ITM is an open framework - Submit your contributions now.

Insider Threat Matrix™Insider Threat Matrix™
  • ID: PV075
  • Created: 22nd October 2025
  • Updated: 22nd October 2025
  • Contributor: David Larsen

Centralized Asset Inventory Control

Maintain a centralized, enforceable inventory of all enterprise-issued assets, with strong identity attribution. Assets such as laptops, mobile devices, removable media, and developer hardware, must be provisioned through a controlled process, with their issuance, reassignment, and return tied to a single authoritative system. Failure to implement this control undermines visibility, frustrates post-incident reconstruction, and enables subjects to operate untracked or pseudonymously, without an authoritative means to attribute an asset to a subject. 
 

Centralized asset inventory is not merely a logistical requirement, it is a foundational investigative control that enables attribution and identification across an organization's population.
 

Centralized Provisioning
All enterprise assets must be provisioned through a formal request-and-approval process managed by a single system of record (e.g., ServiceNow, Lansweeper, or equivalent). No devices should be issued without a documented change entry.

 

Persistent Identifiers
Each asset must be recorded with at least one hardware identifier (e.g., serial number, MAC address) and one software-level identifier (e.g., hostname, device GUID). These identifiers must persist across asset lifecycle events (provisioning, reassignment, decommissioning).

 

Subject Binding
Asset records must be explicitly bound to a subject using identity fields sourced from centralized systems. Required fields include:

  • Active Directory username (sAMAccountName)
  • Email address
  • HR-assigned employee ID
  • Manager or business unit affiliation
  • Employment status (e.g., contractor, full-time, intern)

 

System Integration with HRIS
Asset inventory systems must integrate with the organization’s HR information system (HRIS) to ensure accurate identity attribution. Identity records must update automatically upon onboarding, transfer, or termination.

 

Access Enforcement
Devices not present in the inventory system must be blocked from:

  • Network access (via NAC or DHCP enforcement)
  • Corporate VPN or remote access platforms
  • Enterprise SSO and SaaS authentication flows

 

Lifecycle Auditing
Asset inventory records must log all changes, including:

  • Provisioning events
  • Subject reassignments
  • Transfers between business units
  • Decommissioning or disposal actions


These logs must be exportable for investigative review and retained per incident response policy.

 

Inventory Reconciliation
A quarterly reconciliation process must occur between the asset management system and identity directory. Any orphaned, duplicate, or unassigned assets must trigger formal review.

Investigator Considerations

  • During an insider threat investigation, asset-to-identity linkage provides immediate context on who possessed what device at any given time. It allows correlation of device telemetry (e.g., EDR data) with human actions.
  • Unregistered or misattributed assets may indicate provisioning bypass, unauthorized hardware introduction, or deliberate obfuscation—each of which may constitute preparatory behavior.

Sections

ID Name Description
ME001.001Access to Asset Past Termination

The subject accesses a corporate hardware asset, most commonly a laptop or corporate mobile device, after their employment has formally ended. This typically occurs due to gaps in deprovisioning, delayed hardware recovery, or the subject physically retaining the device despite offboarding procedures. Post-termination access may be opportunistic or intentional, and may precede or coincide with data exfiltration, sabotage, or unauthorized continuation of internal access.

 

This sub-section is relevant in cases where the hardware asset is no longer linked to an active identity in HR systems but remains technically functional and capable of network, VPN, or service access. Such access undermines the assumption that termination alone revokes operational capability and may point to procedural drift in IT, HR, or facilities handover workflows.

IF015.002Theft of a Corporate Mobile Phone

A subject steals a corporate mobile phone belonging to an organization.

IF015.001Theft of a Corporate Laptop

A subject steals a corporate laptop belonging to an organization.

IF015.004Theft of Non-Digital Assets

A subject steals non-digital assets, such as physical documents, belonging to an organization.