Overview
Asset management in FigoRisk helps you maintain a comprehensive inventory of all organizational assets, assess their value and criticality, and understand associated risks.Why asset management matters: You can’t protect what you don’t know
exists. A complete asset inventory is the foundation of effective risk
management.
Asset Types
FigoRisk supports multiple asset categories:Hardware Assets
Physical IT equipment Examples: - Servers and workstations - Network
equipment (routers, switches) - Mobile devices - Storage devices - Printers
and peripherals
Software Assets
Applications and systems Examples: - Operating systems - Business
applications - Development tools - Databases - Security software
Data Assets
Information repositories Examples: - Customer databases - Financial
records - Employee information - Intellectual property - Backup archives
Network Assets
Network infrastructure Examples: - Network segments - Firewalls - VPNs -
WiFi access points - DNS servers
Adding Assets
Manual Asset Creation
Fill Basic Information
Asset Details: - Asset Name: Descriptive name (e.g., “Production Web
Server”) - Asset Type: Select from Hardware, Software, Data, Network -
Category: More specific classification - Description: Brief
description of the asset Example:
Name: Customer Database Server Type: Hardware Category: Database Server Description: Primary MySQL server hosting customer dataSet Asset Criticality
Criticality Level (Business impact if asset fails): - Critical:
Mission-critical, no alternative - High: Very important, minimal
alternatives - Medium: Important, alternatives available - Low: Nice
to have, easily replaceable
Add Technical Details
Hardware Assets: - Serial Number - IP Address - MAC Address - Location
(physical or data center) - Manufacturer - Model - Purchase Date - Warranty
Expiry Software Assets: - Version - License Type - License Expiry -
Vendor - Installation Date Data Assets: - Data Classification (Public,
Internal, Confidential, Restricted) - Data Type (PII, Financial, Health,
etc.) - Storage Location - Retention Period
Assign Ownership
- Asset Owner: Primary responsible person - Department: Owning department - Custodian: Person managing the asset - Users: People who use this asset
Set Financial Information
- Purchase Value: Original cost - Current Value: Depreciated value - Annual Cost: Maintenance/license costs
Bulk Asset Import
For importing multiple assets at once:Prepare Your Data
Fill in the template with asset information: | Asset Name | Type | Category
| Criticality | Owner | IP Address | Location |
|-----------|------|----------|-------------|-------|-----------|----------|
| Web Server 01 | Hardware | Server | Critical | John Doe | 192.168.1.10 |
Data Center A | | CRM Application | Software | Business App | High | Jane
Smith | - | Cloud | | Customer Database | Data | Database | Critical | Bob
Johnson | - | AWS RDS |
Review Preview
Check the import preview: - ✅ Valid entries (will be imported) - ⚠️
Warnings (will import but check data) - ❌ Errors (won’t import, fix
required)
Asset Discovery
Automatically discover IT assets on your network:Coming Soon: Automated network scanning and asset discovery features are
currently in development.
- Export asset list from your IT asset management tool
- Convert to FigoRisk CSV format
- Use bulk import feature
Asset Classification
Criticality Assessment
Determine asset criticality based on business impact:- Critical
- High
- Medium
- Low
Characteristics: - No alternatives or backups available - Immediate
business impact if unavailable - Affects revenue or regulatory compliance -
Downtime measured in minutes Examples: - Production payment gateway -
Primary customer database - Core banking system - Emergency communication
system
Data Classification
For data assets, classify based on sensitivity:| Classification | Description | Examples | Access Control |
|---|---|---|---|
| Restricted | Highest sensitivity, regulatory requirements | Customer PII, payment card data, health records | Need-to-know only |
| Confidential | Internal sensitive data | Financial reports, strategic plans, salary data | Role-based access |
| Internal | Internal use only | Employee directory, policies, internal docs | All employees |
| Public | Can be publicly disclosed | Marketing materials, public reports | No restrictions |
Asset Relationships
Link assets to show dependencies:Add Dependency
Click + Add Dependency Types of relationships: - Depends On:
This asset requires another asset - Used By: This asset is used by
another asset - Hosted On: Software/data hosted on hardware - Connects
To: Network connections
Asset Lifecycle Management
Asset States
Track assets through their lifecycle:Planning
Planning
Asset is planned but not yet acquired Actions: - Define requirements -
Get approvals - Create purchase orders
Acquisition
Acquisition
Asset has been ordered Actions: - Track delivery - Prepare for
