Skip to main content

AST-01: Asset Governance

AST 10 — Critical Govern

Mechanisms exist to facilitate an IT Asset Management (ITAM) program to implement and manage asset management controls.

Control Question: Does the organization facilitate an IT Asset Management (ITAM) program to implement and manage asset management controls?

General (41)
Framework Mapping Values
AICPA TSC 2017:2022 (used for SOC 2) (source) CC2.1-POF6 CC2.1-POF9 CC3.3-POF1 CC6.1-POF1 CC6.1-POF9
CIS CSC 8.1 1 2 2.1 2.2
CIS CSC 8.1 IG1 2.1 2.2
CIS CSC 8.1 IG2 1.3 2.1 2.2
CIS CSC 8.1 IG3 1.3 2.1 2.2
COBIT 2019 BAI09.01 BAI09.02 BAI09.03 BAI09.04 BAI09.05
CSA CCM 4 DCS-05
CSA IoT SCF 2 ASM-02
ENISA 2.0 SO15
IMO Maritime Cyber Risk Management 3.5.2.1
ISO 27002 2022 5.30 5.31 7.9
ISO 27017 2015 8.1 8.1.1
NAIC Insurance Data Security Model Law (MDL-668) 4.C(4)(b) 4.D(2)(b)
NIST AI 100-1 (AI RMF) 1.0 GOVERN 2.0
NIST Privacy Framework 1.0 PR.DS-P3
NIST 800-37 R2 P-18
NIST 800-53 R4 PM-5
NIST 800-53 R5 (source) PM-5
NIST 800-53 R5 (NOC) (source) PM-5
NIST 800-161 R1 PM-5
NIST 800-161 R1 Flow Down PM-5
NIST 800-161 R1 Level 2 PM-5
NIST 800-161 R1 Level 3 PM-5
NIST 800-171 R2 (source) 3.4.1 3.8.3
NIST 800-171 R3 (source) 03.01.03 03.01.18.a 03.04.11.a 03.07.04.a
NIST 800-207 NIST Tenet 1 NIST Tenet 5
NIST CSF 2.0 (source) GV.SC-04 ID.AM ID.AM-08
PCI DSS 4.0.1 (source) 6.3.2 9.5.1 9.5.1.1 11.2 11.2.2
PCI DSS 4.0.1 SAQ A-EP (source) 6.3.2
PCI DSS 4.0.1 SAQ B (source) 9.5.1 9.5.1.1
PCI DSS 4.0.1 SAQ B-IP (source) 9.5.1 9.5.1.1
PCI DSS 4.0.1 SAQ C (source) 9.5.1 9.5.1.1 11.2.2
PCI DSS 4.0.1 SAQ D Merchant (source) 6.3.2 9.5.1 9.5.1.1 11.2.2
PCI DSS 4.0.1 SAQ D Service Provider (source) 6.3.2 9.5.1 9.5.1.1 11.2.2
PCI DSS 4.0.1 SAQ P2PE (source) 9.5.1 9.5.1.1
Shared Assessments SIG 2025 D.1
TISAX ISA 6 3.1.3 5.3.3
SCF CORE Mergers, Acquisitions & Divestitures (MA&D) AST-01
SCF CORE ESP Level 1 Foundational AST-01
SCF CORE ESP Level 2 Critical Infrastructure AST-01
SCF CORE ESP Level 3 Advanced Threats AST-01
US (23)
Framework Mapping Values
US C2M2 2.1 ASSET-1.D.MIL2 ASSET-1.H.MIL3 ASSET-2.D.MIL2
US CERT RMM 1.2 ADM:SG1.SP1 ADM:SG3.SP2 TM:SG1.SP1
US CISA CPG 2022 1.A
US CMMC 2.0 Level 1 (source) MP.L1-B.1.VII
US CMMC 2.0 Level 2 (source) CM.L2-3.4.1 MP.L2-3.8.3
US CMMC 2.0 Level 3 (source) CM.L2-3.4.1 MP.L2-3.8.3
US CMS MARS-E 2.0 PM-5
US DoD Zero Trust Execution Roadmap 2.2
US DoD Zero Trust Reference Architecture 2.0 2.2.1
US DHS ZTCF APP-01 SYS-03
US FAR 52.204-21 52.204-21(b)(1)(vii)
US HIPAA Administrative Simplification 2013 (source) 164.308(a)(7)(ii)(E) 164.310(d)(1) 164.310(d)(2)(i)
US HIPAA Security Rule / NIST SP 800-66 R2 (source) 164.308(a)(7)(ii)(E) 164.310(d)(1) 164.310(d)(2)(i)
US HIPAA HICP Small Practice 5.S.A
US HIPAA HICP Medium Practice 5.M.A
US HIPAA HICP Large Practice 5.M.A 2.L.A
US IRS 1075 PM-5
US ITAR Part 120 120.45
US NERC CIP 2024 (source) CIP-003-8 1.1 CIP-003-8 1.2.5 CIP-003-8 R2 CIP-011-3 1.2 CIP-011-3 R1
US NISPOM 2020 8-311
US NNPI (unclass) 1.2
US - NY DFS 23 NYCRR500 2023 Amd 2 500.13(a) 500.3(c)
US - TX DIR Control Standards 2.0 PM-5
EMEA (17)
APAC (8)
Framework Mapping Values
APAC Australia ISM June 2024 ISM-0285 ISM-0286 ISM-0289 ISM-0290 ISM-0591 ISM-1457 ISM-1480
APAC Australia Prudential Standard CPS234 21 21(c)
APAC India SEBI CSCRF GV.PO.S5
APAC Japan ISMAP 8.1.1.6.PB 11.2.6
APAC New Zealand HISF 2022 HHSP05 HHSP54 HML05 HML54 HMS12 HMS14 HSUP05 HSUP46
APAC New Zealand HISF Suppliers 2023 HSUP05 HSUP46
APAC New Zealand NZISM 3.6 8.4.9.C.01
APAC Singapore MAS TRM 2021 3.3.1 3.3.1(a) 3.3.1(d) 7.1.1 11.4.1 11.4.2 11.4.3
Americas (3)
Framework Mapping Values
Americas Bermuda BMACCC 5.9
Americas Canada OSFI B-13 2.2 2.2.1 2.2.2 2.9.2
Americas Canada ITSP-10-171 03.01.03 03.01.18.A 03.04.11.A 03.07.04.A

