IT and OT Asset Inventory

To meet the IT and OT asset inventory requirement, you must maintain an accurate, in-scope inventory of all IT and operational technology assets, including hardware and software, and be able to prove it stays current. For C2M2 v2.1 ASSET-1.A, auditors will expect clear scope boundaries, defined ownership, repeatable update workflows, and evidence that inventory outputs are used operationally. 1

Key takeaways:

  • Your inventory must cover both IT and OT, and include both hardware and software within the scoped environment. 1
  • “Maintained” means you have a repeatable method to add, update, and retire assets, plus evidence the process runs. 1
  • The fastest path to defensible compliance is tying inventory updates to existing workflows (procurement, commissioning, change, offboarding) and retaining the resulting records.

An IT and OT asset inventory sounds basic until you scope it, operationalize it, and defend it in an assessment. In C2M2, asset inventory is foundational because every other capability (vulnerability management, logging, access control, incident response) depends on knowing what exists, where it is, who owns it, and what software runs on it. C2M2 v2.1 ASSET-1.A sets a simple requirement: maintain inventories of IT and OT assets, including hardware and software. 1

For a Compliance Officer, CCO, or GRC lead, the operational question is predictable: “What counts as an asset in our scoped environment, what fields must we track, and what evidence proves the inventory is real and current?” The answer is not a perfect CMDB on day one. It is a defined inventory standard, coverage of the highest-risk environments first (especially OT), and a steady-state operating model that prevents inventory drift.

This page gives requirement-level implementation guidance you can hand to IT, OT engineering, and security operations, and then audit against.

Regulatory text

C2M2 v2.1 ASSET-1.A (MIL1) excerpt: “Inventories of IT and OT assets are maintained, including both hardware and software.” 1

What the operator must do (plain reading):

  • Maintain an inventory (not a one-time list) for the in-scope function/environment. 1
  • Include IT and OT assets, not just corporate IT. 1
  • Include hardware and software, not just devices. 1

In practice, assessors look for (1) a defined scope, (2) a durable system of record (or reconciled set of systems) and (3) evidence of updates over time.

Plain-English interpretation (what “maintained” really means)

“Maintained” is the difference between a spreadsheet that goes stale and a control you can defend. A maintained inventory has:

  • A system of record (or a controlled aggregation of sources) where the authoritative list is produced.
  • Assigned ownership for IT and for OT, with a named backup.
  • Intake and change mechanisms that catch new assets and changes (procurement, commissioning, imaging, patching, configuration, decommissioning).
  • Reconciliation across sources (network discovery vs. procurement vs. OT engineering records) so you can explain exceptions rather than hide them.

For OT, “maintained” also means you respect operational constraints. Passive discovery, engineering change control, and vendor-maintained systems often drive the update model.

Who it applies to (entity and operational context)

This requirement applies to organizations using C2M2 to assess cybersecurity capability maturity within a defined scope, especially energy sector organizations and other critical infrastructure operators. 1

Operationally, it applies anywhere you have:

  • IT environments: endpoints, servers, cloud workloads, network gear, enterprise applications, identity systems.
  • OT environments: ICS networks, SCADA components, PLCs, RTUs, HMIs, historians, engineering workstations, safety systems, and the software/firmware that runs them.

Scope is decisive. If your C2M2 assessment scope is “generation sites” or “control centers,” your inventory must cover assets supporting that scope, even if IT centrally manages them.

What you actually need to do (step-by-step)

Use this as the minimum operational build for ASSET-1.A.

1) Define inventory scope boundaries (write it down)

Create a one-page scope statement:

  • Sites, network segments, or business functions included.
  • Asset classes included (IT endpoints, servers, OT controllers, network devices, applications).
  • Explicit exclusions (with rationale), such as lab environments or training rigs, if truly out of scope.

Artifact: “Asset Inventory Scope Statement” approved by IT/security and OT leadership.
Why auditors ask: It prevents a moving target and limits “we thought that was someone else’s job.”

2) Set a minimum required asset data standard (fields)

Define required fields by asset type. Keep it achievable; expand later.

Example minimum fields (IT hardware):

  • Asset ID, hostname, environment, owner, location, criticality, network identifiers, OS/version, lifecycle status.

Example minimum fields (OT hardware):

  • Asset ID, site/area/cell, vendor/model, firmware/software version, function (PLC/HMI/etc.), owner (engineering), connectivity path, safety/availability criticality, lifecycle status.

Example minimum fields (software):

  • Software name, version, where installed (asset linkage), owner, support status.

