Disposal.

Memory Trick

  • Asset Inventory Attributes - "OTLCSV":
  • Owner (who's accountable)
  • Type (hardware/software/data)
  • Location (where is it)
  • Classification (sensitivity)
  • Status (active/retired)
  • Value (importance/cost)
  • Ownership Roles - "OCUA":
  • Owner = Overall accountable
  • Custodian = Cares for it daily
  • User = Uses the asset
  • Administrator = Administers technically

Classification Order (least to most): "Public Internal Confidential Restricted" Or: "PICR" = "Pick the Right level"

  • Asset Lifecycle - "PDOMRD":
  • Procurement
  • Deployment
  • Operation
  • Maintenance
  • Retirement
  • Disposal

Discovery Rule: "If it's on your Network, it needs to be in your Inventory" Unknown devices = Unknown risk

Test Your Knowledge

Q1.Who is accountable for an asset's security and approves access requests?

Q2.What distinguishes a CMDB from a simple asset inventory?

Q3.Network scanning reveals devices not in the asset inventory. What should be done FIRST?

Want more practice with instant AI feedback?

Continue Learning

Ready for the Exam?

See exactly where you stand on this concept and 182 others.

99% pass rate · Pass guarantee