Information Asset Identification — Standard Definition
Information Asset Identification — Standard Definition
Status: Draft v0.2.12 | Author: Security Director | Date: 2026-02-25
Applicable Standard: ISO/IEC 27002:2022 Control 5.9
1. Purpose
This document defines the criteria for identifying information assets at Cybercraft. It establishes consistent and verifiable criteria for determining what to register in the Asset Register and what not to register.
By referencing this document, any person or AI making a determination should arrive at the same classification result.
2. Normative References
This document is based on the following standards and documents:
| Reference Document | Relevant Clause | Description |
|---|---|---|
| ISO/IEC 27001:2022 | Annex A 5.9 | Inventory of information and other associated assets |
| ISO/IEC 27002:2022 | Control 5.9 | Implementation guidance for asset identification, classification, ownership assignment, and component documentation |
| ISO/IEC 27001:2022 | Annex A 5.10 | Acceptable use of information and other associated assets |
| ISO/IEC 27001:2022 | Annex A 5.11 | Return of assets |
| ISO/IEC 27001:2022 | Annex A 5.12 | Classification of information |
| Cybercraft | ISMS-POL-ASM-01 | Asset Management & Information Classification Policy |
2.1. ISO 27001:2022 Annex A 5.9 — Standard Text
"An inventory of information and other associated assets, including owners, should be developed and maintained."
— ISO 27001:2022 Annex A 5.9
2.2. ISO 27002:2022 Control 5.9 — Key Implementation Guidance
Asset Identification and Documentation Requirements:
- Identify information and assets
- Determine the importance of information and assets
- Document and maintain accuracy, currency, and consistency
- Record the location of assets
- Classify assets
- Allocate ownership of assets
Component Documentation Requirements (2022 Revision Addition):
"Components that sustain technology assets are recorded and interrelated, including databases, storage, software components and sub-components."
— ISO 27002:2022 Control 5.9, Implementation Guidance
This clause is the normative basis for the Component and Resource concepts defined in this document.
Asset Inventory Record Items (ISO 27002:2022 5.9):
Separately from the asset types above, the standard requires the following to be recorded in the inventory for each asset: unique identifier, location, classification, owner, version (where applicable), and licence expiry date (where applicable). These are attributes of the asset, not examples of asset types.
Asset Types Defined by the Standard for Inventory Inclusion:
| ISO 27002:2022 Asset Type | Definition | Examples |
|---|---|---|
| Information | Data stored, processed, or transmitted by the organisation | Customer databases, financial records, source code, intellectual property |
| Software | Applications, system software, development tools | OS, business applications, development tools, middleware |
| Physical | Hardware, physical equipment | Servers, laptops, network equipment, removable media |
| Services | Cloud services, outsourced utilities | SaaS, PaaS, hosting, outsourced services |
ISO 27002:2022 defines the four types above, but does not provide detailed classification criteria for cloud/SaaS-centric environments. §5 (Asset Type Taxonomy) of this document is a specialisation of the ISO standard's four types, tailored to Cybercraft's operational environment. The mapping is as follows:
| Cybercraft Type | ISO 27002 Type | Notes |
|---|---|---|
| Service Environment | Services | SaaS tenant/org/account |
| Identity Platform | Services | Authentication-specific service environment |
| Cloud Infrastructure | Services | IaaS/PaaS subscription |
| Domain | Services | Domain registration service |
| License / Subscription | Software (intangible) | Intangible asset — subscription agreement |
| Physical Asset | Physical | Physical equipment |
| Information / Data | Information | Identifiable datasets requiring protection |
CIS Controls v8.1 separates asset identification into three Controls: Control 1 (Hardware — network scan-based discovery), Control 2 (Software — software inventory scan), and Control 16 (Application Software — authorised software list). These three Controls are discovery entry points, not classification categories — they define "how to find" rather than "what is an asset."
Cybercraft's Track A/B follows the same structure — two independent discovery lenses. CIS uses three because on-premises environments require different HW/SW discovery methods; Cybercraft uses two because a 100% cloud environment merges HW/SW under a contract/control lens. Coverage is equivalent; classification axes differ.
Shadow IT / unauthorised devices and apps fall under security monitoring, not asset identification, in both CIS and Cybercraft frameworks.
2.3. Asset Owner Responsibilities (ISO 27002:2022 Control 5.9)
Asset Owner responsibilities as defined by the standard:
- Ensure all data and related resources are registered and documented in the inventory
- Ensure all assets are correctly classified and protected
- Periodically review classifications to maintain accuracy
- Ensure components sustaining technology assets are recorded and interrelated
- Establish acceptable use requirements for assets (→ linked to A.5.10)
- Periodically review that access restrictions align with classification and remain effective
- Ensure assets are safely handled and removed from the inventory upon deletion or disposal
- Identify and manage risks associated with assets
- Support roles and responsibilities for personnel managing information
2.4. Information Classification Requirements (ISO 27001:2022 Annex A 5.12)
Each asset in the Asset Register must be classified according to the information classification scheme:
| Classification Level | Definition | Examples |
|---|---|---|
| Confidential | Disclosure would cause serious harm to the organisation. Access restriction required. | Customer data, credentials, financial systems |
| Internal | For internal use only. Not suitable for external disclosure. | Internal policies, employee information, infrastructure configurations |
| General | May be publicly disclosed. Impact of disclosure is minimal. | Public website content, marketing materials |
This classification scheme is implemented as the Classification property in the Asset Register.