Artifact: “Asset Inventory Data Dictionary” with required vs. optional fields.

3) Choose the system of record and accepted source systems

Pick one place to answer: “What assets do we have?” Common patterns:

  • CMDB as system of record for IT; OT repository for OT; a governed aggregation for reporting.
  • A single GRC/control evidence layer that references authoritative sources.

Daydream can sit above these systems to standardize control requirements, map evidence requests, and produce assessment-ready evidence packets without forcing you to replace OT-native tooling.

Artifact: “Asset Inventory System of Record Decision” (short memo) naming the authoritative sources and how conflicts are resolved.

4) Build intake paths that prevent inventory drift

Tie updates to existing operational triggers:

IT triggers

  • Procurement receipt → create asset record
  • Device enrollment/MDM join → confirm asset details
  • VM/cloud provisioning → auto-register instance
  • Decommission ticket → retire record

OT triggers

  • Engineering change request → update controller/HMI/software records
  • Commissioning checklist sign-off → create/verify asset record
  • Vendor maintenance event → update firmware/software versions
  • Asset retirement work order → retire record

Artifacts:

  • Workflow diagrams (even simple swimlanes)
  • Sample tickets/work orders showing adds/changes/retirements

5) Implement discovery and reconciliation (especially for OT)

You need a method to detect unknown or drifted assets:

  • IT: endpoint management, network scans, cloud inventory exports.
  • OT: prefer passive monitoring, switch port maps, engineering documentation, and controlled validation windows consistent with safety/availability requirements.

Then reconcile:

  • “Discovered but not in inventory” → create record or document exception.
  • “In inventory but not seen” → verify offline status, retired, or misclassified.

Artifacts:

  • Reconciliation reports
  • Exception log with approvals and review dates
  • Tickets created from reconciliation findings

6) Assign ownership and review cadence (and prove it happens)

Name roles:

  • Inventory owner (IT)
  • Inventory owner (OT)
  • Data steward (quality and reconciliation)
  • Approvers for exceptions

Set an operational review cadence appropriate to your environment (monthly is common for IT; OT may vary by site operations). The key is evidence that it happens and results in actions.

Artifacts:

  • Meeting notes or attestations
  • Follow-up tickets and closures
  • Escalations when gaps persist (aligns with “keep review evidence…tickets…escalation records” best practice) 1

Required evidence and artifacts to retain (audit-ready)

Keep evidence that demonstrates both existence and maintenance:

Evidence item What it proves Good enough format
Scope statement The inventory matches the assessed function/environment Signed PDF/wiki export
Data dictionary Defined minimum fields for hardware and software Table in policy/standard
System-of-record memo Authoritative sources and conflict rules 1–2 page decision record
Inventory export (IT + OT) The inventory exists and includes hardware + software CSV export with timestamp
Reconciliation output You detect unknown assets and fix gaps Report + resulting tickets
Change/commissioning samples Updates happen through operational workflows Ticket/work order screenshots
Exception register You manage known gaps transparently Log + approvals
Review evidence You review and take action Minutes, attestations, escalations

If you need to respond quickly to customer diligence, Daydream can package these artifacts by requirement and keep them current as evidence changes.

Common exam/audit questions and hangups

Expect these questions, and prepare short, document-backed answers:

  1. “Show me your OT inventory.”
    Hangup: teams present only IT CMDB exports.

  2. “How do you know it’s complete?”
    Hangup: no reconciliation, no discovery method, or no exception log.

  3. “What’s your definition of an asset?”
    Hangup: inconsistent definitions across IT, OT engineering, and security.

  4. “How are software inventories maintained?”
    Hangup: listing applications but not linking them to where installed, or ignoring OT software/firmware.

  5. “Who is accountable for accuracy?”
    Hangup: shared responsibility without named owners.

Frequent implementation mistakes (and how to avoid them)

  • Mistake: Treating OT like IT scanning.
    Avoid it: use OT-safe discovery methods and align updates to engineering change control.

  • Mistake: “We have five inventories.”
    Avoid it: allow multiple source systems, but publish one governed “answer” with conflict rules.

  • Mistake: Tracking devices but not software.
    Avoid it: require software linkage to assets, including OT firmware/software versions where feasible. 1

  • Mistake: No lifecycle status.
    Avoid it: every record needs a lifecycle state (active, offline, retired) and retirement proof.

