Explain the security implications of proper hardware, software, and data asset management
You can’t protect what you don’t know about. Asset management is the foundation of every other security operation — vulnerability management, patching, incident response, and access control all depend on knowing what assets exist and their state.
Asset Inventory
Hardware Assets
- Servers, workstations, laptops, mobile devices, network equipment
- IoTInternet of Things — Connected devices (cameras, sensors, appliances) devices, printers, cameras, HVACHeating, Ventilation, and Air Conditioning — Environmental controls for data centers controllers
- Removable media, external drives, USBUniversal Serial Bus — Standard connector for peripherals devices
- Challenge: Shadow ITInformation Technology — Broad term for computing infrastructure and services — devices connected to the network without ITInformation Technology — Broad term for computing infrastructure and services knowledge
Software Assets
- Operating systems and versions, installed applications, libraries and dependencies
- Licensed vs. unlicensed software (compliance and legal risk)
- SaaSSoftware as a Service — Cloud: provider manages everything, you configure applications in use (sanctioned and unsanctioned)
Data Assets
- Databases, file shares, cloud storage, email archives
- Classified by sensitivity level (public, internal, confidential, restricted)
- Data owners assigned for each asset
Enumeration and Classification
- Automated discovery tools for network-connected assets
- CMDBConfiguration Management Database — Central repository of configuration items and relationships (Configuration Management Database) as the central record
- Each asset tagged with: owner, classification, location, criticality, lifecycle stage
Acquisition and Procurement
Secure Procurement
- Purchase from authorized/trusted vendors only
- Verify hardware integrity (tamper-evident packaging, supply chain verification)
- Evaluate software security before deployment (SCASoftware Composition Analysis — Identifying vulnerable third-party dependencies, vendor security assessment)
Standardization
- Approved hardware models and software versions reduce attack surface variety
- Standard builds/images ensure consistent security baselines
- Deviation from standards requires security review and approval
Assignment and Accounting
Ownership
Every asset must have an assigned owner responsible for its security.
- Hardware: assigned to individual users or departments
- Software: licensed and tracked
- Data: classified with a data owner who makes access decisions
Tracking
- Asset tags (physical and logical), serial numbers
- Check-in/check-out procedures for mobile and shared assets
- Geolocation tracking for mobile devices (MDMMobile Device Management — Centralized management of mobile devices)
Asset Type Taxonomy
| Type | Who Owns | Who Manages | Security Considerations |
|---|---|---|---|
| Company-owned | Organization | ITInformation Technology — Broad term for computing infrastructure and services/security team | Full control. Baseline, harden, encrypt, monitor, patch. |
| Leased | Lessor (vendor) | ITInformation Technology — Broad term for computing infrastructure and services manages during lease | Must return in agreed condition. Data sanitization before return is critical — don’t send back a laptop with company data. |
| BYODBring Your Own Device — Employee uses personal device for work (Bring Your Own Device) | Employee | Partial (MDMMobile Device Management — Centralized management of mobile devices container) | Limited control. Containerize corporate data. Can’t enforce full-disk encryption on personal device. Remote wipe limited to corporate container. |
| COPECorporate-Owned, Personally Enabled — Company device with permitted personal use (Corporate Owned, Personally Enabled) | Organization | ITInformation Technology — Broad term for computing infrastructure and services (MDMMobile Device Management — Centralized management of mobile devices) | Full control with personal use allowed. Best balance of security and employee satisfaction. |
Change of Custody Procedures
When an asset changes hands (reassignment, repair, decommission):
- Document the transfer: Who had it, who receives it, when, why
- Data handling: Wipe/sanitize before reassignment. User profiles from previous assignee must not be accessible.
