DE.AE-07.304
Does your organization have a process to securely share asset inventory information with security detection systems and personnel?
Explanation
This question assesses whether your organization has established secure methods to provide asset inventory data to security monitoring tools, detection systems, and security personnel. Effective security monitoring requires visibility into what assets exist in your environment so that detection technologies can properly identify anomalies, unauthorized assets, or potential security incidents involving known assets. Evidence could include documentation of integration between asset management systems and security tools (such as SIEM, EDR, or vulnerability scanners), access control policies for asset inventory data, or procedures for securely sharing asset information with security personnel during incident response.
Implementation Example
Securely provide information from asset inventories to detection technologies, processes, and personnel
ID: DE.AE-07.304
Context
- Function
- DE: DETECT
- Category
- DE.AE: Adverse Event Analysis
- Sub-Category
- Cyber threat intelligence and other contextual information are integrated into the analysis

