ISMS Asset+ Management

ISMSuite
ISMS Asset+ Management
The process and steps for identifying and managing organizational information assets, while supporting ISMS CIA management and risk value calculation

Features

Feature 1
Information Asset Management
Identify and list all information assets within the organization (data, systems, networks, physical assets, etc.), and implement access control based on different classifications of information assets.
Feature 2
Asset Value Management
Calculate the CIA of information assets based on their confidentiality (C), integrity (I), and availability (A), with the organization defining the calculation formula according to management’s actual needs.
Feature 3
Risk Value Management
Provide common ISMS information asset risk factors for risk value calculation, allowing the organization to quickly obtain the risk value of each type of information asset and the total overall risk value based on the asset category.
Feature 4
Add and Modificaton Strict Review
Information asset addition and modification management processes can be integrated with the internal audit mechanism of the organization for process design and responsibility management. This includes tasks such as approval, countersignature, assignment, and notification.

FAQ & Summary

Can we customize the CIA calculation formula to match our company’s internal security policy?

Yes. 101Form ISMS Asset+ provides high flexibility for defining your organization’s specific CIA (Confidentiality, Integrity, and Availability) weights. You can customize the calculation formulas to align with your internal security manual or industry-specific compliance standards, ensuring precise asset valuation.

How does the system help us prepare for an ISO 27001 audit?

The system maintains an Immutable Audit Trail with precise timestamps for every asset modification and approval. During an audit, you can instantly generate comprehensive risk assessment reports and digital evidence logs, demonstrating your commitment to the ISO 27001 continuous improvement cycle.

Does the system support physical assets like servers and laptops as well as digital data?

Absolutely. You can manage your entire Unified Asset Inventory—including hardware (servers, laptops), software, network equipment, and intangible data sets—within a single interface. Each asset can be categorized and assigned specific ownership to ensure no critical resource is overlooked.

Is it easy to identify which assets currently pose the highest risk to the company?

Yes. Using the Risk Value Management dashboard, you can instantly sort assets by their calculated risk scores. The system provides intuitive visualizations of risk aggregates per category, helping security officers focus their resources on high-priority threats and critical vulnerabilities.

Can asset changes be sent to our Security Officer for approval automatically?

Yes. 101Form’s core strength lies in its workflow engine. All asset additions, decommissioning, or modifications can trigger an automatic approval process, ensuring your Chief Information Security Officer (CISO) or department heads sign off on changes before they are recorded in the master inventory.

Eco-friendly logo

“Empowering Your Digital Transformation Needs”

For a Greener Office Future