Today, I am continuing on with applying my NIST and ISO learnings into practical labs.
I will share my completed assignments in a stand-alone portfolio page.
Today’s assignment falls under NIST’s Identify function, where I build an Asset Inventory for the fictional company CyberSolutions.
Through this exercise I have learnt to practically identify an organisation’s assets, ranging from a public-facing website to its internal messaging tool (i.e. MS Teams)
One area I want to delve deeper on is the weighting given to the asset’s organizational importance outside of highly sensitive confidential information.
Based on my research the importance is based on the following:
The above questions were helpful in sifting between an organization’s assets and critical assets, below is my completed asset inventory.
| Asset Name | Category | Description | Impact Level | Responsible Team |
|---|---|---|---|---|
| Customer Financial Records | Data | CyberSolutions' database for customer financial records | High | IT Security |
| Employee Payroll Information | Application | CyberSolutions database for employee payroll | High | HR |
| Archived Customer Support Data | Data | Customer Support Historial data | High | IT Security |
| Internal Financial Reports | Data | Internal Financial Reports | High | IT Security |
| Customer Relationship Management (CRM) Database | Data | CRM Database | High | IT Security |
| Customer Support Knowledge Base | Data | Knowledge Base Data | Medium | IT Security |
| Internal HR System | Application | Employee Records Database | High | HR |
| Document Management System for Sensitive Files | Application | Sensitive Files Database | High | IT Security |
| Office Communication Chat Tool | Application | Company-wide internal instant messaging | High | IT Security |
| Internal Email System | Application | Company-wide internal communications tool | High | IT Security |
| Anti-Virus Software | Security Tool | Anti-Virus Security Tool | High | IT Security |
| Network Firewall | Security Tool | Internal Network Barrier | High | IT Security |