The video above walks you through the full asset page. The first section revisits the Master Data and Compliance cards covered in the "Create your first asset" guide, so if you’re already familiar with those, feel free to jump ahead.
1. Data Fields
When working with an asset, you have several sections where you can enter information about the asset. These are divided into:
Master data
Compliance
Physical Asset
Digital Asset
1.1 Master data
In the master data section, you can fill out the following fields:
Name: Enter a clear and descriptive title, etc. "CRM - Hubspot"
Type: Choose between the options: Digital and Physical
Criticality: Describes how important the asset is for compliance and operations. High score indicates the asset is storing critical data or is critical to operations.
Responsible: Assign a specific user or user group as responsible for the asset.
Departments: Select the department(s) the asset belongs to / is used by
Category: Use this to categorize assets as you prefer
Note: Add internal remarks or comments about the asset
1.2 Compliance
In this section, you can determine relevance to compliance frameworks:
Relevant for GDPR: In this field, you can mark whether the asset contains personal information, which would make the asset relevant to GDPR.
Note: When selected, you unlock the “Data Management” page, where you can describe the personal data stored and the deletion routine.
Relevant for NIS2: In this field, you can mark whether the asset supports NIS2 regulated processes.
1.3 Digital Asset
In this section, you can add information about how the digital asset is hosted, accessed, and used:
Self hosted: Specify whether the asset is hosted internally or provided as a cloud service.
Sign-in: Select how users sign in to the asset, whether through SSO, local user accounts (with or without 2FA), or temporary/guest accounts.
Access: Select how the asset can be accessed, whether only through the internal network (with or without VPN) or publicly from all networks.
1.4 Physical Asset
In this section, you can describe how the physical asset is stored and accessed:
Access: Describe how access to the physical asset is controlled. This could be keys, badges, locked rooms, or similar.
Note: Add additional context about location, storage, or handling of the asset.
2. Connections
For any given asset, you can connect it to various elements on the platform:
Suppliers
Tasks
Documentation
Services
Risk Assessments
Security Incidents
For all the connections, you can choose to create a new element from the asset page (which will also link the element to the asset) or attach existing elements to the asset.
2.1 Suppliers
The suppliers you connect to an asset represent the company delivering or hosting it. If the asset is developed internally, you can simply leave this section empty.
Example: An asset could be Microsoft Teams, where Microsoft is the supplier. In this case, the two elements should be connected.
2.2 Tasks
Tasks connected to an asset represent work that must be done to maintain or review the asset. This can be recurring checks, onboarding tasks, compliance reviews, etc.
Example: A recurring task could be to review access rights for the asset every quarter.
2.3 Documentation
Here you can attach documentation relevant to the asset, such as policies, procedures, user manuals, audit evidence, etc.
Example: You might upload the audit evidence showing the latest access-right review and who approved it.
2.4 Services
Service elements represent services you offer to your customers. If the asset plays a role in delivering that service, the two should be connected.
Example: A service could be Complychain. As part of this service, we rely on a database that is registered as an asset. In this case, the two elements should be connected, as the asset is an essential part of delivering the service.
2.6 Risk Assessments
If you have performed a risk assessment for the asset, you can link it here. This makes it easier to follow risks and related mitigations directly from the asset page.
Example: A risk assessment could evaluate the impact of downtime on our database, which the product depends on.
2.7 Security Incidents
Security incidents connected to an asset represent events where the asset was involved or affected.
Example: If a data leak exposed personal data from a specific asset, the security incident should be connected to that asset.