deployment - Update inventory
Active
Active
Asset is in production use Actions: - Regular maintenance - Monitor
performance - Track usage
Maintenance
Maintenance
Asset is undergoing maintenance Actions: - Apply patches/updates -
Perform repairs - Document changes
Retired
Retired
Asset is no longer in use Actions: - Data sanitization - Physical
disposal - Update documentation
Change Asset Status
Asset Search & Filters
Find assets quickly using filters:Quick Filters
Pre-configured filter options:By Criticality
- Critical assets only - High & Critical - All priorities
By Type
- Hardware only - Software only - Data assets - Network assets
By Owner
- My assets - Department assets - Unassigned assets
By Status
- Active only - In maintenance - Retired assets
Advanced Search
Set Multiple Filters
Combine filters: - Asset Type: Hardware - Criticality: Critical or
High - Location: Data Center A - Owner: IT Department - Purchase
Date: Last 2 years
Asset Reports
Generate asset inventory reports:Pre-built Reports
- Asset Inventory
- Critical Assets
- Asset by Owner
- Asset Lifecycle
Complete list of all assets with key details Includes: - Asset name and
type - Owner and location - Criticality level - Status - Last updated date
Export as: PDF, Excel, CSV
Generate Custom Report
Choose Columns
Select which fields to include: - ☑ Asset Name - ☑ Type - ☑ Criticality - ☑
Owner - ☑ Location - ☑ IP Address - ☑ Purchase Value - ☑ Status
Asset Maintenance
Schedule Maintenance
Fill Maintenance Details
- Maintenance Type: Routine, Repair, Upgrade - Scheduled Date: When maintenance will occur - Duration: Expected downtime - Assigned To: Technician responsible - Description: What will be done - Impact: Expected business impact
Set Notifications
- Notify asset owner - Notify users - Notify management (for critical assets) - Advance notice period (1 day, 3 days, 1 week)
Maintenance History
View all past maintenance activities:- Open asset details
- Go to Maintenance History tab
- See chronological list of:
- Maintenance date
- Type of work performed
- Person who performed it
- Duration
- Notes and findings
Asset Documentation
Attach relevant documents to assets:Contracts & Licenses
Contracts & Licenses
- Purchase agreements - Software licenses - Support contracts - SLAs
Technical Documentation
Technical Documentation
- User manuals - Configuration guides - Architecture diagrams - Runbooks
Financial Documents
Financial Documents
- Purchase orders - Invoices - Warranty documents - Depreciation schedules
Security Documentation
Security Documentation
- Security assessments - Vulnerability scan reports - Compliance certificates - Audit reports
- Open asset details
- Click Documents tab
- Click + Upload Document
- Select file and add description
- Click Upload
Best Practices
Asset Management Best Practices
Inventory Accuracy: - Review and update assets quarterly - Remove
decommissioned assets promptly - Verify ownership assignments regularly -
Conduct annual physical inventory audits Classification: - Use consistent
criticality criteria - Document classification rationale - Review criticality
ratings annually - Align with business priorities Documentation: -
Maintain up-to-date technical details - Keep contracts and licenses current -
Document all changes - Retain historical records Dependencies: - Map
critical asset dependencies - Keep dependency maps updated - Use for impact
analysis - Plan redundancy for critical paths
Common Scenarios
New Server Deployment
New Server Deployment
Steps: 1. Create asset record before deployment 2. Set status to
“Planning” 3. Document specifications and requirements 4. Update to
“Acquisition” when ordered 5. Change to “Active” when deployed 6. Link to
dependent applications 7. Schedule first maintenance
Hardware Refresh
Hardware Refresh
Steps: 1. Identify assets for replacement 2. Plan new asset acquisition
3. Create records for new assets 4. Schedule migration 5. Update status of
old assets to “Retired” 6. Transfer dependencies to new assets 7. Document
disposal process
Cloud Migration
Cloud Migration
Steps: 1. Document current on-premise assets 2. Create cloud asset
records 3. Map dependencies and relationships 4. Update locations during
migration 5. Retire on-premise assets when complete 6. Update cost
information 7. Verify all dependencies transferred
Asset Security Incident
Asset Security Incident
Response: 1. Flag affected asset 2. Document incident details 3. Assess
impact using dependencies 4. Notify asset owner and users 5. Coordinate
remediation 6. Update asset status if needed 7. Record in asset history
Integration with Risk Management
Assets are automatically linked to risk assessments:- View Risks tab in asset details to see associated risks
- When creating risks, link to affected assets
- Asset criticality influences risk scoring
- Use for impact analysis and business continuity planning