OT Cyber Asset Management​

Cyber Asset Inventory Data Model

  • In order to increase the efficiency of the OT asset inventory process, it is advisable to build a data model taking into account the data necessary for proper cybersecurity management.​
  • The data model should include device identification fields that can be common to all resources regardless of their type. However, the fields provided for detailed technical data should depend on the type of asset (e.g. PLCs, Servers or Applications).​

Cyber Asset Management implementation steps


  • A properly designed and implemented asset management process is extremely important for the proper implementation of cybersecurity mechanisms for OT systems. ​
  • All well recognized cybersecurity standards e.g. NIST 800-82, IEC 62443, NERC CIP indicate asset identification as the key to success in cybersecurity architecture implementation.​

Cyber Asset Inventory Repository​

  • It is important to carry out appropriate activities, including the preparation of an appropriate data repository, before starting the asset inventory process.​
  • The asset management tool with data repository should be available to all administrators.​

Cyber Asset Inventory and Management Process

  • All OT devices in OT systems should be inventoried ​
  • Incorrect inventory may result in the system being vulnerable to cyberattacks and becoming the main vector of an attack on the entire OT system.​
  • The result of the inventory should be network diagrams and a database containing detailed information about individual devices.​


Discover how the implemented sustainability solutions will help shorten time to improve your brand and product


REC welcomes you to our blog!

Reliability Expert Center (REC) is excited to introduce to you our new website and blog. Here you will find biweekly submissions of featured articles concerning Reliability, Sustainability, Lubrication, & Inspection from local and global experts that offer industry insight and best practice methods.