3. Scope
- All information assets within the Cybercraft ISMS scope
- All items registered in the Information Asset Register (L1) and License Inventory (L2)
- Components and Resources documented in asset page bodies
Personally owned devices (BYOD), personal software, and personal hardware are not within the scope of this document or the Asset Register. Track A Q1 ("Did we contract, register, or create it?") → No → Not a Cybercraft asset.
- BYOD device management: Refer to BYOD Security Policy (ISMS-POL-BYOD-01) and Device Lifecycle Procedure (ISMS-PROC-BYOD-01). Device inventory is managed in Intune/Entra ID.
- Personal apps/software management: Refer to Application & Data Governance Policy (ISMS-POL-ADG-01).
- Detailed classification criteria: see §6.5.
3.1. Key Terms
Key concepts used from §4 onwards are defined here. For the full glossary, see Appendix A.
| Term | Definition | Layer |
|---|---|---|
| Technology Asset | A service environment, infrastructure, physical equipment, or domain that the organisation contracts, registers, or creates and over which it holds control | L1 — Asset Register |
| Information Asset | An identifiable dataset that requires protection, classification, and ownership assignment | L1 — Asset Register |
| License | A subscription agreement purchased to use a service (intangible asset) | L2 — License Inventory |
| Component | A feature or service provided within an asset. Cannot be independently terminated or controlled. | L3 — Asset page body |
| Resource | An individual instance created within a cloud subscription (legacy equivalent: "server") | L3 — Asset page body |
4. Core Principle
This document identifies assets through two tracks:
| Track | Target | Key Questions | Detail |
|---|---|---|---|
| Track A — Technology Assets | Service environments, identity platforms, cloud infrastructure, domains, physical equipment, licences | Did we contract it? → Do we control it? → Can it be independently terminated? | §4.1 |
| Track B — Information Assets | Logical datasets requiring protection | Is it identifiable? → Does it need classification? → Does it need separate protection? | §4.2 |
4.1. Track A — Technology Asset Identification: 3-Question Test
This principle is verified through the following questions:
- Did we create or contract it? (tenant, organisation, account, domain registration, subscription agreement)
- Do we control it? (we manage configuration, users, data, and access controls)
- Can it be independently terminated? (terminating it independently would stop only that service)
All three questions Yes → Register as an asset
The aircraft is owned by the airline, not the passenger. The passenger's assets are the seat ticket (licence) and the membership account (tenant/account). The product (platform) itself is the vendor's asset.
Asset Discovery Methodology
In Cybercraft's 100% cloud environment, the act of contracting/subscribing itself is the entry point for asset discovery. When adopting SaaS, the Entra ID Admin Consent Workflow serves as the approval and discovery channel. Technical network scanning (CIS Controls approach) is replaced by contract-based discovery in cloud environments.
- Track A: Subscription, contract, or account creation = asset discovery. Admin Consent Workflow = SaaS discovery channel.
- Track B: Identifying datasets requiring protection during business operations = discovery. Not technical scanning, but data classification activity.
- Separate SaaS Discovery procedure unnecessary: With user consent blocked and Admin Consent Workflow enabled, no new app can be registered in the tenant without administrator approval. Therefore, periodic discovery procedures are unnecessary; unauthorised app detection (Shadow IT) falls under security monitoring, not asset identification.
Detailed policy: Asset Management Policy (ISMS-POL-ASM-01) §4.3.
4.2. Track B — Information Asset Identification: 3-Question Test
Determined by different questions from technology assets:
- Is it an identifiable dataset? — A logical unit that can be named ("customer data", "financial data", "source code")
- Does it require Confidential or Internal classification? — Would disclosure or tampering cause harm to the organisation?
- Does it require separate ownership, access controls, and risk assessment? — Does it need a different level of protection from general business documents?
All three Yes → Register in Asset Register as Information type
Otherwise → Registration not required. It is ordinary content naturally residing in its storage location.
Registration Unit
On a customs declaration form, you write "diamond necklace", not "left pocket of the suitcase". The left pocket is what you write in the "storage location" field.
Likewise, what you register in the Asset Register is the logical dataset called "Customer Data".
- Not a folder (folder = storage path)
- Not a file (file = physical unit. Updating asset registration every time a file is added is file management, not asset management)
- Not a site/URL (site = storage = a resource of a technology asset)
Registration Example:
| Field | Value |
|---|---|
| Asset Name | Customer Data |
| Asset Type | Information / Data |
| Classification | Confidential |
| Owner | [Responsible person] |
| Storage Location (Source) | M365 → SharePoint → HR Portal site (cybercraft.sharepoint.com/sites/HR) |
| Access Path (Viewer) | Power BI → HR Dashboard (read-only visualisation) |
| Description | Customer contacts, contract history, service records, and other personally identifiable customer datasets |
In this example:
- "Customer Data" is the registration unit (logical dataset)
- SharePoint HR Portal site is the storage location (attribute)
- Power BI dashboard is the access path (attribute)
- Neither the SharePoint site, the Power BI dashboard, folders, nor files are registration units
Storage Location Recording Guide
The purpose of recording storage locations is twofold:
- Security purpose — "Who can access this data?" → access control boundary
- Operational purpose — "Where do we find this data?" → navigable path
ISO 27002:2022's requirement to "record the location of assets" encompasses both. A recorded location that cannot be used to find the data is meaningless.
| Storage Type | Access Control Boundary | Navigation Path Required? | Recording Example |
|---|---|---|---|
| SharePoint (simple site) | Site (site-level members and permission groups) | Site = navigation unit → Not required | M365 → SharePoint → HR Portal (cybercraft.sharepoint.com/sites/HR) |
| SharePoint (Teams channel-based) | Site URL (general/individual channel) or separate site for Private channels | Channel folder path required | M365 → SharePoint → CYB Team → /ChannelA/ClientData/ or Private channel: separate site URL |
| OneDrive | User account (default: owner-only access) | Always required — account alone cannot identify data | M365 → OneDrive (Lucas) → /Projects/ClientData/ |
| Azure Blob | Container (container-level SAS and access policies) | Required if path structure is complex | Azure → cybstorage01 / client-documents or → /2026/invoices/ |
| Database (SQL, etc.) | DB instance / schema (DB-level permissions) | Required if many tables/schemas | Azure → cyb-sql-01 / CustomerDB or → dbo.Customers |
| Azure Web App | App instance (authentication and network rules) | Usually a viewer — not the source | Record in the Access Path (Viewer) field: Azure → hr.cybercraft.net |
| SaaS internal storage | SaaS itself (tenant-level access control) | Specific area must be noted | Dashlane → Shared Vault or DocuSign → Completed Agreements |
Yes → Recording the access control boundary alone is sufficient.
No → A navigation path must also be recorded (mandatory).
There is no need to memorise different rules for each storage type. This single question applies uniformly to all cases.
Distinguishing Source and Viewer
Where data is stored and where data is displayed are different:
| Distinction | Source | Viewer / Interface |
|---|---|---|
| Definition | Where data is actually stored and maintained | Interface for reading or visualising data |
| Recording Field | Storage Location (primary) | Access Path (secondary) |
| Examples | SharePoint List, SQL Database, Azure Blob | Power BI dashboard, web app interface, Notion Linked View |
Recording Rules:
- Storage Location = Record only the source. Where the data actually exists.
- Access Path = Record if a viewer exists. Optional, but useful for understanding who accesses data via which path.
- If the viewer is within the same system as the source (e.g., a different view of a SharePoint list), separate recording is unnecessary.
- If the viewer is in a different system (e.g., SQL DB → Power BI), record it as an access path.
Decision Examples:
| Scenario | Storage Location (Source) | Access Path (Viewer) |
|---|---|---|
| Customer data in SharePoint List, visualised via Power BI | M365 → SharePoint → HR Portal | Power BI → HR Dashboard |
| Financial data in SQL DB, queried via web app | Azure → cyb-sql-01 / FinanceDB | Azure → finance.cybercraft.net |
| Contracts in SharePoint document library | M365 → SharePoint → Legal Site | No separate viewer — recording unnecessary |
| HR files in OneDrive, shared via Teams link | M365 → OneDrive (HR Manager) → /Personnel/ | Teams shared link — a sharing method, not an access path. Recording unnecessary. |
What Not to Register — General Data
All data belongs to the organisation, but most general business data fails at questions 2 and 3 of the 3-Question test:
- Team meeting notes, internal announcements, project schedules, general business documents → no serious harm from disclosure → registration not required
- Test/dummy data (even if in customer data format, no actual customers) → no harm from disclosure → registration not required
- Public website content → already public information → registration not required
Only datasets classified as Confidential or Internal that require separate protection are registration targets.
Storage-Specific Application Rules — Resolving SharePoint Ambiguity
SharePoint sites appear to play different roles depending on context, but the definition is singular:
SharePoint site = A resource (storage) of the M365 Subscription. It is not an asset in itself.
If it contains data requiring protection → that data is a separate information asset.
| Scenario | SharePoint Site | Information Asset Registration? | Recording Method |
|---|---|---|---|
| General team documents site | Resource (L3) | ❌ Not required | Record in the M365 asset page as a site listing |
| Site containing customer data | Resource (L3) | ✅ Register "Customer Data" as an Information asset | Mark "⚠️ Contains Confidential information asset" on M365 page + record storage location on information asset page |
| Site containing financial data | Resource (L3) | ✅ Register "Financial Data" as an Information asset | Same pattern |
| Intranet (general announcements) | Resource (L3) | ❌ Not required | Record in the M365 asset page as a site listing |
The same principle applies uniformly to all storage types ("if it contains data requiring protection" = when 3-Question is satisfied):
| Storage | Parent Asset | No data requiring protection | Data requiring protection present |
|---|---|---|---|
| SharePoint site | M365 Subscription | Record in resource list | Register as information asset separately + cross-reference |
| OneDrive | M365 Subscription | Component — recording not even required | Register as information asset separately + cross-reference |
| Azure Web App | Azure Subscription | Record in resource list | Register as information asset separately + cross-reference |
| Azure Blob Storage | Azure Subscription | Record in resource list | Register as information asset separately + cross-reference |
5. Asset Type Taxonomy
The four standard types from ISO 27002:2022 Control 5.9 (see §2.2), specialised for the Cybercraft operational environment:
| Asset Type | Definition | Registration Location | Examples |
|---|---|---|---|
| Service Environment | Cloud service environment (tenant / org / account / workspace) that we create and control | Asset Register | Cybercraft M365 Subscription, Dashlane, AFI Backup |
| Identity Platform | Authentication/identity environment that we create and control | Asset Register | Cybercraft Entra ID Tenant |
| Cloud Infrastructure | Cloud infrastructure subscription that we contract and control | Asset Register | Cybercraft Azure Subscription |
| Domain | Domain that we purchase and register | Asset Register | cybercraft.net |
| License / Subscription | Subscription agreement purchased to use a service environment (intangible asset) | License Inventory | M365 Business Premium × 5, Dashlane Business × 6 |
| Physical Asset | Physical equipment that we own or lease | Asset Register | Servers, network equipment, etc. |
| Information / Data | Identifiable information datasets that we create or hold and that require separate protection, classification, and ownership assignment. Distinguished from storage locations (SharePoint, OneDrive, etc.) — see §4.2. | Asset Register | Customer DB, financial data, source code, HR records |
Asset Type — Layer Relationship Diagram
The diagram below shows how §5 asset types connect to the layer structure (§8) and how they are distinguished from §6 components and resources.
graph TB
subgraph L1["L1 — Asset Register"]
TA["Technology Assets Track A<br>Service Env · Identity<br>Cloud · Domain · Physical"]
IA["Information Assets Track B<br>Information / Data"]
end
subgraph L2["L2 — License Inventory"]
LI["License / Subscription"]
end
subgraph L3["L3 — Asset Page Body"]
CO["Component<br>Independent termination ✗"]
RE["Resource<br>Instance within subscription"]
end
TA -->|"Usage basis"| LI
TA -->|"Internal feature"| CO
TA -->|"Internal instance"| RE
RE -.->|"If containing data<br>requiring protection<br>→ Register separately via Track B"| IA6. What Not to Register
6.1. Components
- Does not require separate risk assessment, ownership, or classification
- Documented in the asset page body as "recorded and interrelated" (ISO 27002:2022 5.9 requirement)
- Examples: Exchange Online, SharePoint, Teams, OneDrive, Intune, Defender within an M365 Subscription
6.2. Resources
- Individual instances created and deleted within a cloud subscription (asset)
- Not a separate subscription/contract, but provisioned within an existing subscription
- Documented as a resource list in the asset page body
- Examples: Azure Static Web App instance (xxx.azurestaticapps.net) within an Azure Subscription
6.3. Distinguishing Storage and Information Assets
People tend to think "there's customer data in SharePoint, so the SharePoint site is an information asset." This is the same logical error as "there's cash in the safe, so the safe is cash."
Principle:
Storage = A component or resource of a technology asset. The container for data.
Information Asset = The dataset inside the container that requires protection.
These two are entirely different layers:
| Distinction | Storage | Information Asset |
|---|---|---|
| Identity | Component or resource of a technology asset | ISO 27002 Information-type asset |
| Registration Location | Parent technology asset page body (L3) | Asset Register (L1) |
| Examples | SharePoint site, OneDrive, Azure Blob, S3 Bucket | Customer DB, financial records, HR records, source code |
| Decision Question | "Is this a space that holds data?" | "Is this a dataset requiring protection and classification?" |
The cargo hold (SharePoint, OneDrive) inside the aircraft is not the passenger's asset. All luggage in the cargo hold belongs to the passenger, but not all of it requires a customs declaration.
- Cargo hold = storage (component). A feature included in the aircraft (service environment).
- All luggage = the passenger's data. From ordinary clothing bags (team meeting notes, general documents) to valuable jewellery (customer data, financial data).
- Customs declaration target (Asset Register registration) = valuable jewellery only. That is, only datasets requiring protection are registered.
- Ordinary clothing bags (team meeting notes, internal announcements, etc.) belong to the passenger but are not customs declaration targets.
- Even with 10 cargo holds, if there's no valuable jewellery, there's nothing to declare.
- Cargo holds containing valuable jewellery should be marked "valuables inside."
All data belongs to the organisation (is an asset), but only datasets requiring protection are registered in the Asset Register. General business data (General classification) belongs to the organisation but does not require separate risk assessment, ownership assignment, or access controls, so it is not registered.
Detailed rules for information asset registration units, storage location recording criteria, and registration decisions are covered in §4.2.
