Purpose
To identify organizational assets and define appropriate protection responsibilities to ensure they receive an appropriate level of protection.
Implementation Guidance
Maintain a comprehensive inventory of all information assets
Document asset owners and custodians for each asset
Classify assets according to their importance and sensitivity
Review and update the asset inventory regularly
Include hardware, software, data, services, and documentation in the inventory
Recommended Tools
ManageEngine Desktop Central
Comprehensive endpoint management with free tier. Great for Windows-heavy environments.
JumpCloud
Cloud directory platform combining SSO, MDM, and user management. Great all-in-one solution for startups.
Microsoft Intune
Cloud-based endpoint management from Microsoft. Integrates seamlessly with Microsoft 365.
Jamf
ISO 27001 Services from the Directory
These providers can help you implement A.5.9 and achieve ISO 27001 certification.

Advisera
Provider of ISO 27001 documentation, training, and consultancy services to help businesses achieve compliance.

Anecdotes
Enterprise agentic GRC platform with 230+ integrations and 40+ pre-mapped frameworks for Fortune 500 compliance programs.

Arrow Cyber Advisors
Arrow Cyber Advisors enables organizations to build measurable cybersecurity maturity and resilience. We specialize in governance, risk and compliance advisory, providing clear security direction, maturity benchmarking, and execution support tailored to regulated and high-risk environments.

Atoro
Atoro offers specialized ISO 27001 certification services for SaaS companies, simplifying compliance with expert tools.
Related Controls
Other controls in Organizational Controls


