AST-03: Asset Ownership Assignment
Mechanisms exist to ensure asset ownership responsibilities are assigned, tracked and managed at a team, individual, or responsible organization level to establish a common understanding of requirements for asset protection.
Control Question: Does the organization ensure asset ownership responsibilities are assigned, tracked and managed at a team, individual, or responsible organization level to establish a common understanding of requirements for asset protection?
General (24)
| Framework | Mapping Values |
|---|---|
| COBIT 2019 | APO01.06 |
| ISO 27002 2022 | 5.9 |
| ISO 27017 2015 | 8.1.2 |
| NIST Privacy Framework 1.0 | ID.IM-P2 |
| NIST 800-53 R5 (source) | SA-4(12) |
| NIST 800-53 R5 (NOC) (source) | SA-4(12) |
| NIST 800-82 R3 LOW OT Overlay | SA-4(12) |
| NIST 800-82 R3 MODERATE OT Overlay | SA-4(12) |
| NIST 800-82 R3 HIGH OT Overlay | SA-4(12) |
| NIST 800-171 R3 (source) | 03.09.02.a.03 |
| NIST CSF 2.0 (source) | ID.AM |
| PCI DSS 4.0.1 (source) | 2.2.2 2.2.4 2.2.5 6.5.2 |
| PCI DSS 4.0.1 SAQ A (source) | 2.2.2 |
| PCI DSS 4.0.1 SAQ A-EP (source) | 2.2.2 2.2.4 2.2.5 6.5.2 |
| PCI DSS 4.0.1 SAQ B-IP (source) | 2.2.2 |
| PCI DSS 4.0.1 SAQ C (source) | 2.2.2 2.2.4 2.2.5 6.5.2 |
| PCI DSS 4.0.1 SAQ C-VT (source) | 2.2.2 2.2.4 2.2.5 |
| PCI DSS 4.0.1 SAQ D Merchant (source) | 2.2.2 2.2.4 2.2.5 6.5.2 |
| PCI DSS 4.0.1 SAQ D Service Provider (source) | 2.2.2 2.2.4 2.2.5 6.5.2 |
| TISAX ISA 6 | 1.3.1 |
| SCF CORE Mergers, Acquisitions & Divestitures (MA&D) | AST-03 |
| SCF CORE ESP Level 1 Foundational | AST-03 |
| SCF CORE ESP Level 2 Critical Infrastructure | AST-03 |
| SCF CORE ESP Level 3 Advanced Threats | AST-03 |
US (5)
| Framework | Mapping Values |
|---|---|
| US CERT RMM 1.2 | ADM:SG1.SP3 |
| US HIPAA Administrative Simplification 2013 (source) | 164.310(d)(2)(iii) |
| US HIPAA Security Rule / NIST SP 800-66 R2 (source) | 164.310(d)(2)(iii) |
| US IRS 1075 | SA-4(12) |
| US TSA / DHS 1580/82-2022-01 | III.A |
EMEA (4)
| Framework | Mapping Values |
|---|---|
| EMEA Austria | Sec 14 Sec 15 |
| EMEA Belgium | 16 |
| EMEA Saudi Arabia CSCC-1 2019 | 2-1-1-2 |
| EMEA UK CAF 4.0 | A3.a (point 4) |
APAC (3)
| Framework | Mapping Values |
|---|---|
| APAC Australia ISM June 2024 | ISM-1071 |
| APAC India SEBI CSCRF | GV.PO.S5 |
| APAC Japan ISMAP | 8.1.2 8.1.2.7.PB |
Americas (1)
| Framework | Mapping Values |
|---|---|
| Americas Canada ITSP-10-171 | 03.09.02.A.03 |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to ensure asset ownership responsibilities are assigned, tracked and managed at a team, individual, or responsible organization level to establish a common understanding of requirements for asset protection.