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to facilitate an IT Asset Management (ITAM) program to implement and manage asset management controls.

Level 1 — Performed Informally

Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
  • Asset inventories are performed in an ad hoc manner.
  • Software licensing is tracked as part of IT asset inventories.
  • Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
  • IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
Level 2 — Planned & Tracked

Asset Management (AST) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
  • IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
  • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
  • Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
  • Technology assets are categorized according to data classification and business criticality.
  • Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
  • Software licensing is tracked as part of IT asset inventories.
  • Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
  • IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
  • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Level 3 — Well Defined

Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • The Chief Information Security Officer (CISO), or similar function with technical competence to address cybersecurity concerns, analyzes the organization's business strategy and prioritizes the objectives of the security function to determine prioritized and authoritative guidance for asset management practices, within the broader scope of cybersecurity and data protection operations.
  • The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization. This CONOPS for asset management may be incorporated as part of a broader operational plan for the cybersecurity and data privacy program.
  • A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity and data protection controls to facilitate the implementation of secure and compliant practices to protect the confidentiality, integrity, availability and safety of the organization's applications, systems, services and data. Compliance requirements for data backups are identified and documented.
  • A steering committee is formally established to provide executive oversight of the cybersecurity and data privacy program, including asset management. The steering committee establishes a clear and authoritative accountability structure for asset management operations.
  • An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
  • An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
  • An ITAM function, or similar function, conducts ongoing “technical debt” reviews of hardware and software technologies to remediate outdated and/ or unsupported technologies.
  • Technology assets and data are categorized according to data classification and business criticality criteria.
  • A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
  • Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
  • Anti-theft software is installed on laptops and mobile devices to track assets removal from facilities. If possible, alerting is enabled for sensitive/regulated assets.
  • Technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
  • The Human Resources (HR) department ensures that every user accessing a system that processes, stores, or transmits sensitive/regulated data is cleared and regularly trained in proper data handling practices.
Level 4 — Quantitatively Controlled

Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.

  • Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
  • Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
  • Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
  • Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
  • Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
  • Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving

Asset Management (AST) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
  • Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.

Assessment Objectives

  1. AST-01_A01 an authoritative source and repository are established to provide a trusted source and accountability for approved and implemented systems and system components.
  2. AST-01_A02 the frequency at which to review / update the system and system component inventory is defined.
  3. AST-01_A03 an inventory of systems and system components that is at the level of granularity deemed necessary for tracking and reporting is developed and documented.
  4. AST-01_A04 IT Asset Management (ITAM) operations are conducted according to documented policies, standards, procedures and/or other organizational directives.
  5. AST-01_A05 adequate resources (e.g., people, processes, technologies, data and/or facilities) are provided to support IT Asset Management (ITAM) operations.
  6. AST-01_A06 responsibility and authority for the performance of IT Asset Management (ITAM)-related activities are assigned to designated personnel.
  7. AST-01_A07 personnel performing IT Asset Management (ITAM)-related activities have the skills and knowledge needed to perform their assigned duties.

Evidence Requirements

E-AST-01 IT Asset Management (ITAM)

Documented evidence of an IT Asset Management (ITAM) program that addresses the due diligence and due care activities associated with maintaining both secure and compliant systems, applications and services.

Asset Management

Technology Recommendations

Micro/Small

  • IT Asset Management (ITAM) program

Small

  • IT Asset Management (ITAM) program

Medium

  • IT Asset Management (ITAM) program
  • Configuration Management Database (CMDB)

Large

  • IT Asset Management (ITAM) program
  • Configuration Management Database (CMDB)

Enterprise

  • IT Asset Management (ITAM) program
  • Configuration Management Database (CMDB)

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.