SecureByDesign-Playbook

<img src=”Asset Dive.png” style=”float:right” width=25%/>

A Dive into Assets, Uses and Impacts

Let’s have a look at how to identify and describe the assets that matter

What are Assets?

For these assessments your assets are those things that are valuable to you.

<img src=”Assets - Money.png” align=”center” width=30% />

They might be:

…or anything else that would cost you or harm you if they were:

Think about what each asset is used for, and so what impact there would be on you if any of the above happened.

For example you might have a work mobile phone that you use to reach your customers. If it is bricked then you will immediately lose not only any customer numbers on it, but if you call on a different number they will not recognise it is yours. If it is nicked you have the same problem, but also the chance that whoever stole it runs up your bill or starts calling around your customers being a nuisance. It may be tricked by someone spoofing the telephone number and pretending to be you.

Some of these will matter more to you than others.

A Starter List

Just some ideas to help you create your list; valuable assets might be:

Your Asset Register

Just like a school attendance register, your asset register should list the assets that are present.

There will likely to be lots of these, so start with the major ones. We have provided a starter [Asset Register][assets/AssetsRegisterGuide.md] to help you; this can look a bit overwhelming at first, but it’s just a list a bit like this:

Asset Uses Nicked Bricked Tricked
What Thing… ..is used by who to do what? If it is stolen then what can someone find out from it? If you can’t use it, what are you also unable to do? What false information on it might lead to problems?

…with some drop-down selections to help you grade which impacts are more serious than others.

These grades come from the NIST Risk Framework so are reasonably well established, but as usual don’t get too buried in the detail

Supply Chains

Don’t forget that your assets are often supplied by other people, and often made of various components that have been supplied by even more other people. These

Uses & Users

Knowing who uses your assets for what will help you understand:

Impacts and Targets

What are the consequences of the asset being affected? These will likely be different for different kinds of effects. If you don’t have good security on your mobile then having it stolen could be much worse than running over it with a car.

For each effect (ie nick, brick and trick) work out:

Typically you will measure the commercial impact in time or money, but in your case you might want to use other measures such as harm, time, reputation, delays to a goal, and so on.