
Select | Document Name | Document Type | Business Unit | Applicable Controls | Document Owner | Status |
---|---|---|---|---|---|---|
Cyber Security Policy | Policy | Legal |
![]() |
Compliant | ||
Cyber Security Policy | Policy | Legal |
![]() |
Compliant | ||
Cyber Security Policy | Policy | Legal |
![]() |
Compliant |
Control Number | Control Question | Implementation Group | Applicable Document | Document Status | Compliance Level |
---|---|---|---|---|---|
1.1 | Establish and Maintain Detailed Enterprise Asset Inventory | IG1 | Enterprise Asset Management Policy | Partially Written | Non-Compliant |
1.2 | Address Unauthorized Assets | IG1 | Enterprise Asset Management Policy | Partially Written | Non-Compliant |
1.3 | Utilize an Active Discovery Tool | IG2 | Enterprise Asset Management Policy | Written Policy | Non-Compliant |
1.4 | Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory | IG2 |
Select Status
|
NA | NA |
1.5 | Use a Passive Asset Discovery Tool | IG3 | Enterprise Asset Management Policy | Approved Written Policy | Compliant |
Control Number | Control Question | Applicable Document | Compliance Level |
---|---|---|---|
2.1 | Establish and Maintain Detailed Enterprise Asset Inventory | Enterprise Asset Management Policy | Compliant |
2.2 | Establish and Maintain Detailed Enterprise Asset Inventory | Enterprise Asset Management Policy | Non-Compliant |
Control Number | Control Question | Applicable Document | Compliance Level |
---|---|---|---|
3.1 | Establish and Maintain Detailed Enterprise Asset Inventory | Enterprise Asset Management Policy | Compliant |
3.2 | Establish and Maintain Detailed Enterprise Asset Inventory | Enterprise Asset Management Policy | Non-Compliant |