Purpose: Maintain a comprehensive inventory of your organization's technology assets, including their relationships to Crown Jewels, risks, vendors, and business functions.
How Systems & Applications Are Created: Systems and applications are populated through multiple sources to ensure comprehensive coverage:
- Automatic Creation via Crown Jewel Analysis: When you complete the Crown Jewel Analysis and map crown jewel categories to specific IT systems, the platform automatically creates corresponding asset records. This ensures critical business assets are immediately captured and prioritized.
- Manual Asset Addition: Add additional systems and applications that may not have been identified during Crown Jewel mapping but are important for comprehensive risk management.
- Integration Discovery: Connected systems (cloud platforms, asset management systems, etc.) may automatically discover and add additional assets for inclusion.
Asset Information Management:
General Information:
- Asset Name: Clear identification of the system or application
- Asset Type: Classification such as Application, Infrastructure, Database, etc.
- Departments: Business units that use or depend on the asset
- Criticality: Formal classification (Critical, High, Medium, Low)
Crown Jewel Relationships:
- Crown Jewel Assignment: Direct connection to your prioritized crown jewel categories
Responsible Parties:
- Business Owner: Stakeholder responsible for business decisions regarding the asset
- IT Owner: Technical leader responsible for asset management and maintenance
- Security Owner: Security team member responsible for asset protection and compliance
Vendor and Third-Party Information:
- Primary Vendor/Manufacturer: Organization that provides or supports the asset
- Third-Party Dependencies: Additional vendors or services required for asset operation
Additional Information:
- Asset Location: Physical and logical location information
- Network Connectivity: Network access requirements and restrictions
- Compliance Requirements: Regulatory or framework obligations specific to the asset
- Technical Specifications: Relevant technical details for risk assessment
Asset-to-Vendor Mapping: The platform enables comprehensive tracking of vendor relationships through asset mapping:
- Primary Support Relationships: Identify which vendors provide direct support for each asset
- Dependency Mapping: Understand complex vendor ecosystems supporting critical systems
- Risk Correlation: Connect vendor risk assessments to specific asset vulnerabilities
- Crown Jewel Protection: Prioritize vendor management efforts based on crown jewel relationships
Business Value: Systems & Applications management provides centralized asset visibility for risk assessment, clear accountability through ownership assignments, prioritized protection based on crown jewel relationships, and comprehensive vendor risk management through asset mapping.
Screenshot needed: Systems & Applications asset detail interface showing ownership, crown jewel assignments, and vendor relationships
