August 15, 2023

ISO 27001 Asset Register: How To Build Your Asset Inventory

When it comes to implementing ISO 27001, businesses need to provide a complete asset register as part of their information security management system (ISMS).

By
Full name
Share this post
A woman smiles while using a tablet, surrounded by digital notifications and a data chart.

Having an up-to-date ISO 27001 compatible asset register allows you to undertake risk assessments and delegate tasks to ensure each asset is safely managed and risks are suitably controlled. This also acts as evidence, showing your external auditor that your business protects and preserves its assets and is continually working to mitigate risk. In short, your asset register is a crucial part of your ISMS and is a key component when being assessed for ISO 27001 certification.

Which assets should I include?

You should include both physical and informational assets in your asset inventory, in line with the standard’s focus on information security and risk management. This means you should include assets such as data and intellectual property as well as physical assets like your offices, laptops and computers. A list of asset types we recommend including in your ISO 27001 asset register, no matter your business or industry, is below:

  • Physical security systems;
  • Licenses;
  • Removable media;
  • Electronic documentation;
  • Physical documentation;
  • System software;
  • Network equipment;
  • Networks;
  • Furniture;
  • Application software;
  • Critical business data;
  • Websites and webpages;
  • Mobile phones;
  • Desktop phones;
  • Personnel;
  • IP;
  • Contracts and agreements;
  • Electronic documentation;
  • Electronic correspondence;
  • Physical correspondence;
  • Hardware;
  • Laptops;
  • Desktop computers;
  • Internal services;
  • Removable media;
  • Outsourced services;
  • IP;
  • Partnerships;
  • Personally identifiable information (PII);
  • Electrical equipment;
  • Receipts, records and logs;
  • Installations/buildings.

Please note that the above list is not exhaustive, so be sure to consider any other asset types associated with your business’s information and information facilities.

What should my ISO 27001 asset register look like?

Below, you’ll see an ISO 27001 asset register example as viewed on the Hicomply platform. The asset name, type, location and owner are all visible, which allows an external auditor to assess your business against Annex A.8.1.1 – ensuring that your register is well-labelled, updated, free of errors and compliant with any other records available.

This can be a difficult task due to the constantly evolving nature of a business’s information and the assets themselves. Hicomply’s information asset management module allows assets to be quickly loaded into your workspace from your own list or our comprehensive library, with locations, asset details and ownership clearly identified. Once you have loaded your assets into the ISO 27001 asset register on the platform, the Hicomply software can also link your assets to other functionalities, such as policy and procedure documentation.

Asset register example

A step closer to implementing ISO 27001

Your asset register is complete, what’s the next step? You can now move on to step four of our six steps to success guide: undertaking risk assessment and task management. This involves assessing the level of risk to each asset and assigning tasks to specific users, or even every user in your business, to ensure appropriate controls are in place.

Ready to automate the administration of your ISMS and achieve ISO 27001 certification with Hicomply? Book your demo today.

Risk Management
Compliance Reporting
Policy Management
Incident Management
Audits and Assessments

Ready to Take Control of Your Privacy Compliance?

See how Hicomply can accelerate your path to CAF compliance in a 15-minute demo.

Risk Management

Identify, assess, and mitigate security risks with an integrated risk register.Hicomply’s automated risk management software maps controls across ISO 27001, SOC 2, and NIST frameworks — helping teams track risk treatment plans, assign ownership, and monitor real-time compliance status.Build a resilient ISMS that reduces audit findings and demonstrates continuous improvement.

Compliance Reporting

Generate instant, audit-ready compliance reports across multiple frameworks — from ISO 27001 and SOC 2 to GDPR, DORA, and NHS DSPT.Automated evidence collection and built-in dashboards provide a single source of truth for your compliance posture, saving weeks of manual work during audits.

Policy Management

Centralise, version, and publish all your information security policies in one place.Hicomply automates approvals, reminders, and distribution, ensuring your ISMS documentation stays current and aligned with frameworks like ISO 42001 and NIST CSF.Say goodbye to outdated PDFs — manage policies dynamically and maintain full traceability.

Incident Management

Capture, investigate, and resolve security incidents with structured workflows and automated evidence trails.Hicomply integrates with ticketing tools like Jira, Zendesk, and Azure DevOps to streamline incident response and link findings to risk and control updates — a key step for SOC 2 Type II readiness.

Audits and Assessments

Simplify internal and external audit preparation with built-in audit templates and automated task assignments.
Hicomply’s audit management platform aligns with ISO 27001, ISO 9001, and ISO 14001, giving teams a clear overview of control effectiveness, audit evidence, and corrective actions — all from one dashboard.

Getting Started
Computer Software
IT and Services
Real Estate
Professional Services
Growth