6.4. DNS Mappings / Subdomains
- A configuration element of the primary domain (asset)
- it-doc.cybercraft.net = CNAME record of cybercraft.net (asset) → mapped to Azure Static Web App (resource)
- Cross-reference must be recorded on both the domain asset page and the cloud infrastructure asset page
6.5. BYOD Devices / Personal Software / Personal Hardware
Track A Application:
- Q1: "Did we (Cybercraft) contract, register, or create it?" → No → Not an asset
- Personally owned; therefore not an organisational asset
However, they are management targets:
- BYOD devices are endpoints that access corporate data, making them subject to access control and security policies (ISO 27001 A.8.1)
- Device inventory is managed in Intune (macOS ADUE) / Entra ID Registered Devices + APP reports (Windows MAM-only)
- Management purposes: compliance monitoring, selective wipe during offboarding, audit evidence, stale device cleanup
- Detailed procedure: Device Lifecycle Procedure (ISMS-PROC-BYOD-01) §6
Personal Software:
- Discoverable via Intune Discovered Apps, etc., but not a Cybercraft asset
- Unauthorised app use is addressed in the Application & Data Governance Policy (ISMS-POL-ADG-01)
- This is security policy enforcement, not asset management
7. Decision Flowchart
When a new item is identified, apply the Track A (Technology Assets) or Track B (Information Assets) decision flow depending on the nature of the item:
flowchart TD
A["New item identified"] --> T{"Nature of the item?"}
T -- "Service, infrastructure,\nequipment, domain" --> A1
T -- "Dataset" --> B1
A1{"Track A Q1:<br>Did we contract, register,<br>or create it?"} -- No --> ZA["Not an asset<br>(Vendor/third-party owned)"]
A1 -- Yes --> A2{"Track A Q2:<br>Do we control it?"}
A2 -- No --> ZA
A2 -- Yes --> A3{"Track A Q3:<br>Can it be independently<br>terminated?"}
A3 -- No --> EA["Component/Resource<br>→ Asset page body (L3)"]
A3 -- Yes --> FA{"Is it a licence agreement?"}
FA -- Yes --> GA["License Inventory (L2)"]
FA -- No --> HA["Asset Register (L1)"]
B1{"Track B Q1:<br>Is it an identifiable<br>dataset?"} -- No --> ZB["Registration not required<br>General business data"]
B1 -- Yes --> B2{"Track B Q2:<br>Does it require<br>Confidential/Internal<br>classification?"}
B2 -- No --> ZB
B2 -- Yes --> B3{"Track B Q3:<br>Does it require separate<br>ownership, access controls,<br>and risk assessment?"}
B3 -- No --> ZB
B3 -- Yes --> JB["Asset Register —<br>Information type (L1)"]8. Layer Structure
| Layer | Repository | Registration Unit | Purpose |
|---|---|---|---|
| L1 — Asset | Information Asset Register (DB) | Service environment / domain / infrastructure / physical asset / information asset | Risk assessment, ownership assignment, classification, controls |
| L2 — License | License Inventory (DB) | Subscription licence / SKU | Cost, renewal, seat count, SSO protocol tracking |
| L3 — Component & Resource | Asset page body (not a DB) | Features, services, instances, DNS mappings | Audit evidence, dependency documentation ("recorded and interrelated") |
- L1 ↔ L2 are connected via Relation (already implemented)
- L3 uses a free-form structure per asset type — not enforced by DB schema
- When documenting L3, cross-references between related assets are mandatory (e.g., domain ↔ hosting)
9. Microsoft Ecosystem Special Rules
Microsoft Cloud follows a structure where multiple independent subscriptions are linked under a single Entra ID Tenant.
9.1. Official Hierarchy (per Microsoft Learn)
Organization (Cybercraft)
├── Entra ID Tenant (1) — Common identity foundation
│ ├── User Accounts & Groups
│ └── Provides authentication/authorisation
│
├── M365 Subscription — Separate SaaS contract
│ ├── License: Business Premium × N
│ └── Services: Exchange, SharePoint, Teams...
│
├── Azure Subscription — Separate IaaS/PaaS contract
│ ├── Billing: Pay-as-you-go / Free tier
│ └── Resources: Static Web Apps, VMs...
│
└── (Additional subscriptions possible, e.g. Dynamics 365)9.2. Asset Registration Rules
| Item | Asset? | Registration Location | Rationale |
|---|---|---|---|
| Entra ID Tenant | ✅ Asset | Asset Register | Identity environment we created and control. Termination affects all subscriptions. |
| M365 Subscription | ✅ Asset | Asset Register | Separate SaaS contract. Terminating M365 does not affect Azure. |
| Azure Subscription | ✅ Asset | Asset Register | Separate IaaS/PaaS contract. Terminating Azure does not affect M365. |
| M365 Business Premium (licence) | ✅ Intangible asset | License Inventory | Subscription licence. Requires cost, renewal, and seat management. |
| Exchange Online, SharePoint, Teams, etc. | ❌ Component | M365 asset page body | Services within M365 Subscription. Cannot be independently terminated. |
| Entra ID, Intune, Defender, etc. | ❌ Component | M365 asset page body | Services included in M365/Azure subscriptions. |
| Azure Static Web Apps (incl. free tier) | ❌ Resource | Azure asset page body | Instance within Azure Subscription. Free/paid irrelevant. |
9.3. Component ↔ Licence Mapping
M365 provides different features per licence tier. This mapping is documented as a Component — License Mapping table in the M365 asset page body.
