Summary
In summary, having a good asset inventory is critical in building your security program. It is usually step 1 in frameworks, but in reality, it becomes an afterthought. Whether you use a tool such as Jira, ManageEngine, ServiceNow, or even a simple spreadsheet, you need to maintain an asset inventory. As part of establishing an asset inventory, a change management plan and processes should be used, as well as developing a configuration baseline.
In the next chapter, we will be covering data protection. The most important action every CISO must take is to encrypt your company’s data, whether in transit or at rest.