What is an asset inventory?
An asset inventory is a list of important systems, devices, applications, accounts, services, and data locations used by the business.
Simple example
A business keeps a list of laptops, servers, cloud services, email accounts, and key software subscriptions.
Why it matters
You cannot protect or recover what you do not know exists.
Common warning signs
- The activity is unexpected or unusual for the business context.
- The request or system behaviour creates pressure to act quickly.
- Normal approval, verification, or security processes are bypassed.
- There are signs of unauthorised access, data exposure, or system change.
- Staff are unsure whether the request, message, or system behaviour is legitimate.
Cyber Doc view
This term should be understood in business context, not only as a technical issue. Good protection usually combines clear processes, appropriate technical controls, staff awareness, and a calm response plan.
What to do
Proactive steps
- Keep a simple list of devices, systems, accounts, and owners.
- Update it when staff or systems change.
- Include cloud services and third-party platforms.
- Mark critical assets clearly.
- Review it during security and insurance assessments.
Reactive steps
- Use the inventory to identify affected systems during an incident.
- Update missing or outdated entries discovered during response.
- Check related assets for signs of compromise.
- Prioritise recovery based on business criticality.
- Use gaps to improve future preparedness.
Related terms
- Attack surface
- Security operations
- Risk