10. Domain and Website Rules
| Item | Asset? | Registration Location | Rationale |
|---|---|---|---|
| cybercraft.net (primary domain) | ✅ Asset | Asset Register | Purchased and registered at a domain registrar. We control it. |
| it-doc.cybercraft.net (subdomain) | ❌ Configuration | Domain asset page body | DNS CNAME record of the primary domain. |
| Azure Static Web App instance (it-doc hosting) | ❌ Resource | Azure asset page body | Instance within Azure Subscription. |
Cross-referencing mandatory:
- Domain asset page: "it-doc.cybercraft.net → CNAME → xxx.azurestaticapps.net"
- Azure asset page: "Static Web App (it-doc) → Custom domain: it-doc.cybercraft.net"
11. SaaS General Rules
The same principle applies to all SaaS products:
Register in the Asset Register under the product name; this document defines that the meaning is "the service environment of that product controlled by Cybercraft." No need to prefix "Cybercraft" to individual asset names.
| Decision Criterion | Yes → Asset | No → Not an asset |
|---|---|---|
| Do we have an Organisation/Account? | Dashlane, AFI Backup, Splashtop | — |
| Do we manage users and settings? | DocuSign, Apple Business Manager | — |
| Is it for personal use only? | — | Notion (personal), GitHub (personal) |
12. Asset Page Body — L3 Documentation Guide
Content to document in the page body per asset type:
Service Environment (SaaS)
- Service component list
- Component ↔ licence mapping (where applicable)
- Admin console URL
- SSO/authentication integration status
Identity Platform
- Tenant ID / Domain
- List of linked subscriptions (reference)
- Key settings: Conditional Access, MFA, App Registration, etc.
Cloud Infrastructure
- Resource list (instance name, type, status)
- Custom domain mappings
- Billing structure
Domain
- Registrar, expiry date
- DNS record list (subdomain → target)
- Linked service/resource references
Information / Data
Content to document in the information asset page body:
- Dataset description — What kind of data it is
- Storage location — Which resource (SharePoint Site, Blob, etc.) of which technology asset (M365, Azure, etc.) stores it
- Classification rationale — Reason for Confidential / Internal classification
- Access permissions — Who can access it
- Retention period — Data retention requirements (legal, business)
Information Asset Storage Location ↔ Technology Asset Cross-Reference Rules
When an information asset is stored in a resource of a technology asset, cross-references must be recorded on both sides:
Technology Asset page (M365, Azure, etc.) → In the resource list:
- If the resource contains an information asset, mark with ⚠️
- Example: "SharePoint Site: HR Portal — ⚠️ Contains HR Records (Confidential)"
Information Asset page → In the storage location:
- Specify which resource of which technology asset stores the data
- Example: "Storage Location: M365 Subscription → SharePoint Site: HR Portal"
Technology asset owners need to know "Does the service I manage contain data requiring protection?" and information asset owners need to know "Where is the data I protect stored?" Without this bidirectional visibility, protection gaps will occur.
13. Related Documents
| Document | Relationship |
|---|---|
| Asset Management & Information Classification Policy (ISMS-POL-ASM-01) | Parent policy. The asset identification criteria in this standard definition function as a subordinate standard to this policy. |
| Information Asset Register (DB) | L1 asset repository. Assets are registered according to the criteria in this document. |
| License Inventory (DB) | L2 licence repository. Licence assets are registered according to the criteria in this document. |
| Risk Assessment Methodology (ISMS-RM-RAM-01) | Uses the asset classification from this document as input for asset-based risk assessment. |
| BYOD Security Policy (ISMS-POL-BYOD-01) | BYOD device security policy. Reference for BYOD scope exclusion rationale in §3/§6.5. |
| Device Lifecycle Procedure (ISMS-PROC-BYOD-01) | BYOD device lifecycle procedure. §6 quarterly device inventory review. |
| Application & Data Governance Policy (ISMS-POL-ADG-01) | App/data governance policy. Unauthorised app and Shadow IT management. See §6.5. |
Appendix A. Glossary
| Term | ISO 27002:2022 Mapping | Definition |
|---|---|---|
| Asset | "information and other associated assets" (A.5.9) | General term for items registered in the Asset Register. Encompasses both Technology Assets (Track A) and Information Assets (Track B). See §4. |
| Technology Asset | "other associated assets" (A.5.9) — covers Software, Physical, Services types | A service environment, infrastructure, physical equipment, or domain that the organisation contracts, registers, or creates and over which it holds control. Determined by the Track A 3-Question test. See §4.1. |
| Information Asset | "information" (A.5.9) — Information type | An identifiable dataset that requires protection, classification, and ownership assignment. Determined by the Track B 3-Question test. See §4.2. |
| Component | "components that sustain technology assets" (5.9 Implementation Guidance) | A feature or service provided within an asset. Cannot be independently terminated or controlled. |
| Resource | No direct ISO mapping — a cloud instance sub-concept of Component (Cybercraft-defined) | An individual service instance created within a cloud subscription (legacy equivalent: "server") |
| License | No direct ISO mapping — intangible asset under the Software category | A subscription agreement purchased to use a service. Intangible asset. |
| Tenant | No direct ISO mapping — an organisational unit instance under the Services type | A dedicated instance allocated per organisation in a cloud service (Entra ID Tenant, M365 Tenant, etc.) |
| Subscription | No direct ISO mapping — a contract unit under the Services type | A contract unit for using services/resources in Microsoft Cloud. Can be independently billed and terminated. |
| Organisation / Account / Workspace | No direct ISO mapping — synonymous with Tenant (product-specific naming) | A management environment created per organisation in a SaaS product (same concept as Tenant; naming varies by product) |
ISO 27017:2015 addresses ownership and management responsibilities for "derived data" (logs, metadata, usage statistics, and other data generated during service operation) in cloud environments. Based on the §5 gap analysis, it was determined that derived data does not need to be classified as a separate asset type in Cybercraft's current operational environment.
