← Back to Learn Centre

What is an asset inventory?

An asset inventory is a list of important systems, devices, applications, accounts, services, and data locations used by the business.

Simple example

A business keeps a list of laptops, servers, cloud services, email accounts, and key software subscriptions.

Why it matters

You cannot protect or recover what you do not know exists.

Common warning signs

  • The activity is unexpected or unusual for the business context.
  • The request or system behaviour creates pressure to act quickly.
  • Normal approval, verification, or security processes are bypassed.
  • There are signs of unauthorised access, data exposure, or system change.
  • Staff are unsure whether the request, message, or system behaviour is legitimate.

Cyber Doc view

This term should be understood in business context, not only as a technical issue. Good protection usually combines clear processes, appropriate technical controls, staff awareness, and a calm response plan.

What to do

Proactive steps

  • Keep a simple list of devices, systems, accounts, and owners.
  • Update it when staff or systems change.
  • Include cloud services and third-party platforms.
  • Mark critical assets clearly.
  • Review it during security and insurance assessments.

Reactive steps

  • Use the inventory to identify affected systems during an incident.
  • Update missing or outdated entries discovered during response.
  • Check related assets for signs of compromise.
  • Prioritise recovery based on business criticality.
  • Use gaps to improve future preparedness.

Related terms

  • Attack surface
  • Security operations
  • Risk