  • Mistake: No evidence of operations.
    Avoid it: retain review logs, follow-up tickets, and escalations that show the inventory is actively maintained. 1

Risk implications (why assessors care)

An incomplete or stale IT/OT inventory creates blind spots: you can’t reliably patch, monitor, or restrict access to assets you don’t know exist. C2M2 explicitly ties this to the risk that suspicious activity and control failures go undetected and that you lack operating evidence during audits and regulator review. 1

Practical 30/60/90-day execution plan

Day 0–30: Establish the minimum defensible baseline

  • Lock the C2M2 assessment scope for inventory.
  • Publish the asset definition and minimum required fields by asset class.
  • Identify systems of record and produce first inventory exports for IT and OT.
  • Assign IT and OT inventory owners and set review meetings on the calendar.
  • Start an exception register immediately; don’t wait for perfection.

Day 31–60: Make it “maintained,” not static

  • Implement intake paths tied to procurement, commissioning, and change workflows.
  • Stand up reconciliation: discovery vs. inventory, then open remediation tickets.
  • Build a standard evidence pack for ASSET-1.A (scope, exports, tickets, review evidence).
  • If you use Daydream, map ASSET-1.A to your evidence sources so requests are repeatable.

Day 61–90: Operationalize quality and accountability

  • Add data quality checks (missing owners, missing location, unknown software versions).
  • Expand coverage to harder OT zones and third-party-managed assets.
  • Run a tabletop audit: have an independent reviewer sample assets and trace them to source evidence (ticket, work order, commissioning record).
  • Document lessons learned and update the data dictionary and workflows.

Frequently Asked Questions

Do we need a single tool for both IT and OT asset inventory?

No. Auditors typically accept multiple authoritative sources if you define which one is authoritative for each asset class and you can produce a consolidated view for the scoped environment.

What counts as “software” for OT in this requirement?

Track what you can defend: HMI applications, engineering workstation software, historian components, and controller firmware/software versions where available. The key is that software is included in the inventory approach, not ignored. 1

Can a spreadsheet satisfy C2M2 ASSET-1.A?

A spreadsheet can meet the letter of the requirement if it is clearly maintained with ownership, updates, and evidence. It tends to fail in practice when reconciliation and lifecycle changes are not tracked.

How do we handle third-party-managed OT systems?

Keep them in your inventory with clear ownership (internal service owner), the third party relationship, and defined update triggers (maintenance windows, vendor advisories, change approvals). If you cannot obtain certain fields, record the gap in an exception register with an action plan.

What evidence is most persuasive in an assessment?

Time-stamped exports plus tickets/work orders that show adds, changes, and retirements. Review evidence and escalations are strong proof that the inventory is maintained as an operational control. 1

How does Daydream help with this requirement without replacing our CMDB or OT tools?

Daydream helps you operationalize the requirement by mapping ASSET-1.A to your actual evidence sources, standardizing what artifacts you retain, and producing consistent assessment-ready evidence packets as systems and records change.

What you actually need to do

Use the cited implementation guidance when translating the requirement into day-to-day operating steps. 2

Footnotes

  1. Cybersecurity Capability Maturity Model v2.1

  2. DOE C2M2 program

Frequently Asked Questions

Do we need a single tool for both IT and OT asset inventory?

No. Auditors typically accept multiple authoritative sources if you define which one is authoritative for each asset class and you can produce a consolidated view for the scoped environment.

What counts as “software” for OT in this requirement?

Track what you can defend: HMI applications, engineering workstation software, historian components, and controller firmware/software versions where available. The key is that software is included in the inventory approach, not ignored. (Source: Cybersecurity Capability Maturity Model v2.1)

Can a spreadsheet satisfy C2M2 ASSET-1.A?

A spreadsheet can meet the letter of the requirement if it is clearly maintained with ownership, updates, and evidence. It tends to fail in practice when reconciliation and lifecycle changes are not tracked.

How do we handle third-party-managed OT systems?

Keep them in your inventory with clear ownership (internal service owner), the third party relationship, and defined update triggers (maintenance windows, vendor advisories, change approvals). If you cannot obtain certain fields, record the gap in an exception register with an action plan.

What evidence is most persuasive in an assessment?

Time-stamped exports plus tickets/work orders that show adds, changes, and retirements. Review evidence and escalations are strong proof that the inventory is maintained as an operational control. (Source: Cybersecurity Capability Maturity Model v2.1)

How does Daydream help with this requirement without replacing our CMDB or OT tools?

Daydream helps you operationalize the requirement by mapping ASSET-1.A to your actual evidence sources, standardizing what artifacts you retain, and producing consistent assessment-ready evidence packets as systems and records change.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
C2M2 IT and OT Asset Inventory: Implementation Guide | Daydream