System Component Inventory
Description
Develop and document an inventory of system components that accurately reflects the system, includes all components within the authorization boundary, and is at the level of granularity deemed necessary.
⚠️ Risk Impact
Inventory gaps are blind spots. Components you don't know about can't be scanned, patched, or monitored. Modern cloud estates accumulate 'shadow infrastructure' faster than manual inventory can track.
🔍 How EchelonGraph Detects This
EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as high-severity findings with remediation guidance.
🔧 Remediation
Continuous asset discovery across AWS/GCP/Azure/Kubernetes. Reconcile against approved inventory. Tag every resource with owner, environment, criticality. Decommission untagged resources after grace period.
💀 Real-World Attack Scenario
An ex-employee's old development AWS account was forgotten in inventory. Two years later, an attacker discovered the account via leaked credentials and used it to mine cryptocurrency, accumulating $340K in compute charges before the bill anomaly triggered investigation. The account was never in scope of security tooling because nobody knew it existed.
💰 Cost of Non-Compliance
Shadow infrastructure costs: avg $400K per organization in unmanaged compute (Anodot 2024). Shadow assets as breach contributor: 27% of cloud incidents (Mandiant M-Trends 2024).
📋 Audit Questions
- 1.How is asset inventory maintained?
- 2.What is the rate of new asset detection vs decommissioning?
- 3.Are all assets tagged with owner + environment?
- 4.How often is inventory reconciled?
🎯 MITRE ATT&CK Mapping
⚡ Common Pitfalls
- ⛔Inventory in spreadsheet that drifts within weeks
- ⛔Discovery only in primary cloud — sub-accounts / partner-accessed accounts missed
- ⛔No automated decommissioning policy for ownerless resources
📈 Business Value
Living asset inventory is the foundation every cloud security control rests on. Direct correlation with breach frequency: organizations with complete inventory have 60% fewer breaches.
⏱️ Effort Estimate
20-40 hours initial inventory + 4 hours weekly maintenance
EchelonGraph runs continuous cross-cloud discovery + reconciliation; flags ownerless resources
🔗 Cross-Framework References
Automate NIST 800-53 CM-8 compliance
EchelonGraph continuously monitors this control across all your cloud accounts.
Start Free →