- Access revocation: Remove previous user’s credentials, accounts, certificates from the device
- Inventory update: CMDBConfiguration Management Database — Central repository of configuration items and relationships reflects the new custodian immediately
- Condition assessment: Document the state of the asset at transfer (damage, wear, configuration)
- Chain of custody for evidence: If the device is relevant to an investigation, full forensic chain of custody applies (see 4.8)
Data Retention
Retention Policies by Regulation
| Regulation/Standard | Retention Period | What’s Retained |
|---|---|---|
| PCI-DSSPayment Card Industry Data Security Standard — Credit card data protection standard | 1 year minimum (audit logs) | Cardholder data environment logs, access records |
| SOXSarbanes-Oxley Act — US financial reporting controls law | 7 years | Financial records, audit workpapers, communications related to financial reporting |
| HIPAAHealth Insurance Portability and Accountability Act — US healthcare data protection law | 6 years | PHIProtected Health Information — Health-related PII under HIPAA documentation, policies, risk assessments, training records |
| GDPRGeneral Data Protection Regulation — EU data privacy regulation | No longer than necessary (purpose limitation) | Personal data — must delete when purpose is fulfilled |
| FERPAFamily Educational Rights and Privacy Act — US student data privacy law | Varies by record type | Student education records — permanent for some, 5 years for others |
| SEC Rule 17a-4 | 6 years (first 2 accessible) | Broker-dealer communications, trade records |
Key Retention Concepts
- Minimum retention: Hold at least this long (regulatory requirement)
- Maximum retention: Delete after this point (GDPRGeneral Data Protection Regulation — EU data privacy regulation storage limitation, litigation risk from holding data too long)
- Legal hold overrides: Retention schedules are suspended for data subject to litigation hold (see 4.8)
- Backup retention: Applies to backups too — a backup containing data past its retention period is a compliance violation
- Destruction verification: When retention expires, confirm data was actually destroyed across all copies including backups
Monitoring
Usage Monitoring
- Software license compliance (overuse = legal risk, underuse = waste)
- Hardware utilization (underutilized assets may be candidates for decommission)
- Data access patterns (who’s accessing what, when)
State Monitoring
- Patch level and vulnerability status
- Configuration drift from baseline
- End-of-life/end-of-support status tracking
Media Sanitization
When storage media is reused, donated, or disposed of, data must be irrecoverably removed.
Methods (in order of increasing assurance)
- Clear: Overwriting with zeros/patterns. Protects against basic recovery tools. Sufficient for internal reuse.
- Purge: More thorough — cryptographic erase, block erase (SSDSolid State Drive — Flash-based storage (no moving parts)), or degaussing (magnetic media). Protects against laboratory recovery. Suitable for leaving organizational control.
- Destroy: Physical destruction — shredding, incineration, disintegration, melting. Highest assurance. Required for highest-sensitivity data.
Documentation and Standards
- Certificate of sanitization/destruction for compliance audits
- Chain of custody maintained until destruction is confirmed
- NISTNational Institute of Standards and Technology — US standards body, publishes CSF and SP 800 series SP 800-88 (Guidelines for Media Sanitization): The authoritative standard for media sanitization
- Defines Clear, Purge, and Destroy categories (see above)
- Decision flow based on data sensitivity and media reuse intent
- Requires verification after sanitization (attempt to read the media to confirm data is irrecoverable)
- Specifies that sanitization methods vary by media type — what works for HDDHard Disk Drive — Magnetic spinning disk storage doesn’t work for SSDSolid State Drive — Flash-based storage (no moving parts)
- Exam tip: If a question asks about the standard for secure media disposal, the answer is NISTNational Institute of Standards and Technology — US standards body, publishes CSF and SP 800 series 800-88
SSD Considerations
Traditional overwriting doesn’t reliably work on SSDs due to wear leveling. Use:
- Manufacturer’s secure erase command
- Cryptographic erase (destroy the encryption key)
- Physical destruction for highest assurance
Asset Disposal and Decommissioning
- Remove from network and all management systems
- Revoke all access credentials and certificates
- Sanitize or destroy storage media
- Update asset inventory and CMDBConfiguration Management Database — Central repository of configuration items and relationships
- Return leased equipment according to vendor procedures
- Risk: Forgotten assets that are decommissioned from use but not from the network continue to run unpatched
Offensive Context
Asset inventory gaps are attacker opportunity. Unmanaged devices don’t get patched, monitored, or hardened. Shadow ITInformation Technology — Broad term for computing infrastructure and services creates unmonitored attack surface. Improper media disposal has led to high-profile data breaches — hard drives from decommissioned servers appearing on eBay with recoverable data. An attacker performing reconnaissance is building their own version of your asset inventory — and they’re often more thorough than the organization’s.