- Rationale: Cybercraft does not currently provide cloud services directly (i.e., no CSP role) and does not have a business model of generating or selling derived data from customer data.
- Current coverage: Logs and audit trails generated during cloud service usage fall under security monitoring, not asset identification.
- Future review trigger: If Cybercraft assumes a CSP role or provides derived services based on customer data, this decision will be reviewed against ISO 27017 criteria.
Appendix B. Decision Examples
Track A — Technology Asset Decision Examples
| Item | Q1: Contract, register, create? | Q2: Control? | Q3: Independent termination? | Conclusion |
|---|---|---|---|---|
| Cybercraft Entra ID Tenant | ✅ Created | ✅ Manage users/settings | ✅ Possible | Asset → Asset Register |
| M365 Business Premium × 5 | ✅ Purchased | ✅ Manage assignment | ✅ Possible | Licence asset → License Inventory |
| Exchange Online (within M365) | ❌ Included | △ Configurable but M365-dependent | ❌ Cannot be independently terminated | Component → M365 page body |
| Azure Static Web Apps | ❌ Created within Azure subscription | △ Manageable but Azure-dependent | ❌ Cannot exist without Azure | Resource → Azure page body |
| cybercraft.net | ✅ Purchased | ✅ DNS management | ✅ Possible | Asset → Asset Register |
| it-doc.cybercraft.net | ❌ DNS record | △ Record management | ❌ Domain-dependent | Configuration → Domain page body |
| Notion (personal) | ✅ Registered | ✅ Managed | ✅ Possible | Personal asset → Outside Cybercraft scope |
| Figma (hypothetical: company account) | ✅ Org created | ✅ Manage users/settings | ✅ Possible | Asset → Asset Register |
| SharePoint team site | ❌ Created within M365 | △ Site management possible | ❌ M365-dependent | Resource → M365 page body |
| OneDrive folder | ❌ Configuration within service | △ Folder management | ❌ OneDrive-dependent | Configuration — recording not even required |
| Azure Web App instance URL | ❌ Created within Azure | △ Instance management | ❌ Azure-dependent | Resource → Azure page body |
Track B — Information Asset Decision Examples
| Item | Q1: Identifiable? | Q2: Confidential/Internal classification? | Q3: Separate protection? | Conclusion |
|---|---|---|---|---|
| Customer Data | ✅ Identifiable as "Customer Data" | ✅ Confidential | ✅ Requires access controls and risk assessment | Information asset → Asset Register (Confidential) |
| Financial Data | ✅ Identifiable as "Financial Data" | ✅ Confidential | ✅ Requires access controls and risk assessment | Information asset → Asset Register (Confidential) |
| HR Records | ✅ Identifiable as "HR Records" | ✅ Confidential | ✅ Requires access controls and risk assessment | Information asset → Asset Register (Confidential) |
| Source Code | ✅ Identifiable as "Source Code" | ✅ Internal | ✅ Requires access controls and risk assessment | Information asset → Asset Register (Internal) |
| General business documents (team meeting notes, announcements, etc.) | ✅ Identifiable | ❌ General — minimal harm from disclosure | ❌ Separate protection not required | Registration not required — natural content of storage |
| Test/dummy data | ✅ Identifiable | ❌ Not actual data — no harm from disclosure | ❌ Separate protection not required | Registration not required |
| Public website content | ✅ Identifiable | ❌ General — already public | ❌ Separate protection not required | Registration not required |
- Track A: The SharePoint site itself → A resource of M365 (L3). Cannot be independently terminated → Not an asset.
- Track B: "Customer Data" stored in that site → Identifiable + Confidential + Requires separate protection → Register as an Information asset.
- Recording method: Mark "⚠️ Contains Confidential information asset" on the M365 asset page + record storage location on the information asset page (see §4.2).
The two tracks assess the same item from different perspectives. Not confusing storage (Track A) with data (Track B) is the key.
Change History
| Version | Date | Author | Changes |
|---|---|---|---|
| 0.1.0 | 2026-02-25 | Security Director | Initial draft. Asset identification principles, type taxonomy, decision flow, Microsoft/SaaS/domain rules defined. |
| 0.1.1 | 2026-02-25 | Security Director | Added ISO 27002:2022 normative references, standard asset type mapping, implementation guidance citations, owner responsibilities, classification requirements, related documents. |
| 0.1.2 | 2026-02-25 | Security Director | Enhanced §5 Information/Data definition, added §6.4 storage vs information asset distinction (SharePoint/OneDrive/Web App definitions, airline ticket analogy extension), §12 cross-reference rules, Appendix B with 7 additional examples. |
| 0.1.3 | 2026-02-25 | Security Director | Refined §5 airline ticket analogy ("asset" vs "registrable asset" distinction), added §6.4 registration unit definition (logical dataset ≠ folder/path), added dummy/test data rules. |
| 0.2.0 | 2026-02-25 | Security Director | Rewrote §6.4 registration unit (customs declaration analogy, registration example table), new storage location recording criteria (access control boundary principle, per-storage-type recording levels), new source/viewer distinction rules, expanded dummy data rules to general data rules. |
| 0.2.1 | 2026-02-25 | Security Director | Reformulated storage location recording criteria: unified under dual-purpose principle of access control boundary (security) + navigation path (operational). Replaced per-storage-type rules with single decision question ("Can the data be found using only this information?"). Added SharePoint Teams channel scenario. Made OneDrive navigation path mandatory. |
| 0.2.2 | 2026-02-25 | Security Director | Fixed §2.2 Software asset type examples: separated attributes (version, licence expiry) from examples → moved to separate "Inventory Record Items" paragraph. Replaced with actual Software asset type examples (OS, business applications, development tools, middleware). |
| 0.2.3 | 2026-02-25 | Security Director | Clarified §2.3 owner responsibility scope: added scope note (callout) that "assets" includes both registered and to-be-registered assets. |
| 0.2.4 | 2026-02-25 | Security Director | Introduced §4 two-track structure: Track A (Technology Asset 3-Question: contract? control? terminate?) and Track B (Information Asset 3-Question: identifiable? classify? protect?) separated into §4.1/§4.2. Stated track independence principle. Moved §5 cargo analogy and key distinction callouts to §6.4 (storage vs information asset). Changed §6.4 information asset registration criteria to §4.2 reference to eliminate duplication. |
| 0.2.5 | 2026-02-25 | Security Director | New §3.1 Key Terms — defined terms prior to §4 entry (Technology Asset, Information Asset, License, Component, Resource). Added Track A/B independence summary callout. Added §5 asset type–layer relationship diagram (mermaid) — visualising structural connection between §5 (asset types) → §6 (non-assets) → §8 (layers). |
| 0.2.6 | 2026-02-25 | Security Director | Unified section numbering: §6 subsections (5.1→6.1, 5.2→6.2, 6.4→6.3, 6.5→6.4), §9 subsections (8.1→9.1, 8.2→9.2, 8.3→9.3). Fixed §2.2 callout reference §4→§5. Replaced §7 decision flow mermaid with two-track structure (Track A technology + Track B information). Batch-updated cross-references (§6.4→§6.3). |
| 0.2.7 | 2026-02-25 | Security Director | Moved §6.3 Track B detailed guides (registration unit, storage location recording, source/viewer, general data, storage-specific rules) to §4.2 subsections. §6.3 retains only principles, analogies, and §4.2 reference. |
| 0.2.8 | 2026-02-25 | Security Director | Renamed §6: "What Is Not an Asset — Components and Resources" → "What Not to Register". Added change history entry. |
| 0.2.9 | 2026-02-25 | Security Director | Split Appendix B into two tracks: Track A (Technology Asset) table and Track B (Information Asset) table. Changed Q1 column header "contract, register?" → "contract, register, create?". Added 7 Track B examples (customer data, financial data, HR records, source code, general business documents, test/dummy data, public website content). Added cross-track (SharePoint + customer data) callout. Removed former mixed rows (SharePoint with customer data, customer data dataset, general business documents). |
| 0.2.10 | 2026-02-25 | Security Director | Revised Appendix A glossary: rewrote "Asset" definition to encompass both tracks (previously Track A-centric → now Track A+B inclusive). Added "Technology Asset" and "Information Asset" terms. Completed v0.2.7–v0.2.10 change history. |
| 0.2.11 | 2026-02-25 | Security Director | Added §2.2 CIS Controls v8.1 discovery structure callout — CIS 3-Control is a discovery entry point; equivalent coverage with different methodology to Cybercraft Track A/B. Added §3 BYOD/personal device/software scope exclusion callout. New §4.1 Asset Discovery Methodology subsection — contract-based discovery principle, Admin Consent Workflow = SaaS discovery channel, rationale for no separate Discovery procedure. New §6.5 BYOD devices/personal software/hardware — Track A application, management purpose, inventory source (Intune/Entra ID). Added 3 related documents to §13 (BYOD Policy, Device Lifecycle Procedure, ADG Policy). |
| 0.2.12 | 2026-02-25 | Security Director | Converted Appendix A glossary table to 3-column structure — added ISO 27002:2022 mapping column with ISO standard mapping for all 9 terms. Added Derived Data exclusion decision callout at bottom of Appendix A — ISO 27017 derived data not applicable at present; review trigger specified for CSP role assumption. |