March 25, 2024

ISO 27001:2022 Annex A Control 5.9: Inventory of Information and Other Associated Assets

Annex 5.9 of the 2022 version of the ISO 27001 standard can be mapped to ISO 27001:2013 Annex A 8.1.1 and ISO 27001:2013 Annex 8.1.2

By
Full name
Share this post
A woman smiles while using a tablet, surrounded by digital notifications and a data chart.

Annex A 5.9 covers how an organisation’s inventory of information and other associated assets should be developed and maintained. The annex reflects an organisation’s need to understand what information assets it has in order to carry out activities securely.

What is an inventory of information assets?

An inventory of information assets (IA) is a comprehensive list of what an organisation stores, processes, or transmit, including the location and security controls for each item. The goal of this is to identify every single piece of data, acting as the data protection equivalent of financial accounting.

IAs are useful for identifying information security risks and vulnerabilities, and can be used as evidence during compliance audits, helping to avoid fines and penalties. The inventory should also include who owns and manages each asset, and information about the value of each asset, both in terms of finance and importance.

It is vital that inventories are kept up to date in order to reflect any changes within the organisation.

Why is annex 5.9 important?

Annex 5.9 is designed to help organisations identify their information and other associated assets, with the goal of preserving information security and assigning appropriate ownership. It covers the control, purpose, and implementation of an inventory of information and other associated assets in line with the ISO 27001 framework.

Annex 5.9 asserts that organisations should categorise their information, identifying owners and documenting the controls that are or need to be in place.

Meeting the requirements of Annex 5.9

Annex 5.9 requires organisations to identify their information and other associated assets, and determine the importance of these items in terms of data security. Organisations will vary in their approach to creating an inventory, depending on their size, industry and the types of information they use.

The inventory of information and other assets should be up to date, consistent, accurate, and aligned with other inventories. It should also include the locations of assets. To achieve this, organisations can:

  • Conduct regular reviews of information and other associated assets against their IA.
  • Enforce an automatic inventory update while installing, changing or removing an asset.

Some organisations may require several inventories for different purposes, while others may have a single inventory.

How has control 5.9 changed from ISO 27001:2013?

ISO 27001:2022 combined the 57 controls of ISO 27001:2013 into 24 controls, and as such, control 5.9 is a combination of ISO 27001:2013 Annex A controls 8.1.1 and 8.1.2. The purpose of the old control 8.1.1 was to ensure that all assets are identified, documented, and reviewed, while 8.1.2 focused on making sure all information assets are under ownership.

Both of these annexes are similar to 5.9, but the latter has been expanded to be more user-friendly. The four points outlined in 8.1.2 have been expanded into nine points, which state that the asset owner should be responsible for the proper management of an asset during its whole life cycle, ensuring that:

  • All information and other assets are inventoried
  • Information and other assets are classified and protected
  • Classifications are reviewed periodically
  • Components supporting tech assets are listed and linked, including software components and sub-components
  • Requirements for the acceptable use of assets are established
  • Access restrictions correspond with classifications, and other regularly reviewed
  • Assets are handled in a secure manner when deleted or disposed
  • Risks associated with assets are identified and managed
  • Personnel with responsibilities over information management are supported.
Risk Management
Compliance Reporting
Policy Management
Incident Management
Audits and Assessments

Ready to Take Control of Your Privacy Compliance?

See how Hicomply can accelerate your path to CAF compliance in a 15-minute demo.

Risk Management

Identify, assess, and mitigate security risks with an integrated risk register.Hicomply’s automated risk management software maps controls across ISO 27001, SOC 2, and NIST frameworks — helping teams track risk treatment plans, assign ownership, and monitor real-time compliance status.Build a resilient ISMS that reduces audit findings and demonstrates continuous improvement.

Compliance Reporting

Generate instant, audit-ready compliance reports across multiple frameworks — from ISO 27001 and SOC 2 to GDPR, DORA, and NHS DSPT.Automated evidence collection and built-in dashboards provide a single source of truth for your compliance posture, saving weeks of manual work during audits.

Policy Management

Centralise, version, and publish all your information security policies in one place.Hicomply automates approvals, reminders, and distribution, ensuring your ISMS documentation stays current and aligned with frameworks like ISO 42001 and NIST CSF.Say goodbye to outdated PDFs — manage policies dynamically and maintain full traceability.

Incident Management

Capture, investigate, and resolve security incidents with structured workflows and automated evidence trails.Hicomply integrates with ticketing tools like Jira, Zendesk, and Azure DevOps to streamline incident response and link findings to risk and control updates — a key step for SOC 2 Type II readiness.

Audits and Assessments

Simplify internal and external audit preparation with built-in audit templates and automated task assignments.
Hicomply’s audit management platform aligns with ISO 27001, ISO 9001, and ISO 14001, giving teams a clear overview of control effectiveness, audit evidence, and corrective actions — all from one dashboard.

Preparing for Your Audit
Computer Software
IT and Services
Financial Services
Growth