Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Inventory of information and other associated

assets Policy

Document ID ACPL-ISMS-C5.9
Document Classification Internal
Issue Date (effective from) 01.12.2023
Version No 1.0
Latest Review Date 01.12.2023

Nitin Gupta Kunal Parikh Vijay Gupta

CISO Director Director

Prepared By Reviewed By Approved By


Inventory of information and other associated assets Policy

1. Control statement:

An inventory of information and other associated assets, including owners, should be developed and
maintained.

2. Purpose:

To identify the organization’s information and other associated assets in order to preserve their
information security and assign appropriate ownership.

3. Scope:

This covers all the information assets and other associated assets available in the organization
including cloud information.

4. Procedure:

Inventory of assets:

1. The inventory of the information assets and other associated assets have been determined
and maintained by keeping the importance of information security in mind. Ref. No. XXXXX.
2. All assets in the inventory will be reviewed at least once in a year for updating for the addition,
deletion and category change (if any)
3. The location of the assets has been identified in the asset inventory register.
4. A single list of asset inventory has been prepared and made available to the concerned
department/individual
5. Each asset has been identified with the classification of the assets.
6. The ownership, custodian and the user has been identified in the inventory of assets.
7. The owner of the assets has the following responsibilities pertaining to the Assets he / she
own:

The asset owner is responsible for the proper management of an asset over the whole asset life
cycle, ensuring that:

1. Information and other associated assets are inventoried;


2. Information and other associated assets are appropriately classified and protected;
3. The classification is reviewed periodically;
4. Components supporting technology assets are listed and linked, such as database, storage, software
components and sub-components
5. Requirements for the acceptable use of information and other associated assets are established.
6. Access restrictions correspond with the classification and that they are effective and are reviewed
periodically;

Doc ID: ACPL-ISMS-C5.9 Version 1.0 Last Rev. Date: 01.12.2023 Page 2 of 3

This document is confidential and must not be shared or copied without written permission from
Aethereus Consulting. Please return or destroy upon request.
Inventory of information and other associated assets Policy

7. Information and other associated assets, when deleted or disposed, are handled in a secure manner
and removed from the inventory;
8. Identification and management of risks associated with their asset(s);
9. Owner has to support personnel who have the roles and responsibilities of managing their information.

5. Reference

Information Asset Register

6. Revision History

Revision Date Description Author


1.0 01.12.2023 Initial release CISO

Doc ID: ACPL-ISMS-C5.9 Version 1.0 Last Rev. Date: 01.12.2023 Page 3 of 3

This document is confidential and must not be shared or copied without written permission from
Aethereus Consulting. Please return or destroy upon request.

You might also like