Level 1 — Performed Informally
Asset Management (AST) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Enhanced security requirements for unattended systems (e.g., kiosks, ATMs, etc.) and point of sale devices. o Media handling requirements for users. o Requirements for approving assets from entering or existing facilities. o Requirements for users to dispose of, destroy or repurpose system components when it is no longer needed for business or legal reasons. o Requirements for users to secure laptops while traveling. o Software licensing restrictions for users, as part of acceptable and unacceptable behaviors. o Use of personal devices (e.g., Bring Your Own Device (BYOD), as part of acceptable and unacceptable behaviors. o Use of third-party devices, as part of acceptable and unacceptable behaviors.
- Asset management is informally assigned as an additional duty to existing IT/cybersecurity personnel.
- Asset inventories are performed in an ad hoc manner.
- Software licensing is tracked as part of IT asset inventories.
- Data process owners maintain limited network diagrams to document the flow of sensitive/regulated data that is specific to their initiative.
- IT personnel work with data/process owners to help ensure secure practices are implemented throughout the System Development Lifecycle (SDLC) for all high-value projects.
- Inventory of physical technology assets are assigned to individual users or teams and covers common devices (e.g., laptops, workstations and servers).
- Organizational policies and standards cover:
Level 2 — Planned & Tracked
Asset Management (AST) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Asset management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
- IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for asset management.
- Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed.
- Asset management is formally assigned as an additional duty to existing IT/cybersecurity personnel.
- Technology assets are categorized according to data classification and business criticality.
- Inventories cover technology assets in scope for statutory, regulatory and/ or contractual compliance, which includes both physical and virtual assets.
- Software licensing is tracked as part of IT asset inventories.
- Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
- IT/cybersecurity personnel maintain network diagrams to document the flow of sensitive/regulated data across the network.
- Data/process owners for business-critical assets are documented and are reviewed as part of the annual asset inventories.
Level 3 — Well Defined
Asset Management (AST) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- An IT Asset Management (ITAM) function, or similar function, governs asset management to help ensure compliance with requirements for asset management.
- An ITAM function, or similar function, maintains an inventory of IT assets, covering both physical and virtual assets, as well as centrally managed asset ownership assignments.
- Technology assets and data are categorized according to data classification and business criticality criteria.
- A Cybersecurity Supply Chain Risk Management (C-SCRM) function oversees supply chain risks including the removal and prevention of certain technology services and/ or equipment designated as supply chain threats by a statutory or regulatory body.
- Data/process owners document where sensitive/regulated data is stored, transmitted and processed, generating Data Flow Diagrams (DFDs) and network diagrams to document the flow of data.
- Stakeholders leverage ITAM tools to create and maintain an inventory of systems, applications and services, that need to adhere to statutory, regulatory and/ or contractual requirements, with sufficient detail to determine control applicability.
- Users are educated on their responsibilities to protect technology assets assigned to them or under their supervision.
- Data/process owners for business-critical assets are documented and are reviewed as part of the annual asset inventories.
Level 4 — Quantitatively Controlled
Asset Management (AST) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement.
- Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
- Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
- Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
- Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
- Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
- Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving
Asset Management (AST) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
- Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.
Assessment Objectives
- AST-03_A01 name, position and/or role of data ownership is documented.
Evidence Requirements
- E-AST-01 IT Asset Management (ITAM)
-
Documented evidence of an IT Asset Management (ITAM) program that addresses the due diligence and due care activities associated with maintaining both secure and compliant systems, applications and services.
Asset Management - E-CPL-03 Controls Responsibility Matrix (CRM)
-
Documented evidence of a Controls Responsibility Matrix (CRM), or similar documentation, that identifies the stakeholder involved in executing assigned controls (e.g., Responsible, Accountable, Supportive, Consulted & Informed (RASCI) matrix).
Compliance
Technology Recommendations
Micro/Small
- IT Asset Management (ITAM) program
- Configuration Management Database (CMDB)
Small
- IT Asset Management (ITAM) program
- Configuration Management Database (CMDB)
Medium
- IT Asset Management (ITAM) program
- Configuration Management Database (CMDB)
Large
- IT Asset Management (ITAM) program
- Configuration Management Database (CMDB)
Enterprise
- IT Asset Management (ITAM) program
- Configuration Management Database (CMDB)