Skip main navigation

New offer! Get 30% off one whole year of Unlimited learning. Subscribe for just £249.99 £174.99. New subscribers only. T&Cs apply

Find out more

Asset Management and Final Thoughts

Asset management refers to the management of physical, online, and virtual assets which need to be carefully addressed.
Businesspeople in discussion over data in the form of a graph on a device.
Asset management can refer to the management of a physical asset, such as a physical server room, an online service, such as cloud services, or something virtual, such as system configuration. Online services and virtualization add a significant layer of complexity to asset management. This is because it is difficult to log and manage non-physical items.

To help with this, you can use asset registers for both physical and non-physical assets. An important consideration is to prioritize what is of the most value and implement different levels of protection accordingly. How this is decided will relate to the risk level, which is why it is so important to conduct a risk assessment. Remember, a risk assessment will entail looking at understanding what threats might arise, the likelihood of them arising, the impact of the threat is materialized, and any vulnerabilities that apply to the system. Ultimately, it is important to establish the value of all your assets and then how to protect them.

All assets should be logged and managed through a change management system and consider any configuration management necessary. Configuration management can extend into change management processes when we consider certain aspects of an asset, such as the server name, its ID, and which UPS it is connected to. This will help to trace and manage interdependencies between different systems.

Let’s wrap up what you have learned!

  • Effective identity and access management is evolving to meet the changing landscape and environment

  • The security environment relating to the threats, client technology, cloud services, and mobile computing is evolving

  • Changing cultures are blurring boundaries between corporate, government, and personal identities and devices

This article is from the free online

Cyber Security Foundations: Reinforcing Identity and Access Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now