Welcome » IT Booklets » Operations » Risk Identification » Technology Inventory » Hardware
The hardware inventory should be comprehensive. In addition to identifying institution-owned assets, it should also identify equipment owned by other parties but located within the environment. To the extent possible, hardware items should be marked with a unique identifier, such as a bar code, tamper-proof tag, or other label. The inventory should encompass stand-alone computing devices, including:
The following are examples of useful information to capture in hardware inventories:
Inventories of telecommunication equipment should contain similar information and should document use and connectivity. This is especially important when an institution uses either private branch exchanges (PBX) or voice over Internet protocol (VOIP) to provide voice and data connectivity. Inventories of telecommunications interconnections should include the following information: